SlideShare a Scribd company logo
1 of 21
Web Authentication
    Strategies
    Virginia Security Summit
     Identity Management
         April 27, 2009
                                      Brian Kelly
                                       Vice President
                                    TrustBearer Labs
                    a partner company of VeriSign, Inc.
Simplify
  Techniques and technology that can be
leveraged to make managing user accounts
         easier and more secure

      SAML



                  2
Know your users
Employees                 Citizens
 • 1,000+                  • 100,000+
 • Identity vetted         • Internet-based identity
 • Bulk-provisioning       • On-the-fly-provisioning
   (with official email)        (with Internet email)
 • IT staff to handle      • Automated support
   support requests            requests

                           3
Identity vetting
• Employee identities are vetted in advance,
  in-person
• Citizens may need vetting, depending on
  services accessed, but in-person vetting is
  rarely available




                      4
Account Provisioning
• Employees are typically assigned an email
  address, network account, and temporary
  password after hire.

  ‣ Then (some) applications are provisioned
• Citizens typically request an account after
  proving their identity (e.g. driver’s license
  number & date of birth)

  ‣ Then username & password are created,
    and (one) application is provisioned.
                       5
Support
• Help desk staff to support employee
  requests (e.g. password reset, new
  application access)
• Citizen requests may be of much higher
  volume, which require more automated
  support options




                     6
Making it easier



       7
Employee Web Apps
• Use a single SAML Identity Provider
  Make web apps SAML consumers
• Provision all apps using SAML user IDs
• Employee authenticates in once place and
  gets access to all provisioned applications
• Account support is centralized
• Can still use OTP, smart card, or password
                          (more on that later)
                      8
How does SAML work?
                                                   verifies signed
                                                     assertions
                                                                    User is logged-in
                            creates signed
                                                      App 1           to web app
        Login Web Page
                              assertions
user

                              SAML ID                 App 2
user
                              Provider

user                     authenticates users          App 3

                                    Other      SAML Service Providers
                         LDAP                      (consumers)
                                    Auth.



                                       9
Citizen Web Apps
• Make web apps OpenID Relying Parties and
  stop managing usernames & passwords
• Use existing ID vetting process or
  outsource
• Add an Extended Validation SSL certificate
• Citizen gets to reuse existing credentials
• Can still use OTP, smart card, or password
• Account support is partially outsourced
                     10
How does OpenID work?
             Citizen Web App
                                            Web app           Citizen is logged-in
                Page Login
                                       verifies previously         to web app
user                                   enrolled OpenID
                                          Citizen
user                                      Web App
                                            OpenID
user                                     Relying Party
                                          (consumer)

                                               Citizen identity vetting could
                                               take place during OpenID
                                               enrollment stage.
       User authenticates to IDP and
        enables account to be used
           with government site
                                          11
SAML
                                  • Consumer focused
• Enterprise focused
                                  • On-the-fly-provisioning
• Bulk-provisioning
  (on-the-fly supported)
                                  • Many identity providers
• Identity Provider is
                                    available online for
  internal to
                                    consumers to choose
  organization (typically)
                                  • Mostly open-source,
• Commercial and OS
                                    and COTS services
  products available

                             12
What about
authentication options?


           13
End-point authentication is
 agnostic of SSO standard
All can be supported by SAML or OpenID
•   username / password
•   one time password (OTP) tokens
•   smart cards (e.g. PIV, CAC, FRAC)
•   client digital certificates
•   information cards
•   biometrics
•   image verification

                      14
Identity Provider decides end-
    point authentication options
• Google,Yahoo, AOL: password
• myOpenID: password, phone verify, client certificate, info card
• VeriSign PIP: OTP, client certificate, info card, EV SSL
• TrustBearer: smart cards (CAC, PIV, etc.), biometrics
• Vidoop: Image recognition (CAPTCHA)
  The IdP can specify authentication methods used
   to the RP, which can even request preferences.
                                  15
What authentication
method to choose?


         16
Required Protections for OMB’s
    E-Auth Assurance Levels
                         Level 1 Level 2 Level 3 Level 4
    Protect against
                               ✓   ✓       ✓       ✓
  On-line guessing
       Replay                  ✓   ✓       ✓       ✓
    Eavesdropper                   ✓       ✓       ✓
Verifier impersonation              ✓       ✓       ✓
 Man-in-the-middle                         ✓       ✓
  Session hijacking                                ✓

  From NIST SP 800-63 p. 39
                          17
Token Types Allowed At Each
        Assurance Level
                           Level 1 Level 2 Level 3 Level 4
       Token Type

                                 ✓   ✓       ✓       ✓
   Hard Crypto Token

                                 ✓   ✓       ✓
One-time password device

                                 ✓   ✓       ✓
    Soft crypto token

                                 ✓   ✓
   Passwords & PINs


    From NIST SP 800-63 p. 39
                            18
OpenID Provider Authentication
   Policy Extension (PAPE)
• Provides a way for Relying Parties to
  request / view authentication policies of
  Identity Provider
• Policies: Phishing-resistant, Multi-Factor, and
  Physical Multi-Factor
• Preferred authentication levels
  e.g. NIST: 1, 2, 3, 4
 SAML also allows authentication attributes
        to be added to a message
                          19
In summary
• You have better options than managing
  usernames & passwords for every web app
• SAML has strong enterprise support
• OpenID is convenient for Internet users
• There are many end-point authentication
  options for each SSO option.
• Perform a risk-based analysis on your app
  to choose an authentication type
                     20
Thank you
http://trustbearer.com
http://www.verisign.com/authentication/
                                                  Brian Kelly
                                    brian.kelly@trustbearer.com
                                        twitter.com/TrustBearer
                                                   Vice President
                                                TrustBearer Labs
                                a partner company of VeriSign, Inc.

More Related Content

What's hot

Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
Smart Card Authentication
Smart Card AuthenticationSmart Card Authentication
Smart Card Authentication
Dan Usher
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkOAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
Nov Matake
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
Hai Nguyen
 

What's hot (20)

Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Smart Card Authentication
Smart Card AuthenticationSmart Card Authentication
Smart Card Authentication
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望LINEのFIDO導入と将来展望
LINEのFIDO導入と将来展望
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management Provider
 
Sign in with Apple
Sign in with Apple Sign in with Apple
Sign in with Apple
 
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tkOAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
OAuth 2.0 & OpenID Connect @ OpenSource Conference 2011 Tokyo #osc11tk
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
Implementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 PresentationImplementing MITREid - CIS 2014 Presentation
Implementing MITREid - CIS 2014 Presentation
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security Keys
 
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity ServerWSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
 
エンタープライズの視点からFIDOとFederationのビジネスを考える
エンタープライズの視点からFIDOとFederationのビジネスを考えるエンタープライズの視点からFIDOとFederationのビジネスを考える
エンタープライズの視点からFIDOとFederationのビジネスを考える
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
Securing a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web AuthenticationSecuring a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web Authentication
 

Viewers also liked

Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
Alexandru Pasaila
 
Web authentication
Web authenticationWeb authentication
Web authentication
Pradeep J V
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
ejlp12
 

Viewers also liked (15)

Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Web authentication
Web authenticationWeb authentication
Web authentication
 
The wonderful story of Web Authentication and Single-Sign On
The wonderful story of Web Authentication and Single-Sign OnThe wonderful story of Web Authentication and Single-Sign On
The wonderful story of Web Authentication and Single-Sign On
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
[JDLL 2016] OpenID Connect et FranceConnect
[JDLL 2016] OpenID Connect et FranceConnect[JDLL 2016] OpenID Connect et FranceConnect
[JDLL 2016] OpenID Connect et FranceConnect
 
Pmbok 4th edition chapter 11 - Project Risk Management
Pmbok 4th edition   chapter 11 - Project Risk ManagementPmbok 4th edition   chapter 11 - Project Risk Management
Pmbok 4th edition chapter 11 - Project Risk Management
 
PMP Training - 11 project risk management
PMP Training - 11 project risk managementPMP Training - 11 project risk management
PMP Training - 11 project risk management
 
Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009Implementing Enterprise Risk Management with ISO 31000:2009
Implementing Enterprise Risk Management with ISO 31000:2009
 
The Purpose And Goals Of Risk Management
The Purpose And Goals Of Risk ManagementThe Purpose And Goals Of Risk Management
The Purpose And Goals Of Risk Management
 
Project Risk Management - PMBOK5
Project Risk Management - PMBOK5Project Risk Management - PMBOK5
Project Risk Management - PMBOK5
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Similar to TrustBearer - Virginia Security Summit - Web Authentication Strategies - April 2009

TrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACMTrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACM
hackingtrialpay
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
frontone
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaication
Sean Xiong
 

Similar to TrustBearer - Virginia Security Summit - Web Authentication Strategies - April 2009 (20)

Protecting Online Identities - MIX09
Protecting Online Identities - MIX09Protecting Online Identities - MIX09
Protecting Online Identities - MIX09
 
Protecting Online Identities
Protecting Online IdentitiesProtecting Online Identities
Protecting Online Identities
 
Protecting Online Identities
Protecting Online IdentitiesProtecting Online Identities
Protecting Online Identities
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...
 
Identiverse - Microservices Security
Identiverse - Microservices SecurityIdentiverse - Microservices Security
Identiverse - Microservices Security
 
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
 
TrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACMTrialPay Security Tech Talk at Stanford ACM
TrialPay Security Tech Talk at Stanford ACM
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
 
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
 
Securing Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudSecuring Microservices in Hybrid Cloud
Securing Microservices in Hybrid Cloud
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Ib final project
Ib final projectIb final project
Ib final project
 
OAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST ServicesOAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST Services
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaication
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 

TrustBearer - Virginia Security Summit - Web Authentication Strategies - April 2009

  • 1. Web Authentication Strategies Virginia Security Summit Identity Management April 27, 2009 Brian Kelly Vice President TrustBearer Labs a partner company of VeriSign, Inc.
  • 2. Simplify Techniques and technology that can be leveraged to make managing user accounts easier and more secure SAML 2
  • 3. Know your users Employees Citizens • 1,000+ • 100,000+ • Identity vetted • Internet-based identity • Bulk-provisioning • On-the-fly-provisioning (with official email) (with Internet email) • IT staff to handle • Automated support support requests requests 3
  • 4. Identity vetting • Employee identities are vetted in advance, in-person • Citizens may need vetting, depending on services accessed, but in-person vetting is rarely available 4
  • 5. Account Provisioning • Employees are typically assigned an email address, network account, and temporary password after hire. ‣ Then (some) applications are provisioned • Citizens typically request an account after proving their identity (e.g. driver’s license number & date of birth) ‣ Then username & password are created, and (one) application is provisioned. 5
  • 6. Support • Help desk staff to support employee requests (e.g. password reset, new application access) • Citizen requests may be of much higher volume, which require more automated support options 6
  • 8. Employee Web Apps • Use a single SAML Identity Provider Make web apps SAML consumers • Provision all apps using SAML user IDs • Employee authenticates in once place and gets access to all provisioned applications • Account support is centralized • Can still use OTP, smart card, or password (more on that later) 8
  • 9. How does SAML work? verifies signed assertions User is logged-in creates signed App 1 to web app Login Web Page assertions user SAML ID App 2 user Provider user authenticates users App 3 Other SAML Service Providers LDAP (consumers) Auth. 9
  • 10. Citizen Web Apps • Make web apps OpenID Relying Parties and stop managing usernames & passwords • Use existing ID vetting process or outsource • Add an Extended Validation SSL certificate • Citizen gets to reuse existing credentials • Can still use OTP, smart card, or password • Account support is partially outsourced 10
  • 11. How does OpenID work? Citizen Web App Web app Citizen is logged-in Page Login verifies previously to web app user enrolled OpenID Citizen user Web App OpenID user Relying Party (consumer) Citizen identity vetting could take place during OpenID enrollment stage. User authenticates to IDP and enables account to be used with government site 11
  • 12. SAML • Consumer focused • Enterprise focused • On-the-fly-provisioning • Bulk-provisioning (on-the-fly supported) • Many identity providers • Identity Provider is available online for internal to consumers to choose organization (typically) • Mostly open-source, • Commercial and OS and COTS services products available 12
  • 14. End-point authentication is agnostic of SSO standard All can be supported by SAML or OpenID • username / password • one time password (OTP) tokens • smart cards (e.g. PIV, CAC, FRAC) • client digital certificates • information cards • biometrics • image verification 14
  • 15. Identity Provider decides end- point authentication options • Google,Yahoo, AOL: password • myOpenID: password, phone verify, client certificate, info card • VeriSign PIP: OTP, client certificate, info card, EV SSL • TrustBearer: smart cards (CAC, PIV, etc.), biometrics • Vidoop: Image recognition (CAPTCHA) The IdP can specify authentication methods used to the RP, which can even request preferences. 15
  • 17. Required Protections for OMB’s E-Auth Assurance Levels Level 1 Level 2 Level 3 Level 4 Protect against ✓ ✓ ✓ ✓ On-line guessing Replay ✓ ✓ ✓ ✓ Eavesdropper ✓ ✓ ✓ Verifier impersonation ✓ ✓ ✓ Man-in-the-middle ✓ ✓ Session hijacking ✓ From NIST SP 800-63 p. 39 17
  • 18. Token Types Allowed At Each Assurance Level Level 1 Level 2 Level 3 Level 4 Token Type ✓ ✓ ✓ ✓ Hard Crypto Token ✓ ✓ ✓ One-time password device ✓ ✓ ✓ Soft crypto token ✓ ✓ Passwords & PINs From NIST SP 800-63 p. 39 18
  • 19. OpenID Provider Authentication Policy Extension (PAPE) • Provides a way for Relying Parties to request / view authentication policies of Identity Provider • Policies: Phishing-resistant, Multi-Factor, and Physical Multi-Factor • Preferred authentication levels e.g. NIST: 1, 2, 3, 4 SAML also allows authentication attributes to be added to a message 19
  • 20. In summary • You have better options than managing usernames & passwords for every web app • SAML has strong enterprise support • OpenID is convenient for Internet users • There are many end-point authentication options for each SSO option. • Perform a risk-based analysis on your app to choose an authentication type 20
  • 21. Thank you http://trustbearer.com http://www.verisign.com/authentication/ Brian Kelly brian.kelly@trustbearer.com twitter.com/TrustBearer Vice President TrustBearer Labs a partner company of VeriSign, Inc.