Externalizing Authentication

Slides:



Advertisements
Similar presentations
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Advertisements

Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
eduroam Delegate Authentication System with Shibboleth SSO
Lousy Introduction into SWITCHaai
Mobile Devices in the DoD
Single Sign-On and Federated Authentication at NIH and Beyond
Office 365 Identity June 2013 Microsoft Office365 4/2/2017
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Core identity scenarios Federation and synchronization 2 3 Identity management overview 1 Additional features 4.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker
Secure Lync mobile Authentication
Secure SharePoint mobile connectivity
Lecture 23 Internet Authentication Applications
Facilitating Government-wide Collaboration, Knowledge Management, & Data Collection and Tracking The MAX Federal Community Sponsored by.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Understanding Active Directory
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
Turkey IDA Info-Day PM Session, September 25, 2003 CIRCA 1 CIRCA : The IDA Collaborative Software Tool Grzegorz Ambroziewicz European Commission - DG Enterprise.
The InCommon Federation The U.S. Access and Identity Management Federation
Identity Management Report By Jean Carreon and Marlon Gonzales.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Facilitating Government-wide Collaboration and Knowledge Management The MAX Federal Community Sponsored by the Budget Formulation and Execution.
Shibboleth: An Introduction
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
Federated Authentication at NIH: Trusting External Credentials at Known Levels of Assurance Debbie Bucci and Peter Alterman November, 2009.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
DNS DNS changes required to validate domains in Office 365 UPN – User Principal Name Every user must have a UPN UPN suffixes must match a validated.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Secure Connected Infrastructure
Using Your Own Authentication System with ArcGIS Online
Analyn Policarpio Andrew Jazon Gupaal
Data and Applications Security Developments and Directions
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
Power BI Security Best Practices
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Azure AD Application Proxy
ESA Single Sign On (SSO) and Federated Identity Management
NAAS 2.0 Features and Enhancements
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
GALILEO & OpenAthens: 21st Century Authentication for GALILEO Participating Libraries Christopher Holly Director of SaaS Innovation, EBSCO
GALILEO & OpenAthens: 21st Century Authentication for GALILEO Participating Libraries Christopher Holly Director of SaaS Innovation, EBSCO
HIMSS National Conference New Orleans Convention Center
Matthew Levy Azure AD B2B vs B2C Matthew Levy
Identity Management at the University of Florida
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Microsoft Virtual Academy
Presentation transcript:

Externalizing Authentication Federal ICAM Day June 18, 2013

Panel Participants Phil Wenger, OMB Douglas Glair, USPS Anil John, GSA (Moderator)

Phil Wenger, OMB

ICAM Information Sharing Day and Vendor Expo Externalizing Authentication using MAX Authentication as a Service (AaaS) Phil Wenger, OMB June 2013

Key Takeaways Understand the MAX Ecosystem Understand how Agencies can externalize authentication using MAX’s Shared Credentialing, Provisioning, Authentication, and Authorization and Services

MAX.gov - A Complete Cloud Services Platform Enabling the “Shared First” and “Cloud First” eGov Policies Identity Management & SSO Collaboration Analytics Data Collections & Surveys Web Meetings Remote Desktops for Telework Federated Search Wiki & Web Content Document Management Social Networking & Publishing Government-wide Directory

MAX AaaS provides Government-wide ID Plus state, local, international, & non-governmental partner users Inter-agency Government-to-Government Intra-agency Policymaking, Management and Budget class of activities State, Local, International, and Non-Governmental Partners The Public Available for use by agencies for both cross-government and intra-agency activities User accounts available for interactions with non-governmental partners in secure Enclaves

What MAX AaaS Provides to Agencies Allow citizen access to agency websites using NSTIC or anonymous logins while enforcing admin access via MAX ID Use government-wide organic and organizational MAX groups for role-based access control and fine-grained permissions Immediate Government-wide Identity Use MAX PIV validation service to meet eGov policies (OMB M-11-11, M-10-28) Use MAX PIV to SAML gateway service to map 2-factor identity to agency logins or MAX ID Rapid HSPD-12, DOD CAC PIV Implementation Federate MAX Authentication with your Agency’s Active Directory Federate MAX Authentication with SAML 2.0 Single Sign-on (SSO) Federation and Multi-Agency Single Sign-on

MAX AaaS Solution Benefits Instant Deployment Cloud based, C&A’d FIPS 199 FISMA Moderate Mission-critical use Low Total Cost of Ownership No new software to build or license Self-service delegated administration Eases management burden Dual authentication Augments existing identities Government-wide Directory Automatically Maintained

MAX AaaS - Scope 120+ Agencie s 300+ Bureaus 85,000+ users Auto Registration for .gov, .mil and other domains 120+ Agencie s 300+ Bureaus 85,000+ users 6,000+ user groups Thousands of HSPD-12 users from 90+ agencies Federal, State, Local, International, and Non-government partner users

MAX AaaS – Multiple Login Methods Web Services that support HSPD-12 and ICAM SAML 2.0 Web Browser SSO Profile Choose between single-factor, dual-factor, or federated login PIV validation and mapping service Full path building, validation, revocation checking Identity data extraction and normalization Can be mapped to your agency ID Federate your agency Active Directory or SAML 2.0 instances http://www.idmanagement.gov/documents/SAML20_Web_SSO_Profile.pdf

How Agencies have Externalized Authentication using MAX AaaS Today MAX ID MAX Apps Other Apps eGov Apps Agency Apps MAX A11, Apportionment BFEM Adobe Connect Online Meetings Wordpress Drupal Active Directory DOJ CyberScope IT Dashboard, Data.Gov, Performance.Gov

MAX Authentication as a Service (AaaS) Sponsored by the Budget Formulation and Execution Line of Business (BFELoB) BFELoB Organization and Contacts: Executive Sponsor: Courtney Timberlake, Assistant Dir. for Budget, OMB Managing Partner: Tom Skelly, Director of Budget Service, Education Policy Lead: Andy Schoenbach, Chief, Budget Systems Branch, OMB Deputy Policy Lead: Phil Wenger, Budget Systems Branch, OMB Program Management Office Lead: Mark Dronfield, Education MAX Authentication Lead: Barry Napear, Budget Systems Branch, OMB MAX Architect: Shahid Shah, Budget Systems Branch (CTR), OMB Learn More about the Budget LoB: www.BudgetLoB.gov Visit MAX.gov: www.max.gov Contact the Budget LoB: BudgetLoB@Ed.gov Contact MAX Support: 202 395-6860

Background Slides

MAX AaaS: Full featured identity services Self-Service Provisioning Common Identity, Profile, and Directory Self service registration and account management Auto-provisioning for .gov, .mil, etc. Identity assurance for Levels 2 and 3 Multi-factor Authentication Single factor (user/password) Multi factor (PIV/PIV-I/CAC) Federated (SAML2, ADFS) Machine2Machine (M2M) Delegated Authorization Group Management Role Management Delegated Administration SAML

Self Service User Provisioning Process Less than 5 minutes to get an account for “trusted domains” Agency user and his/her management defines need to access MAX (employee, contactor, partner) User self registers on line at MAX portal https://max. gov MAX checks sponsor requirement for outside users MAX validates user’s email address Email confirmation sent to user User accepts MAX User Agreement

Self or Managed Authorization Process MAX notifies user and application administrators MAX or delegated admin reviews access requests User applies for application access via MAX portal MAX assigns user to groups, communities and/or applications as authorized by user’s management User and his/her management defines MAX application and role to access

MAX Identity Management (IDM) Services Provides APIs for MAX Identities, Profiles, Groups, and Authorization data AaaS JSON based RESTful Web Services IDM Enhanced

MAX PIV Validation (PV) Services Provides APIs for PIV/PIV-I/CAC validation and identity data extraction “Public” service available: https://pv.test.max.gov/ Full Path Building, Validation, Revocation Checking Identity Data Extraction / Normalization PV PKIF: The PKI Framework

MAX PIV-to-SAML Translation Services Performs PIV validation, maps to MAX ID, then translates to SAML Apps do not need to be aware of PIV validation details (they are given assurance level as part of SAML assertion) Perform MAX PIV Validation Map to MAX ID Translate to SAML Pass Assertion to App

Agency AD/LDAP Integration (Federation) Supports ICAM SAML 2.0 Web Browser SSO Profile http://www.idmanagement.gov/documents/SAML20_Web_SSO_Profile.pdf

MAX HSPD-12 Authentication Process HSPD-12 Certificate 1 4 Internet 2 3 SSL/TLS Apache Proxy User connects to MAX and receives Login Page User enters user/pass or inserts HSPD-12 card into reader and selects PIV login For HSPD-12 login, browser establishes a TLS connection to Proxy, and Proxy requests a certificate Browser extracts certificate from card and forwards it to Proxy Proxy forwards certificate to CAS CAS matches certificate against Identities Directory CAS extracts MAX ID and user profile information and prepares a SAML assertion CAS "forwards" the SAML assertion to the application requesting authentication (no certificates are exchanged) 5 Apps 7 Identities Directory 6 8 Authenticate

Douglas Glair, USPS

Federal Cloud Credential Exchange (FCCX) Doug Glair – Manager, Digital Partnerships and Alliances – United States Postal Service

Requires IDPs to integrate with multiple Agencies Federal Cloud Credential Exchange (FCCX) enables the NSTIC and ICAM vision of interoperable credential usage by allowing agencies to securely interact with a single “broker” to facilitate the authentication of consumers Market Problem (Government) The Solution (FCCX) Requires Agencies to integrate with multiple Identity Service Providers (IDPs) Requires IDPs to integrate with multiple Agencies Creates a single interface between Agencies and IDPs Speeds up integration Reduces costs and complexity

NIST Levels of Assurance (LOA) FCCX will integrate with ICAM approved IDPs across the Levels of Assurance (LOA) defined by NIST and approved via the ICAM Trust Framework Solutions Very high confidence in asserted identity Approved IdPs: PIV/ PIV-I Cards LOA 4 High confidence in asserted identity Approved IdPs: Symantec, Verizon LOA 3 Some confidence in asserted identity Approved IdPs: Symantec, Verizon, Virginia Tech LOA 2 Little or no confidence in asserted identity – self- assertion Approved IdPs: Equifax, Google, PayPal, Symantec, VeriSign, Verizon, Wave Systems, Virginia Tech LOA 1 Complexity & Security

FCCX Anticipated User Experience Flow