E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

NRL Security Architecture: A Web Services-Based Solution
The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
Realize the Power of Information 1 Jennifer Dillon, Manager, Industry Relations WELCOME New Members & Affiliates IJIS Institute 2009 Winter Industry Briefing.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
E  Authentication Federation The enabler of Electronic Government! presented to AIPC by Stephen A. Timchak June 12, 2005 The E-Authentication Federation.
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
A User-centric, Anonymous and Interoperable pan-European eID Pavel Sekanina September 13th, 2006.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
1 E-Authentication The E-Authentication/Grants Demonstration.
Federating Identity Management in the Government of Canada Identity North Conference November 20 th 2012 Presented by: Rita Whittle Senior Director, Cyber.
Information Sharing Puzzle: Next Steps Chris Rogers California Department of Justice April 28, 2005.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
U.S. Department of Agriculture eGovernment Program December 3, 2003 eAuthentication Initiative USDA eAuthentication Service Overview eGovernment Program.
Transforming the Business of Government Through Shared Services JOHN SINDELAR Deputy Associate Administrator United States General Services Administration.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
The InCommon Federation The U.S. Access and Identity Management Federation
Reform and change in Australian VTE and implications for VTE research and researchers By Aurora Andruska 20 April 2006.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Authentication: The Need for Public and Private Sector Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Presented by Name, Title, Organization Phone Number: (xxx) INDIANA YOUTH WORKER CORE COMPETENCIES.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Improving Integration of Learning and Management Systems Paul Shoesmith Director of Technical Strategy Becta.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
Federated Authentication at NIH: Trusting External Credentials at Known Levels of Assurance Debbie Bucci and Peter Alterman November, 2009.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS PLUG-IN B19 Global Information Systems.
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
The Feds and Shibboleth Peter Alterman, Ph.D. Asst. CIO, E-Authentication National Institutes of Health.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
Promoting excellence in social security Building on sector wide commonalities to enhance the benefits of Information.
The pillars of E-government Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public Service for ICT Sint-Pieterssteenweg.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Interoperable Trust Networks Chris Rogers California Dept of Justice February 16, 2005.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
1 How Serious Are Financial Institutions About Electronic Identity? -- for -- Educause Policy 2005 Conference Jim Gross Wells Fargo April 7, 2005.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
U.S. Department of Agriculture eGovernment Program Smart Choice Pre-Select Phase Transition September 2002.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
1 David C. Kibbe, MD MBA DirectTrust Collaborating to Build the Security and Trust Framework for Direct Exchange June 20, 2013.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
The E-Authentication Federation
Transforming the Business of Government Through Shared Services JOHN SINDELAR Deputy Associate Administrator United States General Services Administration.
U.S. Federal e-Authentication Initiative
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
The E-Authentication Initiative
HIMSS National Conference New Orleans Convention Center
The E-Authentication Initiative
Partnership: Making Common Cause in a Common Effort
Presentation transcript:

E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative

2 The Challenge  All agencies grappling with online Identity Management issues  “Silo-ed” applications and disconnected security policies causing proliferation of online identity credentials for federal employees, businesses, and consumers  Best practices increasingly dictating holistic or enterprise approach to solving online Identity Management challenge The Answer A single solution that enables a more uniform application of electronic authentication across the Federal Enterprise

3 The E  Authentication Initiative E-Authentication Mission  Enable millions of safe, secure, trusted online transactions between Government and the citizens and businesses that it serves  Reduce online identity management / credentialing burden for government agency application owners and system administrators  Provide citizens and businesses with a choice of credentials when accessing public-facing online government agency applications E-Authentication Strategy  Build the E-Authentication Federation, wherein government agencies can rely on electronic identity credentials – such as PINS/ /user IDs/passwords – issued and managed by other organizations within and outside the federal government

4 The E  Authentication Initiative E-Authentication Federation  The set of government agency applications and credential service providers (CSPs) that have agreed to adopt a set of agreements, standards, and technologies to make identity portable across multiple domains Credential service providers are those organizations – both government and commercial – approved by E-Authentication to issue trusted online identity credentials, such as PINS/User IDs/Passwords/PKI certificates, upon which other Federation members can rely to grant access to online systems

5 The E  Authentication Initiative Building the E-Authentication Federation Business & Operating Rules Operational Infrastructure Agency Applications/ Credential Service Providers Policy Technical Standards Completed FY 2004 Scheduled for completion Q1-3 FY ‘05 Scheduled for Federation membership Q4 FY ’05 and beyond

6 The E  Authentication Initiative Architecture Driven by Interoperability and Standards  The architecture is based on industry best-practices: Open standards-based, federated identity management Security Assertion Markup Language (SAML) 1.0 in place now, SAML 2.0 support planned Liberty Alliance and WS-Federation support is also planned  Architecture supported by interoperable products: 9 products on Approved E-Authentication Technology Providers List – meaning all have demonstrated interoperability using SAML 1.0 artifact profile  First-of-its-kind Interoperability Lab supports: Product testing Technical support CSP and Agency Application testing

7 The E  Authentication Initiative Credential Service Providers are Committed  Key Federal CSPs are on board Employee Express USDA NSF FastLane  Targeted key vertical markets as potential credential service providers – Financial institutions initial focus Partnering with Financial Services Technology Consortium (FSTC) 7 of top 10 financial organizations at the table  Other verticals beyond Federal sector State & local government – outreach underway Healthcare – outreach in early ’06 (Safe Initiative/Pharma) Higher Education – outreach in early ‘06

8 The E  Authentication Initiative Credential Service Providers are Committed  Why we targeted Financial Institutions first: Authentication lies at the core of existing financial services products Know-your-customer (KYC) required by law Financial institutions own 3 powerful assets: Trust 90+% of the US population has banking relationship & 53M have bank- issued credentials (Pew) Strongly authenticated identities Law requires more than KYC – it requires that customers’ identities be protected

9 The E  Authentication Initiative E-Authentication Validated by Independent Report  Burton Group, a respected IT research and advisory services firm, reports that E- Authentication: Aligns with industry best practices Provides flexible and pragmatic common approach to authentication Efforts should continue and expand, with fine tuning “The E-Authentication Initiative’s goals are achievable. The anticipated benefits are real and far-reaching, and extend to end-users, governmental organizations, and commercial businesses alike. The E- Authentication Initiative is well- defined, flexible, technically sound, and employs industry best practices.” Burton Group Report on the Federal E- Authentication Initiative, 8/30/04

10 The E  Authentication Initiative Use of Federated Identity is Growing  According to Burton Group, more than 300 businesses deploying SAML-based federations this year Boeing Airline mechanics and ground service personnel General Motors 500,000 employees, customers and trading partners Fidelity Investments Employees and plan administrators from over 11,000 companies SAFE-BioPharma Major pharmaceutical research firms and regulators

11 The E  Authentication Initiative For More Information Phone Steve Timchak Project Executive Georgia Marsh Deputy Program Manager Brian Communications Director Websites