Presentation is loading. Please wait.

Presentation is loading. Please wait.

E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.

Similar presentations


Presentation on theme: "E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session."— Presentation transcript:

1 E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session

2 2 E-Authentication – Technical Approach Agenda –E-Authentication Overview Policy Framework –Technical Approach –Interoperability Lab

3 3 3. Establish technical assurance standards for e-credentials and credential providers (NIST Special Pub 800-63 Authentication Technical Guidance) 1. Establish e-Authentication risk and assurance levels for Governmentwide use (OMB M-04-04 Federal Policy Notice 12/16/03) 4. Establish methodology for evaluating credentials/providers on assurance criteria (Credential Assessment Framework) 2. Establish standard methodology for e-Authentication risk assessment (ERA) 5. Establish trust list of trusted credential providers for govt-wide (and private sector) use 6. Establish common business rules for use of trusted 3rd-party credentials Policy Infrastructure:

4 4 OMB 04-04 Assurance Level Impact Profiles Potential Impact Categories for Authentication Errors 1234 Inconvenience, distress or damage to standing or reputation LowMod High Financial loss or agency liabilityLowMod High Harm to agency programs or public interestsN/ALowModHigh Unauthorized release of sensitive informationN/ALowModHigh Personal SafetyN/A LowMod High Civil or criminal violationsN/ALowModHigh

5 5 Assurance Level Allowed Token Types1234 Hard crypto token  Soft crypto token  Zero knowledge password  One-time Password Device  Strong password  PIN  NIST SP 800-63

6 6 E-Authentication – Technical Approach Agenda –E-Authentication Overview –Technical Approach Assertion Based Authentication Certificate Based Authentication –Interoperability Lab

7 7 E-Authentication – Technical Approach Agenda –E-Authentication Overview –Technical Approach Assertion Based Authentication –Overview –Management –SAML (Security Assertion Markup Language)as an Adopted Scheme Certificate Based Authentication –Interoperability Lab

8 8 AAs CSs Base Case

9 9 Starting at the AA

10 10 CSP ID Step #3: After Selecting their AA the user is redirected back to the CS as usual Starting at the CS

11 11 Step #2: The user is Redirected to the portal With the CS and AA IDs Step #3: The user is cookied and redirected to the CS Specialized Portals

12 12 E-Authentication – Technical Approach Agenda –E-Authentication Overview –Technical Approach Assertion Based Authentication –Overview –Management –SAML as an Adopted Scheme Certificate Based Authentication –Interoperability Lab

13 13 Assess COTS Interoperability Evaluate new Scheme against requirements Pilot Migrate, Translate, or Both. Adopt Scheme Adoption Lifecycle Start Emerging Technology

14 14 Scheme Translator Scheme Translator

15 15 E-Authentication – Technical Approach Agenda –E-Authentication Overview –Technical Approach Assertion Based Authentication –Overview –Management –SAML as an Adopted Scheme Certificate Based Authentication –Interoperability Lab

16 16 SAML 1.0 Artifact Profile Base Case

17 17 SAML 1.0 Artifact Profile Single Sign-On

18 18 SAML 1.0 Artifact Profile Governance

19 19 E-Authentication – Technical Approach Agenda –E-Authentication Overview –Technical Approach Assertion Based Authentication Certificate Based Authentication –Interoperability Lab

20 20 Step #1: User goes to Portal to select the AA and the CS Validation Service

21 21 Step #1: User goes to Portal to select the AA and the CS Local Validation

22 22 Step #4: The ST uses the validation service to validate the certificate Scheme Translator Certificates At Lower Assurance Applications

23 23 E-Authentication – Technical Approach Agenda –E-Authentication Overview –Technical Approach –Interoperability Lab Product Testing Technical Support CS / AA Testing

24 24 AAs CSs COTS (Commercial Off The Shelf) Product Testing –Scheme compliance –Interoperability

25 25 Assess COTS Interoperability Evaluate new Scheme against requirements Pilot Migrate, Translate, or Both. Adopt Scheme Adoption Lifecycle Start Product Testing –See List of Approved Vendors

26 26 COTS Product Testing –Certificate Validation

27 27 E-Authentication Architecture Evolution Architecture Working Group Evaluating Evolving Standards Scheme Translators

28 28 E-Authentication Interoperability Lab Technical Support –Interoperability Testing –SAML Conformance Testing –Acceptance Testing –Approved Product List –Cookbook / Recipes Extensive Experience in All These Areas

29 29 E-Authentication – Technical Approach Agenda –E-Authentication Overview –Technical Approach –Interoperability Lab

30 30 Resources http://www.cio.gov/eauthentication interoplab@enspier.com Additional Contacts Chris Louden - 703-299-3444 Chris.louden@enspier.com Andrew Chiu - 703-299-3444 Andrew.chiu@enspier.com Steve Lazerowich - 703-299-3444 Steve.lazerowich@enspier.com David Simonetti - 410-356-2260 David.simonetti@enspier.com

31 31 Contact Information I appreciate your feedback and comments. I can be reached at: Scott Lowry scott@enspier.com 202-236-8221


Download ppt "E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session."

Similar presentations


Ads by Google