Top Banner
E-Authentication: Creating an Environment of Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy The E-Authentication Initiative
21

The E-Authentication Initiative

Dec 30, 2015

Download

Documents

The E-Authentication Initiative. E-Authentication: Creating an Environment of Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy. Session Objectives. Identity Federation Basics Why the Federal Government is federating - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: The E-Authentication Initiative

E-Authentication: Creating an Environment of Trust

David Temoshok Director, Identity Policy and Management

GSA Office of Governmentwide Policy

The E-Authentication Initiative

Page 2: The E-Authentication Initiative

2The E-Authentication Initiative

Session Objectives

Identity Federation Basics

Why the Federal Government is federating

Key infrastructure needed for ID Federation

Interoperability and ID Federation

E-Authentication Trust Framework

The Electronic Authentication Partnership and how it facilitates identity federation

Page 3: The E-Authentication Initiative

3The E-Authentication Initiative

The Identity Problem

Individuals have multiple disconnected identities across the internet and other networks, leading to repeated, stand-alone authentications

Costly, insecure, inconvenient

www.401k.comUser ID: 123-45-6789Password: my401k

My.employer.orgUser ID: [email protected]: myjob

www.mytravel.comUser ID: frequentflyerPassword: etravel

Page 4: The E-Authentication Initiative

4The E-Authentication Initiative

Background

Federated identity definition Rules, agreements, standards, technologies that make identity and

entitlements portable across autonomous domains Is critical for rich web services environment

Federated identity technologies and standards PKI – ISO X.509v3 Security Assertion Markup Language – OASIS SAML 1.0, 1.1. 2.0 Lacking standards

• Biometrics• User ID/PIN/Password• Knowledge-based authentication• One-time passwords• Token-based authentication

Federated identity specifications (SAML) Liberty Alliance Shibboleth

Page 5: The E-Authentication Initiative

5The E-Authentication Initiative

Standards Convergence

SAML 1.X - Framework for exchanging security information about a principal: authentication, attributes, authorization information

Liberty ID-FF 1.X – Extend SAML 1.0, 1.1 for federation, SSO, web services

ShibbolethSpecification

LibertySpecifications

OASIS SAML 1.0, 1.1

OASIS Standard SAML 2.0

Page 6: The E-Authentication Initiative

6The E-Authentication Initiative

Factor Token

Very High

High

Medium

Low

Employee Screening for a High Risk Job

Obtaining Govt. Benefits

Applying for a Loan

Online

Access to Protected

Website

PIN/User ID-

Knowledge

Strong Password

-Based

PKI/ Digital Signature

Multi-

Incre

ase

d $

Cost

Increased Need for Identity Assurance

Four Authentication Assurance Levelsto meet multiple risk levels -

Page 7: The E-Authentication Initiative

7The E-Authentication Initiative

President’s Management Agenda

• 1st Priority: Make Government citizen-centered.

• 5 Key Government-wide Initiatives: Strategic Management of Human Capital Competitive Sourcing Improved Financial performance Expanded Electronic Government Budget and Performance Integration

Page 8: The E-Authentication Initiative

8The E-Authentication Initiative

Government to Govt. Internal Effectiveness and Efficiency1. e-Vital (business case) 2. Grants.gov3. Disaster Assistance and Crisis Response4. Geospatial Information One Stop 5. Wireless Networks

1. e-Training 2. Recruitment One Stop3. Enterprise HR Integration 4. e-Travel 5. e-Clearance6. e-Payroll7. Integrated Acquisition8. e-Records Management

PMC E-Gov Agenda

OPMOPMOPMGSAOPMOPMGSANARA

LeadSSAHHS

FEMA

DOI

FEMA

Lead

GSATreasuryDoEDDOILabor

Government to Business1. Federal Asset Sales2. Online Rulemaking Management 3. Simplified and Unified Tax and Wage Reporting4. Consolidated Health Informatics (business case)5. Business Gateway6. Int’l Trade Process Streamlining

Lead GSAEPA

Treasury

HHS

SBADOC

Cross-cutting Infrastructure: eAuthentication GSA

Government to Citizen1. USA Service 2. EZ Tax Filing 3. Online Access for Loans 4. Recreation One Stop5. Eligibility Assistance Online

Page 9: The E-Authentication Initiative

9The E-Authentication Initiative

Key Policy Points

For Governmentwide deployment:

No National ID.

No National unique identifier.

No central registry of personal information, attributes, or authorization privileges.

Different authentication assurance levels are needed for different types of transactions.

And for e-Authentication technical approach:

No single proprietary solution

Deploy multiple COTS products -- users choice

Products must interoperate together

Controls must protect privacy of personal information.

Page 10: The E-Authentication Initiative

10The E-Authentication Initiative

GovernmentsFederal

States/LocalInternational

Higher EducationUniversities

Higher EducationPKI Bridge

HealthcareAmerican Medical Association

Patient Safetty Institute

Travel Industry AirlinesHotels

Car RentalTrusted Traveler Programs

Central Issue with Federated Identity – Who do you Trust?

E-Commerce Industry ISPs

Internet AccountsCredit Bureaus

eBay

Trust Network

Financial Services IndustryHome Banking

Credit/Debit Cards

Absent a National ID and unique National Identifier, the e-Authentication initiative will establish trusted credentials/providers at determined assurance levels.

280 Million AmericansMillions of BusinessesState/local/global Govts

Page 11: The E-Authentication Initiative

11The E-Authentication Initiative

Identity Federation – Key Interoperability Needs

Federation Communications(Technical Interoperability)

Federation Business Relationships(Business Interoperability)

Federation Trust(Policy Interoperability)

Identity Federations extend beyond current peer-peer, bi-lateral agreements to buildcommon infrastructure sharedamong multiple parties.

Page 12: The E-Authentication Initiative

12The E-Authentication Initiative

Federation Infrastructure

• Interoperable Technology (Communications) Determine intra-Federation communication architecture -- protocols Administer common interface specifications, use cases, profiles Ensure interoperability ( as needed) according to the specifications Provide a common portal service (I.e., discovery and interaction services)

• Trust Establish common trust model Administer common identity management/authentication policies for

Federation members

• Business Relationships Establish and administer common business rules Manage relations among relying parties and CSPs Manage compliance/dispute resolution

Page 13: The E-Authentication Initiative

13The E-Authentication Initiative

The Need for Federated Identity Trust and Business Models

Technical issues for sharing identities are being solved, but slowly Federal Interoperability Lab OASIS and Liberty conformance test programs

Trust is critical issue for deployment of federated identity Federated ID networks have strong need for trust assurance standards

• How robust are the identity verification procedures?• How strong is this shared identity? • How secure is the infrastructure?

Common business rules are needed for federated identity to scale N2 bi-lateral trust relationships is not a scalable business process Common business rules are needed to define:

• Trust assurance and credential strength• Roles, responsibilities, of IDPs and relying parties• Liabilities associated with use of 3rd party credentials• Business relationship costs• Privacy requirements for handling Personally Identifiable Information (PII)

Page 14: The E-Authentication Initiative

14The E-Authentication Initiative

E-Authentication Trust Model for Federated Identity

3. Establish technical standards for e-Authentication systems (NIST Special Pub 800-63 Authentication Technical Guidance

1. Establish e-Authenticationrisk and assurance levels (OMB M-04-04 Federal Policy Notice, adopted by EAP

4. Establish methodology for evaluating credentials/providers on assurance criteria (EAP SAC and Federal CAF

2. Establish standard methodology for e-Authentication riskassessment (ERA) 2/04

5. Assess CSPs and maintain trust list of trusted CSPs for govt-wide (and private sector) use 2/04

6. Establish common business rules for use of trusted 3rd-party credentials

7. Test products and implementations for interoperability

Page 15: The E-Authentication Initiative

15The E-Authentication Initiative

The Need for Identity Federation Business Case

However, there must be a clear business case that others can understand

Business opportunity must be meaningful yet realistic Business partners need to understand the business case

The solution must be replicable Start simple, use standard templates, avoid complexity for complexity sake Leverage open standards

Should be clear business case for identity federation for: Financial services industry Health care industry Higher education

“Federated identity is economically inevitable…”Burton Group

Page 16: The E-Authentication Initiative

16The E-Authentication Initiative

Identity Federation Models

Bi-lateral (peer-to- peer)

Hub & Spoke (unilateral)

Circle of Trust (many-to-many)

ID

ID

ID

ID

ID

ID

ID

ID

ID

Page 17: The E-Authentication Initiative

17The E-Authentication Initiative

The Need for the Electronic Authentication PartnershipThe Need for the Electronic Authentication Partnership

State/Local Governments

Industry

Policy• Authentication

• Assurance levels

• Credential Profiles

• Accreditation

• Business Rules

• Privacy Principles

Technology• Adopted schemes

• Common specs

• User Interfaces

• APIs

• Interoperable

COTS products

• Authz support

Federal Government Commercial Trust Assurance Services

Policy, Technical, & Business Interoperability

Common Business and Operating Rules

IDP

IDP

IDP

IDP

RP RP

RP

http://www.eapartnership.org/

Interoperability for:

Page 18: The E-Authentication Initiative

18The E-Authentication Initiative

What is the EAP

• Multi-industry partnership creating a framework for interoperable, trustworthy authentication

Incorporated non-profit association with 60 members Product and technology agnostic

• Goals Provide organizations with a straightforward means of relying on digital

credentials issued by a variety of authentication systems Eliminate or at least reduce the need for organizations to establish

bilateral agreements Facilitate the creation of federations through replicable rules Enable federation-to-federation trust

• In practice this means a federated approach

Page 19: The E-Authentication Initiative

19The E-Authentication Initiative

What the EAP is doing now for ID Federation

Current State of Industry: Bi-Lateral Pairs

IDP

IDP

IDP

SP/RP

SP/RP

SP/RP

Bi-lateral Agreements

Pair-wise Trust Model

Pair-wise Interface Spec and Products

EAP Objective: Multi-Party, Interoperable Federation

IDP

IDP

IDP

IDP

SP/RP SP/RP

SP/RP

Common Business Rules/AgreementsCommon Trust ModelCommon Interface SpecificationInteroperable Products

Page 20: The E-Authentication Initiative

20The E-Authentication Initiative

What the EAP envisions for ID Federation

IDP

IDP

IDP IDP

IDP

IDP

IDP

IDP

IDP

IDP

SP/RP

SP/RP

SP/RP

SP/RP SP/RP

SP/RP

SP/RP

SP/RP

SP/RP

SP/RP

SP/RPEAP Vision:

Multiple, Interoperable Federations

EAPCommon Business Rules/AgreementsCommon Trust ModelsCommon Basic Interface SpecificationsInteroperable Products

Federation 1

Federation 2

Federation 3

Page 21: The E-Authentication Initiative

21The E-Authentication Initiative

For More Information

Phone E-mail David Temoshok 202-208-7655 [email protected]

Websiteshttp://cio.gov/eauthenticationhttp://www.eapartnership.org/

http://cio.gov/fpkipahttp://cio.gov/ficc