Presentation is loading. Please wait.

Presentation is loading. Please wait.

The E-Authentication Initiative

Similar presentations


Presentation on theme: "The E-Authentication Initiative"— Presentation transcript:

1 The E-Authentication Initiative
Executive Briefing Wrap-up Steve Timchak, GSA E-Authentication Program Manager “Getting to Green with E-Authentication” February 3, 2004 Executive Session

2 Policy Management Credentials Technology Applications
The E-Authentication Initiative E-Authentication: The Service Components Policy Administration & Management Credentials Technology Applications 2

3 The ground-rules are defined:
The E-Authentication Initiative E-Authentication: Where we stand Policy The ground-rules are defined: E-Authentication Guidance for Federal Agencies released Draft NIST Recommendation for Electronic Authentication available for public comment Federal Identity Credentialing Policy on schedule for June delivery 3

4 Tools are in place: Administration & Management
The E-Authentication Initiative Administration & Management E-Authentication: Where we stand Tools are in place: Adding to our team to ensure we can deliver the authentication expertise agencies need Financial modeling underway to determine the best way to deliver services that represent real savings to agencies 4

5 You’re the reason we’re here:
The E-Authentication Initiative E-Authentication: Where we stand You’re the reason we’re here: e-RA available online for all Initiatives to use Application Managers in place to deliver E-Authentication services to agencies Pilot application procedure in development to present opportunities to align with E-Authentication – and get funding! Applications 5

6 Federation is the way: E-Authentication: Where we stand
The E-Authentication Initiative E-Authentication: Where we stand Federation is the way: Using SAML 1.0 today Adaptable as other standards -- Liberty Alliance, WS* -- mature Interoperability Lab will test products for inclusion on approved technology providers list As the list of approved providers grows, so do agencies’ options! Technology 6

7 The key that turns the ignition:
The E-Authentication Initiative E-Authentication: Where we stand The key that turns the ignition: Ability to use of existing 3rd party credentials is the goal CAF is in place and being used to vet CSPs against relevant guidance Initial list of trusted CSPs (E-Authentication Trust List) is available on E-Auth Web site Credentials 7

8 E-Authentication Needs You!
The E-Authentication Initiative E-Authentication Needs You! 8


Download ppt "The E-Authentication Initiative"

Similar presentations


Ads by Google