InCommon Technical Advisory Committee Update November 14, 2013.

Slides:



Advertisements
Similar presentations
PKI and LOA Establishing a Basis for Trust David L. Wasley PKI Deployment Forum April 2008.
Advertisements

Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Bronze and Silver Identity Assurance Profiles for Technical Implementers Tom Barton Senior Director for Integration University of Chicago Jim Green Manager,
TIER – before, now and after If you do not talk this will be a very long hour because we can only repeat the same stuff for so long… 1.
Identity Assurance Profiles & Trust Federations David Bantz, U Alaska Tom Barton, U Chicago Ann West, Internet2 & InCommon David Bantz, U Alaska Tom Barton,
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
EDUCAUSE Best Practices Build Better Systems Ann West, InCommon Dedra Chamberlin, UC Berkeley.
Interfederation subgroup of InCommon Technical Advisory Committee (TAC) spaces.internet2.edu/display/incinterfed.
How Do You Establish Student Identity Remotely: A Survey Keith Hazelton, University of Wisconsin-Madison Ann West, Internet2/InCommon Federation 2010 Fall.
Update on federations, PKI, and federated PKI for US feds and higher eds Tom Barton University of Chicago.
Copyright JNT Association 20051Optional Copyright JNT Association Joining the UK Access Management Federation 4th April.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Winter 2011 CSG Workshop: InCommon Silver January 12, 2011.
Identity Management What is it? Why? Responsibilities? Bill Weems Academic Computing University of Texas Health Science Center at Houston.
(Rev 1/11) UW System Identity and Access Management (IAM) Current Status and Roadmap Tom Jordan, IAM-TAG Chair Ty Letto, IAM Support Team Manager January,
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
InCommon Technical Advisory Committee (TAC) Community Update February 22,
SWITCHaai Team Federated Identity Management.
InCommon Forum Fall 2012 Internet2 Member Meeting Wednesday, October 3,
Trust and Security for FIM (Sirtfi/SCI) David Kelsey (STFC-RAL) FIM4R at CERN 4 Feb 2015.
A case study of Shibboleth deployment within the U.T. System June 26, 2006 Paul Caskey University of Texas System Copyright Paul Caskey 2006 Not Your Father’s.
The InCommon Federation The U.S. Access and Identity Management Federation
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
Identity Management Practical Issues Associated with Sharing Federated Services UT System Identity Management Federation William A. Weems The University.
Exploring InCommon Getting Started with InCommon: Creating Your Roadmap.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
IDENTITY ASSURANCE PROFILES AND FRAMEWORK DOCUMENTS: PEEK INTO PROPOSED FICAM CHANGES 12/12/12 1.
InCommon as Infrastructure: How Recommended Practices and Federation Features Help Scale Federated Identity Management Michael R. Gettes, Carnegie Mellon.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
InCommon Town Hall Meeting 19 October Town Hall Meeting When, in some obscure country town, the farmers come together to a special town-meeting,
The I-Trust Federation: Federating the University of Illinois Keith Wessel Identity Management Service Manager University of Illinois at Urbana-Champaign.
Social Identity Working Group Steve Carmody. Agenda Intro to Using Social Accounts Status and Recent News –Current UT Pilot –Current InCommon Pilot with.
Identity Assurance: When it Matters David L. Wasley Internet2 / InCommon.
Federated Access to US CyberInfrastructure Jim Basney CILogon This material is based upon work supported by the National Science.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
PATIENT-CENTERED OUTCOMES RESEARCH INSTITUTE PCORI Board of Governors Meeting Washington, DC September 24, 2012 Anne Beal, MD, MPH, Chief Operating Officer.
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
Higher Ed Certificate Authority by CREN: Update CSG February 2, 2000.
The UK Access Management Federation John Chapman Project Adviser – Becta.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
October 2, 2001 Middleware: Pieces and Processes RL "Bob" Morgan, University of Washington.
Growth. Interfederation PKI is globally scalable Unfortunately, its not locally deployable… Federation is locally deployable Can it.
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
Understanding deployment issues on the Supply Chain Ann Harding, SWITCH, Nicole Harris, TERENA Cambridge July 2014.
Connect communicate collaborate Trust & Identity EC meets GÉANT 19 June 2014 Brussels Valter Nordh, NORDUnet Federation as a Service Task Leader Trust.
Shibboleth Working Group, Fall 2010 Scott Cantor, OSU Chad LaJoie, Itumi, LLC.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Leveraging Campus Authentication to Access the TeraGrid Scott Lathrop, Argonne National Lab Tom Barton, U Chicago.
1 Name of Meeting Location Date - Change in Slide Master Authentication & Authorization Technologies for LSST Data Access Jim Basney
10/08/20041 © 2004 Pete Palmer Federated Identity Management and Regional Health Information Organizations Pete Palmer, Principal Security Analyst, Guidant.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
LIGO Identity and Access Management
InCommon Steward Program: Community Review
Certificate Service Survey Summary
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

InCommon Technical Advisory Committee Update November 14, 2013

What is the InCommon Technical Advisory Committee ? The InCommon TAC will work with Steering to support the InCommon Participant community's use of shared identity and access management technology, services, recommended practices and strategies. The InCommon TAC will advise the SC regarding policy implications of technical changes and the technical implications of proposed policy changes. The TAC may suggest policy changes to support new uses or configurations of the underlying technology or its applications. The TAC shall seek further review of its recommendations within the broader community of users, both within InCommon and among the larger, shared access management community, as appropriate. The TAC will function as defined for Advisory Committees in the InCommon LLC ByLaws.InCommon LLC ByLaws

TAC Members Steven Carmody, Brown University (Chair) Tom Barton, University of Chicago Jim Basney, University of Illinois Scott Cantor, The Ohio State University Paul Caskey, University of Texas System Michael Gettes, Carnegie Mellon University Keith Hazelton, University of Wisconsin - Madison Jim Jokl, University of Virginia Ken Klingenstein, InCommon Steering Committee Chris Misra, University of Massachusetts - Amherst (NEW) Nick Roy, Penn State University (NEW) David Walker, Independent Ian Young, U.K. Access Management Federation In Memoriam - R.L. "Bob" Morgan, University of Washington

TAC does much of its work through subgroups What’s a subgroup? A community group that forms to work on a technical priority. A subgroup has a charter and goals Who can participate? Anyone in the community with an interest in the topic and time to contribute

Current TAC Subgroups Social Identity Working Group Interfederation – Phase 2Interfederation Metadata Distribution PKI Subcommittee

Agenda Multi-Factor & AssuranceTom Barton Assurance Program updateAnn West InCommon Multi-Factor servicesJoe St Sauver Shibboleth Multi-Factor supportDavid Walker InterFederation UpdatePaul Caskey Participant discussionKeith Hazelton

Multi-Factor Authentication & Assurance Update Tom Barton, U Chicago Ann West, Internet2 Joe St Sauver, Internet2 David Walker, Contractor

Passwords are bad and will get worse. We know! Need to strengthen authentication process Reduce risk that authenticated user is someone else –Stolen or shared (eg, phishing) –Inappropriate reassignment (eg, yahoo) –Fraudulently obtained InCommon’s Identity Assurance Framework provides a step- wise and standards-based way to plan your mitigation of these risks 8

Components of assurance 9 RiskAssurance component that mitigates Fraudulently obtained Identity proofing + credential management Vetting process, Subject attributes, record keeping Inappropriate reassignment Credential management Token issuance & revocation, binding of Token to Subject, secure infrastructure, record keeping Stolen or shared Token technologies Password/passphrase Second factor (OTP, “phone factor”, 2 nd password) Multi-factor (PIN + token) Additional factors (biometric, geolocation,...) Effort to mitigate

Assurance update Multi-Context Broker Shibboleth extension –Silver/Bronze, 2FA, MFA, step-up authentication –Testing code Active Directory Cookbook for Silver v1.2 –Draft available for comment. No Alternative Means needed Further Assurance program work –Bronze Adoption, Federal Cloud Credential Exchange (FCCX) Alternative Means –Multi-Factor: SafeNet, Duo (underway) –Certificates: Comodo and InCert (Manage certs on user devices) InCert, especially for using certs with secure wireless More info: 10

InCommon MultiFactor Program The primary offering is currently Duo Security –SafeNet hard tokens –Vasco, InCommon affiliate –Toopher, starting Net+ onboarding process Duo is a mobile device-based multifactor solution Duo's available to InCommon participants in two models –Site license for all faculty/staff and students, ~$1/student/yr –Site license for all faculty/staff, ~$0.50/person/yr –Zero paperwork "ala carte" option for $5/user/year (for 500 users or more) –Sites with academic hospitals can also separately license Duo to also cover their hospital staffs.

Duo deployment Is incredibly easy! –User self-registers their mobile device –User login to application as they normally would –Click "approve" in response to a confirmation query sent to their mobile device. –Poor phone connectivity? Duo also supports a soft token running on smart phones, "enter the six digits" style. –Options for users with traditional phones and traditional hard tokens (extra fees apply). –Duo integrates well with all the usual applications, including service- by-service deployments for things like ssh, VPNs, and web applications, but there's also been substantial interest in integrating Duo with Shibboleth IdPs, so integrating multifactor support on one IdP can improve the security of multiple SPs

Shibboleth Multi-Context Broker (MCB) Project to enhance Shibboleth’s ability to orchestrate among multiple authentication contexts, including those requiring multi-factor authentication Initiated to address needs identified by CILogon, the National Institutions of Health, the Department of Education, and others

What Are We Trying to Accomplish? Authentication method (including multi-factor) based on SP requests Authentication method based on user certifications and restrictions Assurance profiles based on SP and user Assurance profile hierarchies Prioritized requests for multiple authentication contexts

Authentication Context An Authentication Method plus any other relevant criteria for an assertion Configuration –Authentication Method –Other Contexts satisfied by this Context –Well-known name –(“Other relevant criteria” represented in user records)

Example: AuthN Method by SP Two Authentication Contexts –PasswordContext with username/password authN method –MFAContext with multi-factor authN method SPs requiring PKI request MFAContext. SPs requiring username/password request PasswordContext Users are presented with the authentication method that matches the requested Context

User Certifications and Restrictions “Other relevant criteria” IdMS has multi-valued attribute holding list of Contexts that user can authenticate to. Contexts that can be asserted for a user are the listed Contexts, plus any satisfied by those listed.

Example: AuthN Method by User Two Authentication Contexts –PasswordContext with username/password authN method –MFAContext with multi-factor authN method MFAContext satisfies PasswordContext Most users given PasswordContext Users allowed to use PKI given MFAContext and PasswordContext –They may be presented with a choice of authentication methods Users required to use PKI (perhaps by their choice) are given only MFAContext

Example: InCommon Bronze and Silver 1 Two Authentication Contexts –BronzeContext with username/password authN method –SilverContext with username/password authN method SilverContext satisfies BronzeContext Users are certified for BronzeContext and/or SilverContext, based on identity proofing, registration, etc. This is stored in the IdMS. Users authenticate once per session

Example: InCommon Bronze and Silver 2 Two Authentication Contexts –BronzeContext with username/password authN method –SilverContext with multi-factor authN method SilverContext satisfies BronzeContext Users are certified for BronzeContext and/or SilverContext, based on identity proofing, registration, etc. These are stored in the IdMS. Users who have authenticated for BronzeContext will need to reauthenticate (with multi-factor) for SilverContext, but not the converse

More Information Assurance Enhancements for the Shibboleth Identity Provider – suranceReqShibIdP-19Apr2013.pdfhttps://spaces.internet2.edu/download/attachments/ /As suranceReqShibIdP-19Apr2013.pdf Project Status –Currently doing acceptance testing and correcting bugs –

Interfederation Working Group

About the group Began in early 2013 Intent was to explore the area of linking federations –Technical aspects –Trust/policy issues One primary driver was LIGO users in the UK Federation Wiki: spaces.internet2.edu/display/incinterfed/Interfed+Subcommittee Mailing List: lists.incommon.org/sympa/info/interfed

Deliverables from Phase 1 Use Cases –spaces.internet2.edu/x/EQAwAgspaces.internet2.edu/x/EQAwAg Plans for InCommon and UK Interfederation –spaces.internet2.edu/x/tIA_Agspaces.internet2.edu/x/tIA_Ag Lessons Learned –spaces.internet2.edu/x/QwBOAgspaces.internet2.edu/x/QwBOAg Report to Technical Advisory Committee (TAC) –spaces.internet2.edu/x/Dw9OAgspaces.internet2.edu/x/Dw9OAg

Phase 2 Picks up where Phase 1 left off. Duration: October 2013 – March 2013 New Leadership (Phase 1 : Jim Basney): –Warren Anderson (LIGO, new to subcommittee) –Paul Caskey (UT System, Liaison to TAC) Charter drawn from recommendations document of Phase 1. Currently ~10 participants.

Charter for Phase 2 Establish international interfederation agreements with eduGAIN and UK federation. Review documented trust practices and policies for entity registration and publishing. Review and adopt the US-EU Code of Conduct concerning attribute release and privacy. Review and assist in the implementation of metadata management/publication/aggregation/tagging improvements. Establish practices and policies for domestic interfederation for regional, K-12, etc federations.

Next steps? Begin work on Phase 2 And… We need You!! (everyone is welcome) First telecon soon! (~10/23) Subscribe to the mailing list: All project information is linked here: –spaces.internet2.edu/display/incinterfedspaces.internet2.edu/display/incinterfed

Contacts Warren Anderson, Chair Paul Caskey, TAC Liaison

Participant Discussion Keith Hazelton UW-Madison

Strategic Priorities, 2013 Assurance Metadata Administration Supporting NET+ Interfederation Metadata Distribution Federated User Experience  Mobile/Federated Non-browser Applications 

Some drivers for 2014 and beyond (Are they yours?) Enhanced support for research mission New models for teaching and learning Accelerating adoption of cloud-based services Serving an expanding set of user populations Next generation ERP roll-outs Pressure to consolidate admin services to free up scarce resources

Setting TAC Priorities for 2014 Current pain or pressure points? Unfinished journeys that must be continued? Looming trends calling for effective shared responses?

Thank You!