SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
9 July 2013
Daon TrustX Pilot
C. Tilton
Work described in this presentation was supported by the National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program
Office and the National Institute of Standards and Technology (NIST).
The views in this presentation do not necessarily reflect the official policies of the NIST or NSTIC, nor does mention by trade names,
commercial practices, or organizations imply endorsement by the U.S. Government.
Agenda
2
Overview
Functional elements
Use cases
Progress
Lessons learned
Next steps
Learn more
Our Team
3
What are we investigating?
4
Suitability of strong, mobile-based authentication technology
(including biometrics) for online authentication
Willingness of RPs to move to external identity/credential
providers and how this fits within their business models
Acceptance of subscribers
Capability of existing trust frameworks (& certification schemes)
to support these scenarios & technology
Degree of interoperability achievable
Our Pilot Elements
5
Identity is …
6
A unique risk-based, multi-factor authentication capability
that leverages latest generation smart phones (e.g., iPhone,
Blackberry, Android), smart tablets (e.g., iPad/Playbook) and
traditional mobile devices
Identity technology combines multiple authentication
techniques for greatest identity confidence:
• Device (What you have)
• PKI Certificate (What you have)
• PIN/PW (What you know)
• Face (Who you are)
Placing biometric levels of identity assurance in the hands of
consumers
Designed to run both as an in-app framework and out-of-
band authentication product
• Voice (Who you are)
• Palm (Who you are)
• GPS (Where you are/context)
• OOB OTP (What you have)
• (other as devices enabled)
Technology - Identity
7
Relying Party Application
Authentication Server
(Identity Provider)
Subscriber (User) Authentication
Platform
Request
Transaction
Request
Authentication
Authentication
Challenge(s)
Authentication
Response
Authentication
Package
Authentication
Results
Access
Decision
Trust is …
8
An Identity Provider (IDP) for delivering highly secure
authentication services to businesses and consumers
A multi-tenant service hosting multiple applications from different
Relying Parties
Based on Identity authentication.
Trust Frameworks –
NSTIC Alignment
9
Migrating our TrustX IDP to work
within multiple trust frameworks
Provides CHOICE to subscribers and
Relying Parties
Operate within a multiple IDP
environment
Will assess existing trust frameworks
to support:
• Risk-based multi-factor/multi-method
• Trust elevation
• Biometrics
• Equivalence
Research – Purdue University
10
Biometric Standards, Performance & Assurance Laboratory (BSPA)
Center for Education and Research in Information Assurance and
Security (CERIAS)
Practical research
• Offline - Laboratory
• Online – Analyzing data from the operational pilots
Areas
• Usability
• Accessibility
• Privacy
• Security
• Performance
• User acceptance
Operational Pilots
11
NSTIC & Trust
Framework
Standards
IDP
RP1
RP2
RP5
Subscribers
Operational Pilots
Data/Metrics
Data Collection
& Analysis
(inline)
Gap
Analysis
Purdue
Labs
(offline)
RP3
RP4
Steps to get there
12
Extend the technology to fit within federated environment and meet
certification criteria
• Involves requirements analysis & trade-offs
• Supported by research assessments
• Identify gaps in existing TF standards along the way
Stand up the enhanced IDP/CSP
Integrate RP applications
• Work with RPs on pilot plans (use cases, populations, approaches,
schedule, etc.)
Work through Trust Framework certification and back fit RP integrations
to align
• Work with assessors and consultants
Collect and analyze metrics to evaluate progress, success
Work with other pilots to identify opportunities to work together
Proprietary and Confidential
Use Cases
13
General use case:
• Relying party has an existing relationship with a set of subscribers
(customers, members, partners, staff, etc.)
• RP wants a strong authentication solution (credential) for its higher
assurance applications/transactions
– RP maps its transactions to a set of authentication methods (low to high)
• RP is willing to use (try using) an external service
– RP may operate within a trust framework/federation
• In general, the RP performs its own identity proofing and holds identity
data, which is bound to the strong credential
– However some RPs may desire to also utilize 3rd party identity proofing,
particularly for new subscribers
• RPs sponsor a subscriber for a TrustX credential; however once
issued, this credential may be bound to multiple RPs
• Subscriber uses their credential in lieu of passwords
Use cases
14
Relying
Party
Use Case
Pilot
Population
Potential
Base
Notes
AAAE Member
portal
access
AAAE
members.
5000 Ability to pilot different subsets of
population with different access
concerns
AARP Premium
Services
Members 40M Focus likely to be more on
usability than security
Purdue Hotseat* Students/
Faculty
85K Year 2 pilot
Hotseat is a collaborative
classroom tool
Major
Bank
On-line and
mobile
banking
Bank
customers
50M Year 2 pilot
PayPal eCommerce Under NDA TBD M Year 2 pilot
*Tentative
Demonstration
15
Video
16
http://www.youtube.com/watch?v=hOj0PvL234M
Addressing Guiding Principles
Principle Affirm Investigate/Enhance
Privacy enhancing
& voluntary
• No PII stored on phone.
• Authentication proportional
to transaction risk level.
• Opt-in pilots.
• Assess privacy
• Investigate PETs
Secure & resilient • Strong multifactor
authentication
• Server security assessment
• High availability configuration
• Assess security, recommend
improvements
• Evaluate performance
Interoperable • Supports multiple methods,
hosted on multiple devices
• Biometric independent
• Integrate with multiple trust
frameworks
• Demonstrate across multiple RPs
Cost effective &
easy to use
• Use of existing mobile device
is convenient and cost
effective
• RP/user choice of methods
• Assess usability, accessibility,
and user acceptance
17Proprietary and Confidential
Sep Oct
Year 1 Year 2
Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep
Implement SAML2/OpenID Connect
Mobile Biometrics Assessment
Gap Analysis
Privacy & Security Assessment
IdentityX and TrustX NSTIC Alignment
Major Bank
AAAE
Collect and analyze data from pilots
Operational Pilots
Trust Framework Integration
Research
IDX Alignment with NSTIC
Legend
Certification
Certification Preparation
Human Subject Research Approval
Oct MayNov Dec Jan Feb Mar Apr Jun Jul Aug Sep Oct MayNov Dec Jan Feb Mar Apr Jun Jul Aug Sep
Audit
Cross-RP Interoperability Demonstration
AARP
Purdue
PayPal
Accomplishments
to date
19
AAAE Pilot launched & operating
SAML & OpenIDConnect prototypes
TrustX product enhancement requirements and design completed
TrustX infrastructure and baseline capability deployed
Research protocol established
Kantara initial application for approval accepted
Lessons Learned
(issues we’ve encountered)
20
RPs are generally conservative and not willing to go from 0-60 in 3
seconds.
Many RPs do not desire a “full function” IDP, but only a CSP
They already hold identity data and don’t need/want 3rd party involvement
Do want to use 3rd party credentials, however.
Existing Trust Frameworks/Certification schemes only recognize “full
IDPs”
Marketplace moving towards componentized offerings and “decoupled”
model
Tricky bit is binding operation / maintaining chain of trust
Gaps exist related to dynamic, risk-based, multifactor and biometrics
Methods do not exist for assessing equivalency of token types
800-63 is prescriptive in this area, but for a limited set of token
implementations
Near term milestones
21
Begin AARP integration
Begin laboratory testing
Complete first round of security & privacy assessments
Initial gap analysis complete
IdentityX Trust Framework Server (ITFS) Release 1.0
Develop & coordinate OpenID Connect profile
Learn More
22
Daon Pilot POC:
Cathy Tilton, cathy.tilton@daon.com, 703-472-5546
Interested Relying Parties
Jim Williams, jim.williams@daon.com, 202-465-5150
TrustX website
www.trustx.com

Contenu connexe

Similaire à CIS13: NSTIC Update and Reports from Pilots

Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
Open Reputation Management Systems
Open Reputation Management SystemsOpen Reputation Management Systems
Open Reputation Management SystemsAbbie Barbir
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudHappiest Minds Technologies
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015Credential Engine
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeElasticsearch
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyJeff Green
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Jim Kaplan CIA CFE
 
Edugate Futures
Edugate FuturesEdugate Futures
Edugate FuturesHEAnet
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...Edge AI and Vision Alliance
 
Technical Requirements of the UK Access Management Federation
Technical Requirements of the UK Access Management FederationTechnical Requirements of the UK Access Management Federation
Technical Requirements of the UK Access Management FederationJISC.AM
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)Peter Bihr
 

Similaire à CIS13: NSTIC Update and Reports from Pilots (20)

Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Open Reputation Management Systems
Open Reputation Management SystemsOpen Reputation Management Systems
Open Reputation Management Systems
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Unc charlotte prezo2016
Unc charlotte prezo2016Unc charlotte prezo2016
Unc charlotte prezo2016
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Test_Engineer
Test_EngineerTest_Engineer
Test_Engineer
 
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment Securely
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
 
Edugate Futures
Edugate FuturesEdugate Futures
Edugate Futures
 
Embedding Security in IT Projects
Embedding Security in IT ProjectsEmbedding Security in IT Projects
Embedding Security in IT Projects
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
Test Engineer
Test  EngineerTest  Engineer
Test Engineer
 
Technical Requirements of the UK Access Management Federation
Technical Requirements of the UK Access Management FederationTechnical Requirements of the UK Access Management Federation
Technical Requirements of the UK Access Management Federation
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 

Plus de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Plus de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

CIS13: NSTIC Update and Reports from Pilots

  • 1. 9 July 2013 Daon TrustX Pilot C. Tilton Work described in this presentation was supported by the National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program Office and the National Institute of Standards and Technology (NIST). The views in this presentation do not necessarily reflect the official policies of the NIST or NSTIC, nor does mention by trade names, commercial practices, or organizations imply endorsement by the U.S. Government.
  • 4. What are we investigating? 4 Suitability of strong, mobile-based authentication technology (including biometrics) for online authentication Willingness of RPs to move to external identity/credential providers and how this fits within their business models Acceptance of subscribers Capability of existing trust frameworks (& certification schemes) to support these scenarios & technology Degree of interoperability achievable
  • 6. Identity is … 6 A unique risk-based, multi-factor authentication capability that leverages latest generation smart phones (e.g., iPhone, Blackberry, Android), smart tablets (e.g., iPad/Playbook) and traditional mobile devices Identity technology combines multiple authentication techniques for greatest identity confidence: • Device (What you have) • PKI Certificate (What you have) • PIN/PW (What you know) • Face (Who you are) Placing biometric levels of identity assurance in the hands of consumers Designed to run both as an in-app framework and out-of- band authentication product • Voice (Who you are) • Palm (Who you are) • GPS (Where you are/context) • OOB OTP (What you have) • (other as devices enabled)
  • 7. Technology - Identity 7 Relying Party Application Authentication Server (Identity Provider) Subscriber (User) Authentication Platform Request Transaction Request Authentication Authentication Challenge(s) Authentication Response Authentication Package Authentication Results Access Decision
  • 8. Trust is … 8 An Identity Provider (IDP) for delivering highly secure authentication services to businesses and consumers A multi-tenant service hosting multiple applications from different Relying Parties Based on Identity authentication.
  • 9. Trust Frameworks – NSTIC Alignment 9 Migrating our TrustX IDP to work within multiple trust frameworks Provides CHOICE to subscribers and Relying Parties Operate within a multiple IDP environment Will assess existing trust frameworks to support: • Risk-based multi-factor/multi-method • Trust elevation • Biometrics • Equivalence
  • 10. Research – Purdue University 10 Biometric Standards, Performance & Assurance Laboratory (BSPA) Center for Education and Research in Information Assurance and Security (CERIAS) Practical research • Offline - Laboratory • Online – Analyzing data from the operational pilots Areas • Usability • Accessibility • Privacy • Security • Performance • User acceptance
  • 11. Operational Pilots 11 NSTIC & Trust Framework Standards IDP RP1 RP2 RP5 Subscribers Operational Pilots Data/Metrics Data Collection & Analysis (inline) Gap Analysis Purdue Labs (offline) RP3 RP4
  • 12. Steps to get there 12 Extend the technology to fit within federated environment and meet certification criteria • Involves requirements analysis & trade-offs • Supported by research assessments • Identify gaps in existing TF standards along the way Stand up the enhanced IDP/CSP Integrate RP applications • Work with RPs on pilot plans (use cases, populations, approaches, schedule, etc.) Work through Trust Framework certification and back fit RP integrations to align • Work with assessors and consultants Collect and analyze metrics to evaluate progress, success Work with other pilots to identify opportunities to work together Proprietary and Confidential
  • 13. Use Cases 13 General use case: • Relying party has an existing relationship with a set of subscribers (customers, members, partners, staff, etc.) • RP wants a strong authentication solution (credential) for its higher assurance applications/transactions – RP maps its transactions to a set of authentication methods (low to high) • RP is willing to use (try using) an external service – RP may operate within a trust framework/federation • In general, the RP performs its own identity proofing and holds identity data, which is bound to the strong credential – However some RPs may desire to also utilize 3rd party identity proofing, particularly for new subscribers • RPs sponsor a subscriber for a TrustX credential; however once issued, this credential may be bound to multiple RPs • Subscriber uses their credential in lieu of passwords
  • 14. Use cases 14 Relying Party Use Case Pilot Population Potential Base Notes AAAE Member portal access AAAE members. 5000 Ability to pilot different subsets of population with different access concerns AARP Premium Services Members 40M Focus likely to be more on usability than security Purdue Hotseat* Students/ Faculty 85K Year 2 pilot Hotseat is a collaborative classroom tool Major Bank On-line and mobile banking Bank customers 50M Year 2 pilot PayPal eCommerce Under NDA TBD M Year 2 pilot *Tentative
  • 17. Addressing Guiding Principles Principle Affirm Investigate/Enhance Privacy enhancing & voluntary • No PII stored on phone. • Authentication proportional to transaction risk level. • Opt-in pilots. • Assess privacy • Investigate PETs Secure & resilient • Strong multifactor authentication • Server security assessment • High availability configuration • Assess security, recommend improvements • Evaluate performance Interoperable • Supports multiple methods, hosted on multiple devices • Biometric independent • Integrate with multiple trust frameworks • Demonstrate across multiple RPs Cost effective & easy to use • Use of existing mobile device is convenient and cost effective • RP/user choice of methods • Assess usability, accessibility, and user acceptance 17Proprietary and Confidential
  • 18. Sep Oct Year 1 Year 2 Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Implement SAML2/OpenID Connect Mobile Biometrics Assessment Gap Analysis Privacy & Security Assessment IdentityX and TrustX NSTIC Alignment Major Bank AAAE Collect and analyze data from pilots Operational Pilots Trust Framework Integration Research IDX Alignment with NSTIC Legend Certification Certification Preparation Human Subject Research Approval Oct MayNov Dec Jan Feb Mar Apr Jun Jul Aug Sep Oct MayNov Dec Jan Feb Mar Apr Jun Jul Aug Sep Audit Cross-RP Interoperability Demonstration AARP Purdue PayPal
  • 19. Accomplishments to date 19 AAAE Pilot launched & operating SAML & OpenIDConnect prototypes TrustX product enhancement requirements and design completed TrustX infrastructure and baseline capability deployed Research protocol established Kantara initial application for approval accepted
  • 20. Lessons Learned (issues we’ve encountered) 20 RPs are generally conservative and not willing to go from 0-60 in 3 seconds. Many RPs do not desire a “full function” IDP, but only a CSP They already hold identity data and don’t need/want 3rd party involvement Do want to use 3rd party credentials, however. Existing Trust Frameworks/Certification schemes only recognize “full IDPs” Marketplace moving towards componentized offerings and “decoupled” model Tricky bit is binding operation / maintaining chain of trust Gaps exist related to dynamic, risk-based, multifactor and biometrics Methods do not exist for assessing equivalency of token types 800-63 is prescriptive in this area, but for a limited set of token implementations
  • 21. Near term milestones 21 Begin AARP integration Begin laboratory testing Complete first round of security & privacy assessments Initial gap analysis complete IdentityX Trust Framework Server (ITFS) Release 1.0 Develop & coordinate OpenID Connect profile
  • 22. Learn More 22 Daon Pilot POC: Cathy Tilton, cathy.tilton@daon.com, 703-472-5546 Interested Relying Parties Jim Williams, jim.williams@daon.com, 202-465-5150 TrustX website www.trustx.com