1 1 PAIIWG++ Meeting #1 William I. MacGregor National Institute of Standards and Technology 16 Sep 2008.

Slides:



Advertisements
Similar presentations
June 27, 2005 Preparing your Implementation Plan.
Advertisements

Public Key Infrastructure and Applications
ANS X9.24 Overview.
FIPS 201 Framework: Special Pubs ,76,78 Jim Dray HSPD-12 Workshop May 4/5, 2005.
Single Sign-On and Federated Authentication at NIH and Beyond
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
1 HSPD-12 Compliance: The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Federal Guidance on Statistical Use of Administrative Data Shelly Wilkie Martinez, Statistical and Science Policy, OIRA U. S. Office of Management and.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
Personal Identity Verification Program
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
1 Federal Identity Management and Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
Director of Product Line Management HID Proprietary & Confidential
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Federal Identity Management
Enterprise PACS Best Practices
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
NIST Computer Security Activities William C. Barker April 2009 U.S. Department of Commerce.
1 Current Status of Japanese Government PKI Systems Yasuo Miyakawa*+, Takashi Kurokawa*, Akihiro Yamamura* and Yasushi Matsumoto+ * National Institute.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
1 Enabling Open Government Using the OIDF/ICF Open Trust Framework OASIS Identity Management 2009 September 29, 2009 Don Thibeau, ED, OpenID Foundation.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
PIV Data Model Testing Ketan Mehta March 3, 2006.
NIH iTrust Peter Alterman/Debbie Bucci National Institutes of Health October 2010.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Federal IT Security Professional - Manager FITSP-M Module 1.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
An Overview of the NIST’s Cyber Security Program Donna F. Dodson Deputy Chief Cyber Advisor October 2009.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Chapter 10: Authentication Guide to Computer Network Security.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
Homeland Security Presidential Directive-12 (HSPD-12)
Biometric Access Control in TWIC Read Hardware and Card Application Specification Roger Roehr.
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
Federal IT Security Professional - Auditor
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
Certificates and FIPS 201 Tim Polk March 3, 2006.
Karyn Higa-Smith, DHS S&T Program Manager, Identity & Privacy Anil John, JHU/APL Technical Lead, DHS S&T IdM Testbed September 29, 2009 OASIS Identity.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
SSAC Report on Domain Name Registration Data Model Jim Galvin.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Design Guidelines Thursday July 26, 2007 Bernard Aboba IETF 69 Chicago, IL.
US Department of State Jay Coplon. My Commitment You will get a sense for how we do C&A You will find value in being here All of your questions will be.
Federal Preparedness Credentialing & Typing. H.R. 1 - Requirement Title IV of the “Implementing Recommendations of the 9/11 Commission Act of 2007” directs.
1 Federal Identity Management Infrastructure and Policy David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide August 15,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
1 NPIVP Workshop March 3, 2006 Red Auditorium, NIST, Gaithersburg PIV Test Guidelines Revisions Dr. R. Chandramouli (Mouli) (Director NPIVP)
Ketan Mehta March 3, 2006 PIV Data Model Testing Ketan Mehta March 3, 2006.
NIST Computer Security Activities
Personal Identity Verification Program
NIST Computer Security Activities
NIST Computer Security Activities
NIST Computer Security Activities
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
E-Authentication: What Technologies Are Effective?
NIST Computer Security Activities
A Quick Tour of the FIPS 201 Revision
Presentation transcript:

1 1 PAIIWG++ Meeting #1 William I. MacGregor National Institute of Standards and Technology 16 Sep 2008

2 2 How PIV is Standardized HSPD 12 (Presidential) FIPS (Secretary of Commerce) 8/04 3/06 SP (NIST) SP (NIST) SP (NIST) SP (NIST) 3/06 8/07 10/05 6/08 1/07 M (Director OMB) SP (NIST) 8/05 10/05 SP A (NIST) SP B (NIST) 4/06 7/06 Test Guidelines Implementation Guidelines Policy Standards Driver Revise ‘08 Dynamic SP (NIST) SP (NIST) 9/06 SP (NIST) 6/07

3 3 What NIST documents overlap PAIIWG++ concerns? The answer depends on the recommendations. Cryptographic Soundness & Card Authentication Key FIPS 201, SP800-73, SP800-78, SP SP (A&B, & test tools), SP800-79, PACS 2.2? PIV Identifier Model FIPS 201, SP800-73, SP , SP SP800-85B, (GSA) BAE, SP800-87? (FPKIPA) CP’s? These are basic, there are probably others!

4 4 Starting Thoughts Replace the FASC-N, replace its two uses: Identifying the credential and cardholder Linking five PIV objects together Leverage existing identifier schemes FASC-N, UEID, IPv6, EUI, OpenID, OID, UUID,… Utilize familiar, standard representations E.g., ASN.1 with BER-TLV encoding Allow fixed & variable length identifiers Fixed: FASC-N, IPv6; Variable: OpenID, OID

5 5 An Identity Domain Registry? A Registry is a published, numbered list of entries. If each entry names an Identity Domain, then… …(entryNumber, domainIdentifier) is unique. Example: ( , ) If the Domains are large (e.g., “IPv6”, “OpenID”), the registry will be small & change infrequently. Each entry includes its governing authority.