U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.

Slides:



Advertisements
Similar presentations
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Public Key Infrastructure (PKI) Hosting Services.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
HIMSS/GSA E-Authentication Initiative A Pilot Project of the HIMSS RHIO Federation HIMSS Public Policy Forum September 28, 2006 Mary Grizkewicz, HIMSS.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Helena Sims NACHA – The Electronic Payments Association Overview of The Electronic Authentication Partnership Tenth Federal & Higher Education PKI Coordination.
Lecture 23 Internet Authentication Applications
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
1 E-Authentication The E-Authentication/Grants Demonstration.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Use case: Federated Identity for Education (Feide) Identity collaboration and federation in Norwegian education Internet2 International Workshop, Chicago,
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
U.S. Department of Agriculture eGovernment Program December 3, 2003 eAuthentication Initiative USDA eAuthentication Service Overview eGovernment Program.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Introduction to the Exchange Network January 9 th, 2012.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GC Credential Management Evolution for the OASIS/World Bank eGov Workshop 17 th April, 2009For information, please contact:
New Web Portal for Digital (PKI) Submissions 1. What is PKI? PKI stands for Public Key Infrastructure For the purpose of the Federal Register, it allows.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Federal Electronic Commerce Program Office Tony Trenkle General Services Administration October 28, 1998.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
The Exchange Network Node Mentoring Workshop Universal Description, Discovery, and Integration Registry David Dundua February 28, 2005.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Introduction to the Exchange Network May 30th, 2012.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
U.S. Department of Agriculture eGovernment Program eAuthentication Draft Business Case Executive Summary January 2003.
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
NGA Center for Best Practices January 10, 2001 Charleston, South Carolina National Environmental Information Exchange Network Kim Nelson Pennsylvania Department.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
Introduction to the Exchange Network May 30th, 2012.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Law Enforcement Information Sharing Program (LEISP) Federated Identity Management Pilot February 27, 2006.
Extending Authentication to Members of Social Networks
U.S. Federal e-Authentication Initiative
NAAS 2.0 Features and Enhancements
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Technical Approach Chris Louden Enspier
The E-Authentication Initiative
HIMSS National Conference New Orleans Convention Center
Presentation transcript:

U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005

January 19, E-Authentication Background - 1 What is E-Authentication? –E-Authentication is the process of confirming the identity of individuals who: want to access a computer system or network, or Create an electronic signature. –E-Authentication involves issuing/managing credentials (PIN, password, digital certificate, etc.) and validating them when they are presented by an individual for sign-on or signature

January 19, E-Authentication Background - 2 What is the Federal E-Authentication Initiative? –Vision: credential re-use across computer systems –Goal: minimize need for multiple credentials, reducing burden on anyone who uses government systems – federal employees businesses ordinary citizens state and local government officials –Other Benefits: Private/public sector interoperability Single sign-on Economies of scale – shared infrastructure for issuing, managing and validating credentials

January 19, E-Authentication Background - 3 What is the Federal E-Authentication Architecture? –Design to allow computer systems to accept credentials that they did not issue –General Services Administration (GSA) lead –Key components include: E-Authentication Portal GSA Step-Down Translator Federal Bridge Accredited Certificate Authorities –Two approaches PKI – Federal Bridge for Certificate Authority (CA) interoperability PINs/Passwords – Security Assertion Mark-up Language (SAML) architecture to protect secrecy of PIN or password

January 19, E-Authentication Background - 4 GSA’s Federal Bridge –An “authority” that establishes that a CA’s certificates can be “trusted” –A hardware / software system that helps users access CA information needed to validate a certificate GSA’s SAML Approach –Establishes “trust circles” between CA’s that issue PINs/Passwords (e.g. financial institutions) and government agencies that can rely on them –Provides architecture for E-Authentication based on SAML assertion from CA to relying government agency –Architecture includes E-Authentication Portal and Step-Down Translator

January 19, Network E-Authentication Pilot Overview An EPA/GSA partnership to show how States can use the Network to participate in E-Authentication architecture. Approach involves: –Integrating the Network with the GSA architecture; –Leveraging the Network’s E-Authentication interface to provide credential validation services to any State partner that can access the network; –States using the Network services to accept either PKI certificates or SAML assertions – for either system access or signature. The Pilot is currently in the planning and design phase. Completion is scheduled for October, 2005

January 19, Goals Show that the Network can: –Bring credential inter-operability to our State partners –Provide credential validation services to States that don’t want to invest in their own PKI or SAML functionality –Offer enormous economies of scale for E-Authentication Help States meet Cross-Media Electronic Reporting and Record-keeping Rule (CROMERRR) standards, by –Providing access to credentials that satisfy identity-proofing requirements, that States don’t have to issue/manage –Allowing use of digital signatures without States having to acquire their own PKI capabilities.

January 19, Requirements of States to Participate Ideally, participating States would have: – A Web browser-based application that requires user authentication, and would benefit by upgrading to SAML- or interoperable PKI-based authentication – 2 hours/week (Mar 05 – Oct 05) to invest in weekly work sessions – Up to hours to upgrade their systems to interface with E- Authentication components Participants start by filling in a questionnaire to determine how well their application would fit into the Pilot EPA’s Office of Environmental Information (OEI) will provide participating States with all the software, credentials, and technical support they need for the Pilot

January 19, Benefits to Pilot Participants 1.Experience using CDX/E-Authentication services, with GSA-subsidized technical support, including access to designers of the E-Authentication infrastructure. 2.The chance to help shape how EPA/GSA offer E-Authentication services to States -- so that they take account of any special participant needs. 3.Information to help make better long-term system investment decisions, with a better understanding of the available E-Authentication options.

January 19, For more information, contact: David Schwarz