May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

3SKey 3SKey.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Identity Management at the University of Florida Mike Conlon, Director of Data Infrastructure University of Florida, Gainesville, Florida Background Identity.
A Public Web Services Security Framework Based on Current and Future Usage Scenarios J.Thelin, Chief Architect PJ.Murray, Product Manager Cape Clear Software.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Federated Identity and Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 15, 2013
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Strong Authentication Project CD/DCD/Computer Security Team Fermi National Accelerator Laboratory Mark Kaletka Matt Crawford.
Lecture 23 Internet Authentication Applications
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Information Security Policies and Standards
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
Chapter 10: Analyzing Systems Using Data Dictionaries Instructor: Paul K Chen.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Enterprise Portal Authentication: who are you? Authorization: what are you permitted to do? Personalization: the web pages you see are dynamically created.
Automated Policy Enforcement Adam Vincent, Layer 7 Federal Technical Director
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
System Architecture University of Maryland David Henry Office of Information Technology December 6, 2002.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
Web services security I
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Website Hardening HUIT IT Security | Sep
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Identity Management Report By Jean Carreon and Marlon Gonzales.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Research at MSEC Vincent Naessens – Jorn Lapon – Jan Vossaert – Koen Decroix – Faysal Boukayoua – Laurens Lemaire.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
PubCookie Strategy and Tactics Mike Conlon Director of Data Infrastructure University of Florida.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Engineering Essential Characteristics Security Engineering Process Overview.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
John Douglass, Developer Ron Hutchins, Dir. Engineering Herbert Baines, Dir. InfoSec.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Internet2 Base CAMP Topics in Middleware: Authentication.
IS3220 Information Technology Infrastructure Security
Chapter 13: Managing Identity and Authentication.
Mary Trauner Senior Research Scientist Georgia Institute of Technology Middleware for Video.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
New Developments in Central Directory Service and Account Provisioning Dan Menicucci Enterprise Architect - University of Pittsburgh.
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Cryptography and Network Security
Proposal to Create IAM Working Group
A Case Study: WI DOJ Wisconsin Digital Government Summit 2007 November 28 Presentation Shared Service Models and Architectures.
Identity & Access Management
Identity Management at the University of Florida
Presentation transcript:

May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current Campus Authentication Methodologies Authentication Advanced Technology Project Briefly Discuss UC Davis Interest in Middleware and Authentication

May 22, 2002 UC Davis Security Architecture

May 22, 2002 UC Davis Security Architecture Prevention: Proactive and reactive information security policies, standards, procedures, guidelines, tools, security awareness programs and authentication and authorization methodologies Assurance: Tools and strategies to evaluate and maintain an effective information security program, such as security vulnerability assessments Detection and Investigation: The timely detection, investigation, tracking and management reporting of information security breaches Recovery: Tools and practices to develop and implement timely recovery from information security breaches, including loss of service availability and/or integrity.

May 22, 2002 Current Common Authentication Methodologies CyberSafe Kerberos Avoids Transmittal of Clear Text Password Supports Distributed Authentication User Authentication from a Web Browser Integrated into: –MyUCDavis Portal Authentication –Central Wireless Services –Web Content for Campus-Affiliated Users Hardware Tokens Two-factor Authentication One-time Passwords

May 22, 2002 Campus Plans to Reduce Reliance on Hardware Tokens Issue: How Do We Strengthen the Security of Authentication Systems Relying on Reusable Passwords? Insecure Applications Password Format Password Aging Dictionary Checks Upon Selection LDAP Queries Last Used Information Source IP Address Account Lockouts Login Banners Authorization vs. Authentication

May 22, 2002 Authentication Advanced Technology Project Identify Strategic Authentication Requirements Review Existing Authentication Services Review Authentication Alternatives Functionality and Usability Scalability Security Provide Strategic Recommendations that Meet Campus Common Authentication Needs and Consistent with NBA Vision for Single-Signon

May 22, 2002 Middleware and Authentication Authentication is A Key Infrastructure Service Shared by Applications and Users Requires Identity Assertion and Identity Credential Verification Requires Enterprise Directory for Identity Attributes PKI is Important for Middleware Security Services Digital Credentials and Digital Signatures Supports Non-Repudiation Elements Supports Federated Authentication Model