e authentication overview technical approach l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
E-Authentication Overview & Technical Approach PowerPoint Presentation
Download Presentation
E-Authentication Overview & Technical Approach

Loading in 2 Seconds...

play fullscreen
1 / 31

E-Authentication Overview & Technical Approach - PowerPoint PPT Presentation


  • 223 Views
  • Uploaded on

Technical Track Session. E-Authentication Overview & Technical Approach. Scott Lowery. E-Authentication – Technical Approach. Agenda E-Authentication Overview Policy Framework Technical Approach Interoperability Lab. Policy Infrastructure:.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'E-Authentication Overview & Technical Approach' - libitha


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
e authentication technical approach
E-Authentication – Technical Approach

Agenda

  • E-Authentication Overview
    • Policy Framework
  • Technical Approach
  • Interoperability Lab
policy infrastructure
Policy Infrastructure:

2. Establish standard methodology for e-Authentication risk

assessment (ERA)

1. Establish e-Authentication

risk and assurance levels

for Governmentwide use

(OMB M-04-04 Federal Policy Notice 12/16/03)

3. Establish technical assurance standards for e-credentials and credential providers (NIST Special Pub 800-63 Authentication Technical Guidance)

4. Establish methodology for evaluating credentials/providers

on assurance criteria (Credential Assessment Framework)

6. Establish common business rules for use of trusted 3rd-party credentials

5. Establish trust list of trusted credential providers for govt-wide (and private sector) use

e authentication technical approach6
E-Authentication – Technical Approach
  • Agenda
    • E-Authentication Overview
    • Technical Approach
      • Assertion Based Authentication
      • Certificate Based Authentication
    • Interoperability Lab
e authentication technical approach7
E-Authentication – Technical Approach
  • Agenda
    • E-Authentication Overview
    • Technical Approach
      • Assertion Based Authentication
        • Overview
        • Management
        • SAML (Security Assertion Markup Language)as an Adopted Scheme
      • Certificate Based Authentication
    • Interoperability Lab
starting at the cs

Step #3: After

Selecting their AA

the user is redirected

back to the CS as

usual

CSP ID

Startingat the CS
specialized portals

Step #2: The user is

Redirected to the portal

With the CS and AA IDs

Step #3: The user is

cookied and redirected

to the CS

SpecializedPortals
e authentication technical approach12
E-Authentication – Technical Approach
  • Agenda
    • E-Authentication Overview
    • Technical Approach
      • Assertion Based Authentication
        • Overview
        • Management
        • SAML as an Adopted Scheme
      • Certificate Based Authentication
    • Interoperability Lab
emerging technology

Evaluate new Scheme against requirements

Assess COTS Interoperability

Start

Scheme

Adoption Lifecycle

Migrate, Translate, or Both.

Pilot

Adopt

EmergingTechnology
e authentication technical approach15
E-Authentication – Technical Approach
  • Agenda
    • E-Authentication Overview
    • Technical Approach
      • Assertion Based Authentication
        • Overview
        • Management
        • SAML as an Adopted Scheme
      • Certificate Based Authentication
    • Interoperability Lab
e authentication technical approach19
E-Authentication – Technical Approach
  • Agenda
    • E-Authentication Overview
    • Technical Approach
      • Assertion Based Authentication
      • Certificate Based Authentication
    • Interoperability Lab
certificates at lower assurance applications
CertificatesAt LowerAssuranceApplications

Scheme

Translator

Step #4: The

ST uses the

validation

service to

validate the

certificate

e authentication technical approach23
E-Authentication – Technical Approach
  • Agenda
    • E-Authentication Overview
    • Technical Approach
    • Interoperability Lab
      • Product Testing
      • Technical Support
      • CS / AA Testing
slide24

AAs

CSs

  • COTS (Commercial Off The Shelf) Product Testing
    • Scheme compliance
    • Interoperability
slide25

Evaluate new Scheme against requirements

Assess COTS Interoperability

Start

Scheme

Adoption Lifecycle

Migrate, Translate, or Both.

Pilot

Adopt

  • Product Testing
    • See List of Approved Vendors
slide26
COTS Product Testing
    • Certificate Validation
e authentication architecture evolution
E-Authentication Architecture Evolution
  • Architecture Working Group
  • Evaluating Evolving Standards
  • Scheme Translators
e authentication interoperability lab
E-Authentication Interoperability Lab
  • Technical Support
    • Interoperability Testing
    • SAML Conformance Testing
    • Acceptance Testing
    • Approved Product List
    • Cookbook / Recipes
  • Extensive Experience in All These Areas
e authentication technical approach29
E-Authentication – Technical Approach
  • Agenda
    • E-Authentication Overview
    • Technical Approach
    • Interoperability Lab
resources
Resources
  • http://www.cio.gov/eauthentication

interoplab@enspier.com

  • Additional Contacts

Chris Louden - 703-299-3444 Chris.louden@enspier.com

Andrew Chiu - 703-299-3444 Andrew.chiu@enspier.com

Steve Lazerowich - 703-299-3444

Steve.lazerowich@enspier.com

David Simonetti - 410-356-2260

David.simonetti@enspier.com

contact information
Contact Information

I appreciate your feedback and comments.

I can be reached at:

Scott Lowry

scott@enspier.com

202-236-8221