SlideShare a Scribd company logo
Symantec Government Technology Summit

                 User Authentication for Government
                             20 March 2012



Nick Piazzola
Sr. Director, Government
Authentication Solutions
Nick_Piazzola@symantec.com
443-604-4069
E-Authentication in the Federal Government
 Players: President, OMB, Federal CIO/CIO Council, FICAM
 Policies/Mandates:
      • HSPD-12
      • OMB: M-04-04, M-07-16, M-11-11
      • Federal CIO Memo
 Technical Standards:
      • FIPS 201
      • FIPS 199
      • NIST SP 800-63-1
 Implementation Standards/Guidance:
      • Federal PKI Certificate Policy
      • Trust Frameworks (Non-PKI)
OMB M-04-04 E-Authentication Guidance

 Electronic authentication (E-Authentication) is the process of
  establishing confidence in identities presented remotely over an
  open network to an information system.

 OMB M-04-04 defines four levels of identity assurance for electronic
  transactions requiring authentication, where the required level of
  assurance is defined in terms of the consequences of authentication
  errors and the misuse of credentials.

       Level 1 – Little or no confidence in the asserted identity
       Level 2 - Some confidence in the asserted identity
       Level 3 - High confidence in the asserted identity
       Level 4 - Very high confidence in the asserted identity
OMB M-04-04 E-Authentication Guidance


• Requires agencies to review new and existing electronic transactions to
  ensure that authentication processes provide the appropriate level of
  assurance.
    1. Conduct a risk assessment of the e-government system.
    2. Map identified risks to the applicable assurance level.
    3. Select technology based on e-authentication technical guidance.
    4. Validate that the implemented system has achieved the required
    assurance level.
    5. Periodically reassess the system to determine technology refresh
    requirements.
Maximum Potential Impacts
FIPS 199 Risk/Impact Profiles                       Assurance Level Impact
                                                           Profiles
        Potential Impact Categories for
                                                    1     2       3          4
            Authentication Errors
Inconvenience, distress or damage to standing or   Low   Mod     Mod    High
reputation
Financial loss or agency liability                 Low   Mod     Mod    High

Harm to agency programs or public interests        N/A   Low     Mod    High

Unauthorized release of sensitive information      N/A   Low     Mod    High

Personal Safety                                    N/A   N/A     Low    Mod
                                                                        High
Civil or criminal violations                       N/A   Low     Mod    High
NIST Special Publication SP 800-63-1
            Electronic Authentication Guideline

• Provides technical guidelines for Federal agencies implementing
  electronic authentication.
• Defines electronic authentication (e-authentication) as the process of
  establishing confidence in identities electronically presented to an
  information system.
• Applies to remote electronic authentication of users over open
  networks.
• Defines four levels of increasing assurance: Levels 1,2,3,4 and the
  threats to be mitigated at each of these levels.
• Defines technical requirements in the areas of identity proofing,
  registration, tokens, management processes, authentication
  protocols and related assertions.
Strong Authentication
     A Combination of Two or More Authentication Factors

Something You Know     Something You Have    Something You Are




Username/Passwords     Hardware OTP Token
Mother’s Maiden Name                         Fingerprint
                       Digital Certificate
Transaction History                          Iris Pattern
                       Smart Card
E-Authentication Assurance Levels (OMB M-04-04)

                                                                          HSPD-12 PIV Card
Increased Strength


                                                                    Multi-Factor Token
                                                         PKI/ Digital Signature

                                                  Biometrics

                                    One-Time Password                                Very
                                                                                     High
                          Knowledge-Based
                                                                 High
                      PIN/User ID           Medium

                               Low

                         Access to          Applying             Obtaining        Employee
                                            for a Loan             Govt.          Screening
                          Protected
                           Website            Online              Benefits        for a High
                                                                                   Risk Job

                         Increased Need for Identity Assurance
User Authentication Product Family

 Public Key Infrastructure          Symantec Identity Protection         Fraud Detection Service
                                                                              Rules Eng.   Behavior Eng.




                                                                                    RISK SCORE

 PKI service issues certificates     Shared cloud-based two-factor
  for strong authentication,         authentication solution offering    Risk-Based authentication and
 encryption and digital signing          multiple token choices         software-based fraud detection




Government                                                 Enterprise
                               eCommerce                                         Financial Services
Symantec Solutions for Authentication

               OTP Card
                                                     SMS and Voice
                                           Browser
                                           Toolbar
   OTP Tokens                 Mobile        OTP
                               OTP
                                                             USB PKI Tokens


Smartcards
                                Strong
                             Authentication
Digital                         (User and Site)
Certificates                                                             SSL Cert
                                                                        Secure Seal


                    VIP Fraud Detection Service


VeriSign® Identity Protection Network
                 (fraud intelligence and shared authentication)
What PKI Enables…
                 • Prevent unauthorized access
   Strong          through enhanced authentication
Authentication
                 • Primary integration points: Web applications,
                   remote access, desktop logon, and wireless

                 • Provides data integrity and enable non-
   Digital
                   repudiation for electronic transactions
 Signatures      • Primary integration points: Email, Adobe,
                   and custom applications

                 • Protect sensitive information whether
                   data is in transit or at rest
 Encryption
                 • Primary integration points: Email, disk,
                   file/folder, and databases
Managed PKI Services for the Public Sector

– Federal Shared Service Provider PKI Enables Federal agencies
  to comply with HSPD-12. VeriSign SSP PKI services and Card
  Management System are certified and on the GSA FIPS-201
  Approved Products List (APL)
– Non-Federal Shared Service Provider PKI Enterprise PKI for
  any organization needing interoperability with the Federal
  government. Provides interoperability with the Federal PKI at
  multiple assurance levels through cross-certification with the
  Federal Bridge Certification Authority (FBCA).
– ECA Certificates Enable organizations, contractors and
  individuals to securely communicate with Federal, state and
  local government agencies.
Non-Federal SSP PKI Customers
U.S. Government
    – U.S. Nuclear Regulatory Commission
    – U.S. Senate
    – Dept of State (Millennium Challenge Corporation)

State Government
     – State of Kansas
     – State of Colorado
     – State of California (CA Prison Healthcare Systems)
     – State of Virginia (Fairfax County Government)

Universities
    – University of Houston

Government Contractors
    – Booz Allen & Hamilton             -General Dynamics
    – Noblis (Mitretek)                 -Dyncorp
Symantec Validation and ID Protection

   User with         Enterprise         VIP Authentication
 Symantec VIP                                Service
    Token



                    Consumer Portal,
                    Business Partner
                        Extranet




                   Government Network
Symantec Authentication Solution Strategy


                                  Directory/          Federal Bridge
          Trusted Agency           OCSP             Certification Authority
    Notary Agent    RA            Validation
                                  Services



                                   Federal/          Application Enabling
                                 Non- Federal              Services
                                  SSP PKI
           Identity                              -authentication gateway
          Proofing
                                                 -credential verification
          Services
         Levels 2/3/4                            -single sign-on (SSO)
                                   VIP OTP
                                 Credentialing
                                   Services




                                     VIP
Online KBA Existing Commercial    Validation
 Services Credential Proofing      Service
                      Service
Symantec/Experian Two Factor Authentication Solution

 Symantec
                              Experian               Symantec OTP
 OTP Token
                              Precise ID             Authentication
                           (NIST 800-63-1 Level 3)
                                                        Service




  User                               Online Government
                                         Application


  1.     NIST Level 3 Remote Identity Proofing using Experian Precise ID.
  2.     Multiple form-factors for OTP tokens for multiple platforms.
  3.     Two-Factor Authentication with PIN, OTP and in-the-cloud validation service.
Summary
• The two primary user authentication technologies in use today are PKI and
  OTP. Symantec delivers/supports both of these for government customers
  via cloud services.
• While both PKI and OTP are used for e-authentication, only PKI can deliver a
  full suite of security services including confidentiality, integrity and non-
  repudiation.
• OTP solutions are more likely to be used for remote access and external
  constituent access to government services because of their reduced cost and
  complexity.
• NIST SP 800-63-1 Level 3 assurance is the target for most applications
  involving personally identifiable information and/or valuable transactions.
• Experian and Symantec have collaborated to provide a suite of integrated
  identity proofing and authentication services that supports NIST SP 800-63-1.
• In the future government agencies are expected to transition from being
  providers of credentials to accepting identity credentials issued by external
  identity providers.

More Related Content

What's hot

Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Precisely
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
Nikhil Shaw
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
CTM360
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
PortalGuard
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
Will Adams
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
Precisely
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
Information Security Services SA
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with Authy
Nick Malcolm
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
Hitachi ID Systems, Inc.
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
SecureAuth
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
onionid12
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
Fortytwo
 

What's hot (20)

Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with Authy
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 

Viewers also liked

SCC2013 - Citizen science - Helen Roy
SCC2013 - Citizen science - Helen RoySCC2013 - Citizen science - Helen Roy
SCC2013 - Citizen science - Helen Roy
British Science Association
 
Code for Africa - Building Demand-driven + Citizen-focused Open Data Ecosystems
Code for Africa - Building Demand-driven + Citizen-focused Open Data EcosystemsCode for Africa - Building Demand-driven + Citizen-focused Open Data Ecosystems
Code for Africa - Building Demand-driven + Citizen-focused Open Data Ecosystems
Justin Arenstein
 
Enterprise 2.0 - Enabling change or part of the problem?
Enterprise 2.0 - Enabling change or part of the problem?Enterprise 2.0 - Enabling change or part of the problem?
Enterprise 2.0 - Enabling change or part of the problem?
Stephen Collins
 
Vip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by SymantecVip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by Symantec
CheapSSLsecurity
 
The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0Adam Lewis
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
Patrick McCormick
 
National identity strategy presentation may 10, 2016
National identity strategy  presentation may 10, 2016National identity strategy  presentation may 10, 2016
National identity strategy presentation may 10, 2016
Guy Huntington
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
ForgeRock
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windowsniteshitimpulse
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
ZTech Proje
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
Ben Abdallah Helmi
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
ForgeRock
 
The Rise of the Citizen Data Scientist
The Rise of the Citizen Data ScientistThe Rise of the Citizen Data Scientist
The Rise of the Citizen Data Scientist
Platfora
 
The connected economy mark skilton july 15 bright talk v2
The connected economy mark skilton july 15   bright talk v2The connected economy mark skilton july 15   bright talk v2
The connected economy mark skilton july 15 bright talk v2
Mark Skilton
 
E authentication template 050212
E authentication template 050212E authentication template 050212
E authentication template 050212GovCloud Network
 
Rails as iOS Application Backend
Rails as iOS Application BackendRails as iOS Application Backend
Rails as iOS Application Backend
maximeguilbot
 
Data Management for Citizen Science
Data Management for Citizen ScienceData Management for Citizen Science
Data Management for Citizen Science
Andrea Wiggins
 
Digital Transformation: Connected API Ecosystems
Digital Transformation: Connected API EcosystemsDigital Transformation: Connected API Ecosystems
Digital Transformation: Connected API Ecosystems
HARMAN Services
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Deepak Yadav
 

Viewers also liked (20)

SCC2013 - Citizen science - Helen Roy
SCC2013 - Citizen science - Helen RoySCC2013 - Citizen science - Helen Roy
SCC2013 - Citizen science - Helen Roy
 
Code for Africa - Building Demand-driven + Citizen-focused Open Data Ecosystems
Code for Africa - Building Demand-driven + Citizen-focused Open Data EcosystemsCode for Africa - Building Demand-driven + Citizen-focused Open Data Ecosystems
Code for Africa - Building Demand-driven + Citizen-focused Open Data Ecosystems
 
Enterprise 2.0 - Enabling change or part of the problem?
Enterprise 2.0 - Enabling change or part of the problem?Enterprise 2.0 - Enabling change or part of the problem?
Enterprise 2.0 - Enabling change or part of the problem?
 
Vip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by SymantecVip strong authentication : No Passwords - infographic by Symantec
Vip strong authentication : No Passwords - infographic by Symantec
 
The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
National identity strategy presentation may 10, 2016
National identity strategy  presentation may 10, 2016National identity strategy  presentation may 10, 2016
National identity strategy presentation may 10, 2016
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
 
Kerberos Authentication Process In Windows
Kerberos Authentication Process In WindowsKerberos Authentication Process In Windows
Kerberos Authentication Process In Windows
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
The Rise of the Citizen Data Scientist
The Rise of the Citizen Data ScientistThe Rise of the Citizen Data Scientist
The Rise of the Citizen Data Scientist
 
The connected economy mark skilton july 15 bright talk v2
The connected economy mark skilton july 15   bright talk v2The connected economy mark skilton july 15   bright talk v2
The connected economy mark skilton july 15 bright talk v2
 
E authentication template 050212
E authentication template 050212E authentication template 050212
E authentication template 050212
 
Project
ProjectProject
Project
 
Rails as iOS Application Backend
Rails as iOS Application BackendRails as iOS Application Backend
Rails as iOS Application Backend
 
Data Management for Citizen Science
Data Management for Citizen ScienceData Management for Citizen Science
Data Management for Citizen Science
 
Digital Transformation: Connected API Ecosystems
Digital Transformation: Connected API EcosystemsDigital Transformation: Connected API Ecosystems
Digital Transformation: Connected API Ecosystems
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...Image Based Password Authentication for Illiterate using Touch screen by Deep...
Image Based Password Authentication for Illiterate using Touch screen by Deep...
 

Similar to User Authentication for Government

Thornton e authentication guidance
Thornton   e authentication guidanceThornton   e authentication guidance
Thornton e authentication guidance
Hai Nguyen
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
Salvatore D'Agostino
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
Jips v07 no1_paper17_2
Jips v07 no1_paper17_2Jips v07 no1_paper17_2
Jips v07 no1_paper17_2Hai Nguyen
 
Jips v07 no1_paper17_3
Jips v07 no1_paper17_3Jips v07 no1_paper17_3
Jips v07 no1_paper17_3Hai Nguyen
 
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyJayHicks
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...Keynectis
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonEduserv
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
ynamoto
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
FIDO Alliance
 
Customer identity and kyc trends
Customer identity and kyc trendsCustomer identity and kyc trends
Customer identity and kyc trends
Satish Bhatia
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
indragantiSaiHiranma
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
Archana833240
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
Mark Diodati
 

Similar to User Authentication for Government (20)

Thornton e authentication guidance
Thornton   e authentication guidanceThornton   e authentication guidance
Thornton e authentication guidance
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Jips v07 no1_paper17_2
Jips v07 no1_paper17_2Jips v07 no1_paper17_2
Jips v07 no1_paper17_2
 
Jips v07 no1_paper17_3
Jips v07 no1_paper17_3Jips v07 no1_paper17_3
Jips v07 no1_paper17_3
 
Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read Only
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Why and how to implement strong authentication on the web cartes 2010 - pat...
Why and how to implement strong authentication on the web   cartes 2010 - pat...Why and how to implement strong authentication on the web   cartes 2010 - pat...
Why and how to implement strong authentication on the web cartes 2010 - pat...
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong AuthenticationTrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer - CTST 2009 - OpenID & Strong Authentication
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
Customer identity and kyc trends
Customer identity and kyc trendsCustomer identity and kyc trends
Customer identity and kyc trends
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 

More from Carahsoft

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark Facts
Carahsoft
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaCarahsoft
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement SpeakersCarahsoft
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitCarahsoft
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
Carahsoft
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
Carahsoft
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint Evolution
Carahsoft
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
Carahsoft
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center Virtualization
Carahsoft
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and Remediation
Carahsoft
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
Carahsoft
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstractCarahsoft
 

More from Carahsoft (13)

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark Facts
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream Agenda
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement Speakers
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media Summit
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint Evolution
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center Virtualization
 
Risk Management and Remediation
Risk Management and RemediationRisk Management and Remediation
Risk Management and Remediation
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

User Authentication for Government

  • 1. Symantec Government Technology Summit User Authentication for Government 20 March 2012 Nick Piazzola Sr. Director, Government Authentication Solutions Nick_Piazzola@symantec.com 443-604-4069
  • 2. E-Authentication in the Federal Government Players: President, OMB, Federal CIO/CIO Council, FICAM Policies/Mandates: • HSPD-12 • OMB: M-04-04, M-07-16, M-11-11 • Federal CIO Memo Technical Standards: • FIPS 201 • FIPS 199 • NIST SP 800-63-1 Implementation Standards/Guidance: • Federal PKI Certificate Policy • Trust Frameworks (Non-PKI)
  • 3. OMB M-04-04 E-Authentication Guidance  Electronic authentication (E-Authentication) is the process of establishing confidence in identities presented remotely over an open network to an information system.  OMB M-04-04 defines four levels of identity assurance for electronic transactions requiring authentication, where the required level of assurance is defined in terms of the consequences of authentication errors and the misuse of credentials.  Level 1 – Little or no confidence in the asserted identity  Level 2 - Some confidence in the asserted identity  Level 3 - High confidence in the asserted identity  Level 4 - Very high confidence in the asserted identity
  • 4. OMB M-04-04 E-Authentication Guidance • Requires agencies to review new and existing electronic transactions to ensure that authentication processes provide the appropriate level of assurance. 1. Conduct a risk assessment of the e-government system. 2. Map identified risks to the applicable assurance level. 3. Select technology based on e-authentication technical guidance. 4. Validate that the implemented system has achieved the required assurance level. 5. Periodically reassess the system to determine technology refresh requirements.
  • 5. Maximum Potential Impacts FIPS 199 Risk/Impact Profiles Assurance Level Impact Profiles Potential Impact Categories for 1 2 3 4 Authentication Errors Inconvenience, distress or damage to standing or Low Mod Mod High reputation Financial loss or agency liability Low Mod Mod High Harm to agency programs or public interests N/A Low Mod High Unauthorized release of sensitive information N/A Low Mod High Personal Safety N/A N/A Low Mod High Civil or criminal violations N/A Low Mod High
  • 6. NIST Special Publication SP 800-63-1 Electronic Authentication Guideline • Provides technical guidelines for Federal agencies implementing electronic authentication. • Defines electronic authentication (e-authentication) as the process of establishing confidence in identities electronically presented to an information system. • Applies to remote electronic authentication of users over open networks. • Defines four levels of increasing assurance: Levels 1,2,3,4 and the threats to be mitigated at each of these levels. • Defines technical requirements in the areas of identity proofing, registration, tokens, management processes, authentication protocols and related assertions.
  • 7. Strong Authentication A Combination of Two or More Authentication Factors Something You Know Something You Have Something You Are Username/Passwords Hardware OTP Token Mother’s Maiden Name Fingerprint Digital Certificate Transaction History Iris Pattern Smart Card
  • 8. E-Authentication Assurance Levels (OMB M-04-04) HSPD-12 PIV Card Increased Strength Multi-Factor Token PKI/ Digital Signature Biometrics One-Time Password Very High Knowledge-Based High PIN/User ID Medium Low Access to Applying Obtaining Employee for a Loan Govt. Screening Protected Website Online Benefits for a High Risk Job Increased Need for Identity Assurance
  • 9. User Authentication Product Family Public Key Infrastructure Symantec Identity Protection Fraud Detection Service Rules Eng. Behavior Eng. RISK SCORE PKI service issues certificates Shared cloud-based two-factor for strong authentication, authentication solution offering Risk-Based authentication and encryption and digital signing multiple token choices software-based fraud detection Government Enterprise eCommerce Financial Services
  • 10. Symantec Solutions for Authentication OTP Card SMS and Voice Browser Toolbar OTP Tokens Mobile OTP OTP USB PKI Tokens Smartcards Strong Authentication Digital (User and Site) Certificates SSL Cert Secure Seal VIP Fraud Detection Service VeriSign® Identity Protection Network (fraud intelligence and shared authentication)
  • 11. What PKI Enables… • Prevent unauthorized access Strong through enhanced authentication Authentication • Primary integration points: Web applications, remote access, desktop logon, and wireless • Provides data integrity and enable non- Digital repudiation for electronic transactions Signatures • Primary integration points: Email, Adobe, and custom applications • Protect sensitive information whether data is in transit or at rest Encryption • Primary integration points: Email, disk, file/folder, and databases
  • 12. Managed PKI Services for the Public Sector – Federal Shared Service Provider PKI Enables Federal agencies to comply with HSPD-12. VeriSign SSP PKI services and Card Management System are certified and on the GSA FIPS-201 Approved Products List (APL) – Non-Federal Shared Service Provider PKI Enterprise PKI for any organization needing interoperability with the Federal government. Provides interoperability with the Federal PKI at multiple assurance levels through cross-certification with the Federal Bridge Certification Authority (FBCA). – ECA Certificates Enable organizations, contractors and individuals to securely communicate with Federal, state and local government agencies.
  • 13. Non-Federal SSP PKI Customers U.S. Government – U.S. Nuclear Regulatory Commission – U.S. Senate – Dept of State (Millennium Challenge Corporation) State Government – State of Kansas – State of Colorado – State of California (CA Prison Healthcare Systems) – State of Virginia (Fairfax County Government) Universities – University of Houston Government Contractors – Booz Allen & Hamilton -General Dynamics – Noblis (Mitretek) -Dyncorp
  • 14. Symantec Validation and ID Protection User with Enterprise VIP Authentication Symantec VIP Service Token Consumer Portal, Business Partner Extranet Government Network
  • 15. Symantec Authentication Solution Strategy Directory/ Federal Bridge Trusted Agency OCSP Certification Authority Notary Agent RA Validation Services Federal/ Application Enabling Non- Federal Services SSP PKI Identity -authentication gateway Proofing -credential verification Services Levels 2/3/4 -single sign-on (SSO) VIP OTP Credentialing Services VIP Online KBA Existing Commercial Validation Services Credential Proofing Service Service
  • 16. Symantec/Experian Two Factor Authentication Solution Symantec Experian Symantec OTP OTP Token Precise ID Authentication (NIST 800-63-1 Level 3) Service User Online Government Application 1. NIST Level 3 Remote Identity Proofing using Experian Precise ID. 2. Multiple form-factors for OTP tokens for multiple platforms. 3. Two-Factor Authentication with PIN, OTP and in-the-cloud validation service.
  • 17. Summary • The two primary user authentication technologies in use today are PKI and OTP. Symantec delivers/supports both of these for government customers via cloud services. • While both PKI and OTP are used for e-authentication, only PKI can deliver a full suite of security services including confidentiality, integrity and non- repudiation. • OTP solutions are more likely to be used for remote access and external constituent access to government services because of their reduced cost and complexity. • NIST SP 800-63-1 Level 3 assurance is the target for most applications involving personally identifiable information and/or valuable transactions. • Experian and Symantec have collaborated to provide a suite of integrated identity proofing and authentication services that supports NIST SP 800-63-1. • In the future government agencies are expected to transition from being providers of credentials to accepting identity credentials issued by external identity providers.

Editor's Notes

  1. The best practice for authentication, and the solution required by many regulatory and industry mandates, is to deploy a strong authentication solution. But what is strong authentication? Strong authentication is a way of identifying a user or device using more that one authentication factor.An authentication factor can be something you know, something you have, or something you are:“Something you know” is the category into which traditional passwords fall. You know your username and password; however, it can be other information known only to you and the organization to which you need to authenticate.“Something you have” is the category of authentication factors that includes traditional one-time-password tokens but can also include a digital certificate installed on a user’s machine or on a smart card.“Something you are” is a way of authenticating based on a trait inextricably tied to the user, such as a fingerprint. More generically, “something you are” can also refer to the sum total of past behaviors and interactions the user has had with the organization – a user who behaves in a different way from you and the organization’s interactions with you in the past is probably not you.Strong authentication combines two or more of these factors, dramatically increasing the difficulty of impersonating an individual. If, for example, an enterprise requires a username/password with a one-time-password token to access the network, then someone would now need to steal both the user’s password and their token in order to be able to impersonate the user. This is far more difficult than simply stealing a password, and is therefore more resilient to attack.
  2. PKI requires several security elements to be working in concert in one complete solution.First, it’s Strong Authentication—two factor authentication that prevents unauthorized access to apps and remote access for your mobile workers—it’s part of that visible security profile that builds trust.Next, it’s Encryption—protecting data in transit or at rest.And finally, it’s about digital signatures—validating the integrity of the transaction by verifying that the user is who they say they are and validates document integrity—these digital credentials are very hard to spoof, break, or forge.PKI is all about trust. In fact, PKI is a hierarchical trust model. And PKI solutions can be trusted only as much as the implementation of PKI itself can be trusted. And that is where it is critical to understand that a successful, trustworthy PKI is far more than a piece of software that generate certificates.NEXT SLIDE