Technical Track Session. E-Authentication Overview & Technical Approach. Scott Lowery. E-Authentication – Technical Approach. Agenda E-Authentication Overview Policy Framework Technical Approach Interoperability Lab. Policy Infrastructure:.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
2. Establish standard methodology for e-Authentication risk
1. Establish e-Authentication
risk and assurance levels
for Governmentwide use
(OMB M-04-04 Federal Policy Notice 12/16/03)
3. Establish technical assurance standards for e-credentials and credential providers (NIST Special Pub 800-63 Authentication Technical Guidance)
4. Establish methodology for evaluating credentials/providers
on assurance criteria (Credential Assessment Framework)
6. Establish common business rules for use of trusted 3rd-party credentials
5. Establish trust list of trusted credential providers for govt-wide (and private sector) use
Step #4: The
ST uses the
Assess COTS Interoperability
Migrate, Translate, or Both.
Chris Louden - 703-299-3444 Chris.firstname.lastname@example.org
Andrew Chiu - 703-299-3444 Andrew.email@example.com
Steve Lazerowich - 703-299-3444
David Simonetti - 410-356-2260
I appreciate your feedback and comments.
I can be reached at: