Network Identity Kai Kang 27 th October 2004. Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches.

Slides:



Advertisements
Similar presentations
Achieving online trust through Mutual Authentication.
Advertisements

Mobile Devices in the DoD
Web Services In M-Commerce
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
Security Controls – What Works
Authentication choices! Vincent van Kooten: Business Sales Manager Benelux Distributed by -
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Federated Identity Management for the context of storage Bart Kerver - TERENA Storage-meeting, Amsterdam,
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign InCommon and TeraGrid Campus Champions Jim Basney
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment ELC 200 Day 24.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Single-Sign On and Federated Identity.
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
Public Key Infrastructure Ammar Hasayen ….
INTRANETS DEFINITION (from Cambridge International Dictionary of English) intra- Combining form used to form adjectives meaning 'within' (the stated place.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Turkey IDA Info-Day PM Session, September 25, 2003 CIRCA 1 CIRCA : The IDA Collaborative Software Tool Grzegorz Ambroziewicz European Commission - DG Enterprise.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
To identity federation and beyond! Josh Howlett JANET(UK) HEAnet 2008.
LU Chenglong ( ) DIAO Wenrui ( )
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Federal Electronic Commerce Program Office Tony Trenkle General Services Administration October 28, 1998.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Integrating Federated Identity and Web services in the RHIO Environment John Richardson Vice-Chair, Liberty Alliance eHealth SIG Intel Corporation Digital.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
What is the Liberty Alliance ? A business alliance, formed in Sept 2001, with the goal of establishing an open standard for federated identity management.
“The FIDO Alliance Today”
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Federated Identity on the Web Peter Yared Chief Technologist, Network Identity Sun Microsystems, Inc. Month, 2001.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary.
Connect communicate collaborate Trust & Identity EC meets GÉANT 19 June 2014 Brussels Valter Nordh, NORDUnet Federation as a Service Task Leader Trust.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
SAML Interoperability Lab RSA Conference Agenda SAML and the OASIS SSTC SAML Timeline Brief SAML History SAML Interop Lab Q & A Demo.
Jeju, 13 – 16 May 2013Standards for Shared ICT Thomas Goode General Counsel ATIS Alliance for Telecommunications Industry Solutions (ATIS) Update Document.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Setting and Upload Products
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Data and Applications Security Developments and Directions
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
E-Commerce for Developing Countries (EC-DC)
Alliance for Telecommunications Industry Solutions (ATIS) Update
IT Security Solutions for Banking
Presentation transcript:

Network Identity Kai Kang 27 th October 2004

Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches –Microsoft Passport –Liberty Alliance Technical architectures Status in Finland –SETEC –NOKIA

Introduction What is Network Identity? It is the set of attributes that describe profiles of an individual in the Internet. like: address, customer name, PIN, credit card number, social security number, Passport, even DNA, Retinal Scan....

Formal Definition by Sun Microsystem Network Identity (NI) is the context-sensitive identity, attributes, rights, and entitlements, all maintained within a policy-based trusted network framework.

Network Identity Drivers Financial Compliance and Legislation Trust and Privacy Security Technology

Protocol Objective Interfaces Functionality DNSDomain namesIP addressnaming service DHCPMAC addressIP addressIP network connectivity LDAPUser identityPoliciesEnforcement of access rights PKIUser namePublic keyEncryption/Decryption for data security and session verification RADIUSUserUser attributes and access rights Control over authorized use of network resources Basic Network Identity Services

Network Identity Roadmap Figure 1 Network Identity Infrastructure Source: Liberty Alliance Website

Network Identity Management approaches Microsoft’s.Net Passport (centralized) Liberty Alliance ( Federated)

Centralized Model single identity operator Figure 2 Centralized concept Source: Liberty Alliance Website

Open Federated Model Auction Community Wireless Community Entertainment Community Educational Community Online Retail Community Financial Service Customer Community Communications Service Community Figure 3 Open Federated concept Source: Liberty Alliance Website

Microsoft’s.Net Passport Microsoft’s.Net Passport is a "universal-login" service launched since July 1999 that allows users to log in to many websites using one account. It is a key part of Microsoft's.Net strategy. Microsoft's NET Passport has more than 200 million active accounts and handles more than 4 billion authentications per month. - Adam Sohn Product Manager Platform Strategy Group at Microsoft

Participating companies that use Passport technology

Liberty Alliance A business alliance, formed in Sept 2001 with the goal of establishing an open standard for federated identity management. Liberty Alliance Provides the technology, knowledge and certifications to build identity into the foundation of mobile and Web-based communications and transactions.

Membership categories Over 150 diverse member companies and organizations nowadays including:  Government organizations The U.S. General Services Administration, and the U.S. Department of Defense  End-user companies  System integrators  Software and hardware vendors

Liberty Alliance Board Members

Varies technical approaches for the im- plementation of Network Identity, here I choose the Liberty Alliance’s model Technical Architectures

Liberty NI Architecture Figure 4 Liberty NI Architecture Source: Liberty Alliance Website

Identity Providers Users Service Providerss Web redirection Web services Metadata & Schemas Figure 5 ID-FF Basic Architecture Source: Liberty Alliance Website

Figure 5. Passport's architecture Source: Microsoft Corporation

Status in Finland

Network ID Product pioneer SETEC Famous for it’s smart cards  In 2000 the world's first payment card based on EMV&PKI technology  In 1999 developed the world's first, PKI SIM card  In 1998 launched SIM card with a Wireless Internet Browser.  In 1995 first in the world to develop a PKI smart card with 1024-bit keys.

World Telecommunications leader NOKIA  June 2004 Nokia and Sun Microsystem co-published a new white paper “Deploying Mobile Web Services using Liberty Alliance’s Identity Web Services Framework (ID- WSF) ”  One of the ten member companies offer Liberty Alliance interoperable products (passed the conformance tests)  In Sept 2001 Nokia was one of the founders of the Liberty Alliance, board member and key impetus