SlideShare a Scribd company logo
LOA	
  Alterna+ves:	
  
A	
  Modest	
  Proposal	
  
Jim	
  Fenton	
  
IIW	
  XX	
  
April	
  2015	
  
Background	
  
•  LOA	
  is	
  defined	
  in	
  OMB	
  Memo	
  M-­‐04-­‐04,	
  “E-­‐
Authen+ca+on	
  Guidance	
  for	
  Federal	
  
Agencies”	
  
•  Technical	
  means	
  to	
  sa+sfy	
  are	
  defined	
  in	
  NIST	
  
SP	
  800-­‐63-­‐*	
  
•  Federal	
  authen+ca+on	
  requirements	
  are	
  
changing	
  due	
  to	
  Execu+ve	
  Order	
  13681	
  
EO	
  13681	
  
“…all	
  agencies	
  making	
  personal	
  data	
  accessible	
  to	
  ci+zens	
  
through	
  digital	
  applica+ons	
  require	
  the	
  use	
  of	
  mul+ple	
  factors	
  of	
  
authen+ca+on	
  and	
  an	
  effec+ve	
  iden+ty	
  proofing	
  process,	
  as	
  
appropriate.”	
  
-­‐-­‐	
  Execu+ve	
  Order	
  13681	
  
October	
  17,	
  2014	
  
Ø Current	
  LOA	
  1	
  and	
  2	
  are	
  going	
  to	
  be	
  a	
  lot	
  less	
  useful	
  
Three	
  Alterna+ves	
  for	
  OMB	
  
•  (1)	
  Keep	
  current	
  LOA	
  structure,	
  change	
  impact	
  
– Increase	
  impact	
  of	
  personal	
  data	
  disclosure	
  
– Drives	
  more	
  things	
  to	
  LOA	
  3	
  
•  (2)	
  Keep	
  LOA	
  structure,	
  change	
  800-­‐63	
  
– Likely	
  to	
  confuse	
  agencies	
  and	
  industry	
  
•  (2)	
  Change	
  the	
  LOA	
  structure	
  somehow	
  
– Let’s	
  discuss	
  this	
  more	
  
Some	
  principles	
  
•  Avoid	
  current	
  LOA	
  problems	
  
– LOA	
  2	
  both	
  proofed	
  and	
  pseudonymous	
  
– No	
  strong	
  pseudonymous	
  authen+ca+on	
  
– Lower	
  LOA	
  geeng	
  less	
  useful	
  
•  Keep	
  it	
  simple	
  
– Emphasize	
  meaningful	
  dis+nc+ons	
  between	
  levels	
  
– Minimize	
  dimensionality	
  (of	
  vector)	
  
Meaningful	
  dis+nc+ons?	
  
•  As	
  mul+-­‐factor	
  authen+ca+on	
  becomes	
  more	
  widely	
  used,	
  dis+nc+ons	
  in	
  
single-­‐factor	
  become	
  less	
  important	
  
Authen'ca'on	
   LOA	
   Proofing	
  
Single	
  factor	
   1	
   None	
  
Single	
  factor	
   2	
  pseudonymous	
   None	
  
Single	
  factor	
   2	
   Remote	
  
Mul+-­‐factor	
   3	
   Remote	
  
Mul+-­‐factor	
  w/	
  
hardware	
  token	
  
4	
   In-­‐person	
  only	
  
{	
  Similar	
  (though	
  
not	
  iden+cal)	
  
requirements	
  
}	
  
Similar	
  (though	
  
not	
  iden+cal)	
  
requirements	
  
A	
  New	
  Model	
  
•  Separate	
  Level	
  of	
  Assurance	
  into	
  two	
  parts:	
  
–  Level	
  of	
  Strength	
  (of	
  authen+ca+on)	
  
–  Level	
  of	
  Confidence	
  (of	
  akributes)	
  
•  Emphasis	
  on	
  meaningful	
  dis+nc+ons	
  
–  Significant	
  differences	
  in	
  usability,	
  availability	
  
–  Require	
  good	
  prac+ces	
  internally	
  (e.g.,	
  use	
  of	
  crypto	
  rather	
  than	
  
shared	
  secrets)	
  
•  Emphasis	
  on	
  expressing	
  the	
  relying	
  party’s	
  requirements	
  to	
  
the	
  user	
  and	
  authen+ca+on	
  and	
  akribute	
  providers	
  
Level	
  of	
  Strength	
  (LoS)	
  
•  Measures	
  the	
  strength	
  of	
  the	
  authen+ca+on	
  
process	
  
•  Candidate	
  levels:	
  
•  Detailed	
  requirements	
  per	
  level	
  to	
  be	
  defined	
  in	
  
SP	
  800-­‐63-­‐2	
  successor	
  
Level	
   Descrip'on	
  
1	
   Single-­‐factor	
  authen+ca+on	
  (cf.	
  LOA	
  2)	
  
2	
   Two-­‐factor	
  authen+ca+on	
  (cf.	
  LOA	
  3)	
  
3	
   Two-­‐factor	
  authen+ca+on	
  with	
  hardware	
  token	
  (cf.	
  LOA	
  4)	
  
Level	
  of	
  Confidence	
  (LoC)	
  
•  Measure	
  of	
  the	
  degree	
  to	
  which	
  the	
  Relying	
  Party	
  can	
  
depend	
  on	
  akributes,	
  par+cularly	
  iden+fying	
  akributes	
  
•  Incorporates	
  the	
  iden+ty	
  proofing	
  process	
  and	
  the	
  
binding	
  to	
  the	
  creden+al	
  
•  Again,	
  detailed	
  requirements	
  TBD.	
  
Level	
   Descrip'on	
  
1	
   Self-­‐asserted	
  akribute	
  (cf.	
  LOA	
  1)	
  
2	
   Remotely	
  iden+ty	
  proofed	
  (cf.	
  LOA	
  3)	
  
3	
   In-­‐person	
  iden+ty	
  proofed	
  (cf.	
  LOA	
  4)	
  
Mapping	
  LOA	
  to	
  LOS/LOC	
  
LOA	
   Level	
  of	
  Strength	
   Level	
  of	
  Confidence	
  
1	
   1	
  (see	
  note)	
   1	
  
2	
   1	
   1	
  (pseudonynous)	
  or	
  2	
  
3	
   2	
   2	
  
4	
   3	
   3	
  
Note:	
  Some	
  LOA	
  1	
  authen+ca+on	
  methodologies	
  may	
  not	
  be	
  acceptable	
  at	
  LOS	
  1.	
  
Mapping	
  LOS/LOC	
  to	
  LOA	
  
LOC	
  1	
   LOC	
  2	
   LOC	
  3	
  
LOS	
  1	
   1,	
  2P	
   2	
   Note	
  2	
  
LOS	
  2	
   Note	
  1	
   3	
   Note	
  2	
  
LOS	
  3	
   Note	
  1	
   4	
  
Notes:	
  
1.  	
   Strong	
  pseudonymous	
  or	
  anonymous	
  authen+ca+on	
  
2.  	
   Lower	
  LOS	
  may	
  limit	
  effec+ve	
  LOC	
  
Not	
  included	
  
•  Characteris+cs	
  of	
  authen+ca+on	
  and	
  akribute	
  provider	
  
–  Accredita+on	
  of	
  the	
  authen+ca+on	
  or	
  akribute	
  provider	
  
•  May	
  only	
  permit	
  certain	
  levels	
  of	
  asser+on	
  
–  Trust	
  by	
  relying	
  party	
  of	
  accredi+ng	
  agency	
  
•  Addi+onal	
  detail	
  (such	
  as	
  loca+on)	
  for	
  risk-­‐based	
  
authen+ca+on	
  decisions	
  
–  Are	
  these	
  really	
  akributes?	
  
•  Risk	
  characteris+cs	
  at	
  each	
  level	
  
–  To	
  be	
  defined	
  based	
  on	
  detailed	
  technical	
  requirements	
  at	
  
each	
  level	
  
•  Asser+on	
  metadata	
  
–  Expira+on,	
  usage	
  restric+ons,	
  etc.	
  

More Related Content

What's hot

Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
Secure Code Warrior
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Test
martinvoelk
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
Cybera Inc
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
ShivamSharma909
 
WLAN Security
WLAN Security WLAN Security
WLAN Security
Gururaj H L
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine Learning
Arjun BM
 
Framework for analyzing template security and privacy in biometric authentica...
Framework for analyzing template security and privacy in biometric authentica...Framework for analyzing template security and privacy in biometric authentica...
Framework for analyzing template security and privacy in biometric authentica...
nithyakarunanithi
 
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
Inspirisys Solutions Limited
 
CA Day 2014
CA Day 2014 CA Day 2014
CA Day 2014
CASCouncil
 
Identity Hub’s Role in Social Logins
Identity Hub’s Role in Social LoginsIdentity Hub’s Role in Social Logins
Identity Hub’s Role in Social Logins
WSO2
 
[OPD 2019] Life after pentest
[OPD 2019] Life after pentest[OPD 2019] Life after pentest
[OPD 2019] Life after pentest
OWASP
 
Building a secure BFF at Postman
Building a secure BFF at PostmanBuilding a secure BFF at Postman
Building a secure BFF at Postman
Ankit Muchhala
 
Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testing
srivinayak
 
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing MethodologyWeb Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing Methodology
Websecurify
 
Techniques for securing rest
Techniques for securing restTechniques for securing rest
Techniques for securing rest
Sudhakar Anivella
 
OpenID Certification Program Update - 2018-04-02
OpenID Certification Program Update - 2018-04-02OpenID Certification Program Update - 2018-04-02
OpenID Certification Program Update - 2018-04-02
MikeLeszcz
 
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group UpdateOpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
MikeLeszcz
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
Alan Kan
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
IRJET Journal
 
Cyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test themCyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test them
24by7Security Inc
 

What's hot (20)

Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Test
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
 
WLAN Security
WLAN Security WLAN Security
WLAN Security
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine Learning
 
Framework for analyzing template security and privacy in biometric authentica...
Framework for analyzing template security and privacy in biometric authentica...Framework for analyzing template security and privacy in biometric authentica...
Framework for analyzing template security and privacy in biometric authentica...
 
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
7 Vulnerabilities In Your Web Application That Can Open The Door To Security ...
 
CA Day 2014
CA Day 2014 CA Day 2014
CA Day 2014
 
Identity Hub’s Role in Social Logins
Identity Hub’s Role in Social LoginsIdentity Hub’s Role in Social Logins
Identity Hub’s Role in Social Logins
 
[OPD 2019] Life after pentest
[OPD 2019] Life after pentest[OPD 2019] Life after pentest
[OPD 2019] Life after pentest
 
Building a secure BFF at Postman
Building a secure BFF at PostmanBuilding a secure BFF at Postman
Building a secure BFF at Postman
 
Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testing
 
Web Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing MethodologyWeb Application Security 101 - 04 Testing Methodology
Web Application Security 101 - 04 Testing Methodology
 
Techniques for securing rest
Techniques for securing restTechniques for securing rest
Techniques for securing rest
 
OpenID Certification Program Update - 2018-04-02
OpenID Certification Program Update - 2018-04-02OpenID Certification Program Update - 2018-04-02
OpenID Certification Program Update - 2018-04-02
 
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group UpdateOpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
 
Get Ready for Web Application Security Testing
Get Ready for Web Application Security TestingGet Ready for Web Application Security Testing
Get Ready for Web Application Security Testing
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
Cyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test themCyber Vulnerabilities & How companies can test them
Cyber Vulnerabilities & How companies can test them
 

Viewers also liked

Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password Requirements
Jim Fenton
 
Security Questions Considered Harmful
Security Questions Considered HarmfulSecurity Questions Considered Harmful
Security Questions Considered Harmful
Jim Fenton
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Jim Adler
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
Digital Bond
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
Santiago Bassett
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Santiago Bassett
 

Viewers also liked (6)

Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password Requirements
 
Security Questions Considered Harmful
Security Questions Considered HarmfulSecurity Questions Considered Harmful
Security Questions Considered Harmful
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014Malware Detection with OSSEC HIDS - OSSECCON 2014
Malware Detection with OSSEC HIDS - OSSECCON 2014
 
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
Threat Intelligence with Open Source Tools - Cornerstones of Trust 2014
 

Similar to LOA Alternatives - A Modest Proposal

NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
FIDO Alliance
 
Crypto Analysis slides presentation slides
Crypto Analysis slides presentation slidesCrypto Analysis slides presentation slides
Crypto Analysis slides presentation slides
tahirsaleem54
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
APIsecure_ Official
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
Hitachi, Ltd. OSS Solution Center.
 
Aa imagine ny19_verizon-041019ppt.aai.format
Aa imagine ny19_verizon-041019ppt.aai.formatAa imagine ny19_verizon-041019ppt.aai.format
Aa imagine ny19_verizon-041019ppt.aai.format
Tracy Gibson
 
Automation Anywhere - Imagine New York 2019 - Verizon
Automation Anywhere - Imagine New York 2019 - VerizonAutomation Anywhere - Imagine New York 2019 - Verizon
Automation Anywhere - Imagine New York 2019 - Verizon
Automation Anywhere
 
DAY_ONE_2017AM_SingleSignOn_II.ppsx
DAY_ONE_2017AM_SingleSignOn_II.ppsxDAY_ONE_2017AM_SingleSignOn_II.ppsx
DAY_ONE_2017AM_SingleSignOn_II.ppsx
KasaTiga
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
InterSystems Corporation
 
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
Vladimir Bychkov
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices World
VMware Tanzu
 
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
WSO2
 
INTERFACE, by apidays - The Evolution of API Security by Johann Dilantha Nal...
INTERFACE, by apidays  - The Evolution of API Security by Johann Dilantha Nal...INTERFACE, by apidays  - The Evolution of API Security by Johann Dilantha Nal...
INTERFACE, by apidays - The Evolution of API Security by Johann Dilantha Nal...
apidays
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
IRJET Journal
 
Distributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfDistributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdf
Nordic APIs
 
Presentation
PresentationPresentation
Presentation
Laxman Kumar
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
Damian T. Gordon
 
Outsourcing Your SharePoint Hosting - the clouds fine print magnified
Outsourcing Your SharePoint Hosting - the clouds fine print magnifiedOutsourcing Your SharePoint Hosting - the clouds fine print magnified
Outsourcing Your SharePoint Hosting - the clouds fine print magnified
SherWeb
 
Sps chicago suburbs outsourcing your share point hosting - the clouds fine ...
Sps chicago suburbs   outsourcing your share point hosting - the clouds fine ...Sps chicago suburbs   outsourcing your share point hosting - the clouds fine ...
Sps chicago suburbs outsourcing your share point hosting - the clouds fine ...
SherWeb
 
Sps chicago suburbs outsourcing your share point hosting - the clouds fine ...
Sps chicago suburbs   outsourcing your share point hosting - the clouds fine ...Sps chicago suburbs   outsourcing your share point hosting - the clouds fine ...
Sps chicago suburbs outsourcing your share point hosting - the clouds fine ...
SherWeb
 
FIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
FIWARE
 

Similar to LOA Alternatives - A Modest Proposal (20)

NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
Crypto Analysis slides presentation slides
Crypto Analysis slides presentation slidesCrypto Analysis slides presentation slides
Crypto Analysis slides presentation slides
 
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
Aa imagine ny19_verizon-041019ppt.aai.format
Aa imagine ny19_verizon-041019ppt.aai.formatAa imagine ny19_verizon-041019ppt.aai.format
Aa imagine ny19_verizon-041019ppt.aai.format
 
Automation Anywhere - Imagine New York 2019 - Verizon
Automation Anywhere - Imagine New York 2019 - VerizonAutomation Anywhere - Imagine New York 2019 - Verizon
Automation Anywhere - Imagine New York 2019 - Verizon
 
DAY_ONE_2017AM_SingleSignOn_II.ppsx
DAY_ONE_2017AM_SingleSignOn_II.ppsxDAY_ONE_2017AM_SingleSignOn_II.ppsx
DAY_ONE_2017AM_SingleSignOn_II.ppsx
 
Cache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure ApplicationsCache Security- Adding Security to Non-Secure Applications
Cache Security- Adding Security to Non-Secure Applications
 
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices World
 
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
[APIdays INTERFACE 2021] The Evolution of API Security for Client-side Applic...
 
INTERFACE, by apidays - The Evolution of API Security by Johann Dilantha Nal...
INTERFACE, by apidays  - The Evolution of API Security by Johann Dilantha Nal...INTERFACE, by apidays  - The Evolution of API Security by Johann Dilantha Nal...
INTERFACE, by apidays - The Evolution of API Security by Johann Dilantha Nal...
 
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
Securing Data retrieval using CPABE scheme with Two Party Computation in DTN ...
 
Distributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfDistributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdf
 
Presentation
PresentationPresentation
Presentation
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Outsourcing Your SharePoint Hosting - the clouds fine print magnified
Outsourcing Your SharePoint Hosting - the clouds fine print magnifiedOutsourcing Your SharePoint Hosting - the clouds fine print magnified
Outsourcing Your SharePoint Hosting - the clouds fine print magnified
 
Sps chicago suburbs outsourcing your share point hosting - the clouds fine ...
Sps chicago suburbs   outsourcing your share point hosting - the clouds fine ...Sps chicago suburbs   outsourcing your share point hosting - the clouds fine ...
Sps chicago suburbs outsourcing your share point hosting - the clouds fine ...
 
Sps chicago suburbs outsourcing your share point hosting - the clouds fine ...
Sps chicago suburbs   outsourcing your share point hosting - the clouds fine ...Sps chicago suburbs   outsourcing your share point hosting - the clouds fine ...
Sps chicago suburbs outsourcing your share point hosting - the clouds fine ...
 
FIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
 

More from Jim Fenton

Notifs 2018
Notifs 2018Notifs 2018
Notifs 2018
Jim Fenton
 
REQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS RequirementsREQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS Requirements
Jim Fenton
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
Jim Fenton
 
User Authentication Overview
User Authentication OverviewUser Authentication Overview
User Authentication Overview
Jim Fenton
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More Usable
Jim Fenton
 
Notifs update
Notifs updateNotifs update
Notifs update
Jim Fenton
 
IgnitePII2014 Nōtifs
IgnitePII2014 NōtifsIgnitePII2014 Nōtifs
IgnitePII2014 Nōtifs
Jim Fenton
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?
Jim Fenton
 
OneID Garage Door
OneID Garage DoorOneID Garage Door
OneID Garage Door
Jim Fenton
 
Identity systems
Identity systemsIdentity systems
Identity systems
Jim Fenton
 

More from Jim Fenton (10)

Notifs 2018
Notifs 2018Notifs 2018
Notifs 2018
 
REQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS RequirementsREQUIRETLS: Sender Control of TLS Requirements
REQUIRETLS: Sender Control of TLS Requirements
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
User Authentication Overview
User Authentication OverviewUser Authentication Overview
User Authentication Overview
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More Usable
 
Notifs update
Notifs updateNotifs update
Notifs update
 
IgnitePII2014 Nōtifs
IgnitePII2014 NōtifsIgnitePII2014 Nōtifs
IgnitePII2014 Nōtifs
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?
 
OneID Garage Door
OneID Garage DoorOneID Garage Door
OneID Garage Door
 
Identity systems
Identity systemsIdentity systems
Identity systems
 

Recently uploaded

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 

Recently uploaded (20)

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 

LOA Alternatives - A Modest Proposal

  • 1. LOA  Alterna+ves:   A  Modest  Proposal   Jim  Fenton   IIW  XX   April  2015  
  • 2. Background   •  LOA  is  defined  in  OMB  Memo  M-­‐04-­‐04,  “E-­‐ Authen+ca+on  Guidance  for  Federal   Agencies”   •  Technical  means  to  sa+sfy  are  defined  in  NIST   SP  800-­‐63-­‐*   •  Federal  authen+ca+on  requirements  are   changing  due  to  Execu+ve  Order  13681  
  • 3. EO  13681   “…all  agencies  making  personal  data  accessible  to  ci+zens   through  digital  applica+ons  require  the  use  of  mul+ple  factors  of   authen+ca+on  and  an  effec+ve  iden+ty  proofing  process,  as   appropriate.”   -­‐-­‐  Execu+ve  Order  13681   October  17,  2014   Ø Current  LOA  1  and  2  are  going  to  be  a  lot  less  useful  
  • 4. Three  Alterna+ves  for  OMB   •  (1)  Keep  current  LOA  structure,  change  impact   – Increase  impact  of  personal  data  disclosure   – Drives  more  things  to  LOA  3   •  (2)  Keep  LOA  structure,  change  800-­‐63   – Likely  to  confuse  agencies  and  industry   •  (2)  Change  the  LOA  structure  somehow   – Let’s  discuss  this  more  
  • 5. Some  principles   •  Avoid  current  LOA  problems   – LOA  2  both  proofed  and  pseudonymous   – No  strong  pseudonymous  authen+ca+on   – Lower  LOA  geeng  less  useful   •  Keep  it  simple   – Emphasize  meaningful  dis+nc+ons  between  levels   – Minimize  dimensionality  (of  vector)  
  • 6. Meaningful  dis+nc+ons?   •  As  mul+-­‐factor  authen+ca+on  becomes  more  widely  used,  dis+nc+ons  in   single-­‐factor  become  less  important   Authen'ca'on   LOA   Proofing   Single  factor   1   None   Single  factor   2  pseudonymous   None   Single  factor   2   Remote   Mul+-­‐factor   3   Remote   Mul+-­‐factor  w/   hardware  token   4   In-­‐person  only   {  Similar  (though   not  iden+cal)   requirements   }   Similar  (though   not  iden+cal)   requirements  
  • 7. A  New  Model   •  Separate  Level  of  Assurance  into  two  parts:   –  Level  of  Strength  (of  authen+ca+on)   –  Level  of  Confidence  (of  akributes)   •  Emphasis  on  meaningful  dis+nc+ons   –  Significant  differences  in  usability,  availability   –  Require  good  prac+ces  internally  (e.g.,  use  of  crypto  rather  than   shared  secrets)   •  Emphasis  on  expressing  the  relying  party’s  requirements  to   the  user  and  authen+ca+on  and  akribute  providers  
  • 8. Level  of  Strength  (LoS)   •  Measures  the  strength  of  the  authen+ca+on   process   •  Candidate  levels:   •  Detailed  requirements  per  level  to  be  defined  in   SP  800-­‐63-­‐2  successor   Level   Descrip'on   1   Single-­‐factor  authen+ca+on  (cf.  LOA  2)   2   Two-­‐factor  authen+ca+on  (cf.  LOA  3)   3   Two-­‐factor  authen+ca+on  with  hardware  token  (cf.  LOA  4)  
  • 9. Level  of  Confidence  (LoC)   •  Measure  of  the  degree  to  which  the  Relying  Party  can   depend  on  akributes,  par+cularly  iden+fying  akributes   •  Incorporates  the  iden+ty  proofing  process  and  the   binding  to  the  creden+al   •  Again,  detailed  requirements  TBD.   Level   Descrip'on   1   Self-­‐asserted  akribute  (cf.  LOA  1)   2   Remotely  iden+ty  proofed  (cf.  LOA  3)   3   In-­‐person  iden+ty  proofed  (cf.  LOA  4)  
  • 10. Mapping  LOA  to  LOS/LOC   LOA   Level  of  Strength   Level  of  Confidence   1   1  (see  note)   1   2   1   1  (pseudonynous)  or  2   3   2   2   4   3   3   Note:  Some  LOA  1  authen+ca+on  methodologies  may  not  be  acceptable  at  LOS  1.  
  • 11. Mapping  LOS/LOC  to  LOA   LOC  1   LOC  2   LOC  3   LOS  1   1,  2P   2   Note  2   LOS  2   Note  1   3   Note  2   LOS  3   Note  1   4   Notes:   1.    Strong  pseudonymous  or  anonymous  authen+ca+on   2.    Lower  LOS  may  limit  effec+ve  LOC  
  • 12. Not  included   •  Characteris+cs  of  authen+ca+on  and  akribute  provider   –  Accredita+on  of  the  authen+ca+on  or  akribute  provider   •  May  only  permit  certain  levels  of  asser+on   –  Trust  by  relying  party  of  accredi+ng  agency   •  Addi+onal  detail  (such  as  loca+on)  for  risk-­‐based   authen+ca+on  decisions   –  Are  these  really  akributes?   •  Risk  characteris+cs  at  each  level   –  To  be  defined  based  on  detailed  technical  requirements  at   each  level   •  Asser+on  metadata   –  Expira+on,  usage  restric+ons,  etc.