SlideShare a Scribd company logo
1 of 31
Download to read offline
<Insert Picture Here>




FICAM : Architecture and Design Strategies
Ramesh Nagappan
Principal Engineer (ISVe)
Ramesh.Nagappan@sun.com
The following is intended for information purposes
only, and may not be incorporated into any contract.
It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in
making purchasing decisions.
The development, release, and timing of any
features or functionality described for Oracle’s
products remains at the sole discretion of Oracle.
Agenda

 Quick overview on HSPD-12 Personal Identity Verification (PIV)
  Life-cycle Solution and its core components.
 Explore the Federal Identity Credential and Access Management
  (FICAM) guidelines and its key architectural and design
  requirements.
 Discuss the conceptual solution architecture and technology
  components for agency-wide FICAM.
 Role and relevance of adopting to Oracle Identity Management
  Solution Suite and its supporting technologies for FICAM.
The PIV Life-cycle
PIV Identity Management Activities (From registration to till its retirement)


                                   Identity
                                Registration


                                                         Identity
         PIV Credential
                                                       Enrolment &
           Termination
                                                       Adjudication




         PIV Credential                               PIV Credential
          Maintenance                                   Issuance



                               PIV Physical &
                               Logical Access
                                  Control
The PIV Ecosystem
Core technology components of a PIV Lifecycle
Logical PIV Architecture Solution
Putting it all together
PIV Solution from Oracle and ISV Partners
Pre-Integrated, Pre-Verified and Pre-Tested for PIV Deployment
<Insert Picture Here>


FICAM Architecture &
Design Strategies
FICAM – Overview
   Understanding its rationale
• Federal Identity, Credential and Access Management (FICAM)
  > Represents the policy and guidelines for consistent and comprehensive
    approach for government-wide Identity and Access Management.
  > Defines a set of goals and objectives for achieving the ICAM end-state.
      > Comply with Federal laws, Regulations, Standards and Governance
      > Facilitate E-Government by streamlining access to services
      > Improve Security posture across the Federal enterprise
      > Enable Trust and Interoperability
      > Reduce cost and increase efficiency
  > The President’s FY2010 budgets cites the development of FICAM.
• FICAM Part A: Defines the Segment architecture outlining the
  principles, use cases. transition roadmap and milestones.
  > To ensure alignment, clarity and interoperability across agencies.
• FICAM Part B: Defines the Implementation Planning and
  Guidance.
FICAM: Conceptual Model




                                     FICAM – Conceptual Model and its key Service Areas

Source: ICAM – The Future of Identity Management, Judith Spencer (GSA), Smartcard Alliance Conference 2009
FICAM : Segment Architecture Use Cases
     High-level use cases that describe ICAM activities

1.    Create and Maintain Digital Identity Record for Internal User.
2.    Create and Maintain Digital Identity Record for External User.
3.    Perform Background Investigation for Federal Applicant.
4.    Create, Issue and Maintain PIV card.
5.    Create, Issue and Maintain PKI credential.
6.    Create, Issue and Maintain Password Token.
7.    Provision and De-provision User Account for an Application.
8.    Grant Physical Access to Employee or Contractor.
9.    Grant Visitor or Local Access to Federally-controlled Facility or Site.
10. Grant Logical Access.
11. Secure Document or Communication with PKI.
12. Application of the ICAM use cases.
FICAM: Services Framework




                                                  FICAM – Services Framework


Source: ICAM – The Future of Identity Management, Judith Spencer (GSA), Smartcard Alliance Conference 2009
A Quick Look at PIV Card
   FIPS-201 Mandatory and Optional On-Card Credentials

Mandatory Credentials
 PIN (Personal Identification Number)
 Cardholder Unique Identifier (CHUID)
 PIV Authentication Data (asymmetric key pair
 and corresponding PKI certificate)
 Two biometric fingerprints (CBEFF)

Optional Credentials
 An asymmetric key pair and corresponding
                                                  Source: GSA USAccess
 certificate for digital signatures
 An asymmetric key pair and corresponding
 certificate for key management
 Asymmetric or symmetric card authentication
 keys for supporting additional physical access
 applications
 Symmetric key(s) associated with the card
 management system
FICAM : Agency-level Challenges
• Enforcing Identity Assurance Authentication Levels for
  Physical Access Control Systems (PACS) and Logical
  Access Control Systems (LACS).
  • Need for multi-factor Identity assurance using PIV
    credentials for accessing PACS and LACS.
     o   OMB M-04-04 E-Authentication Guidance established 4
         authentication levels.
     o   NIST SP 800-116 defines PIV credentials based Identity
         assurance levels for Uncontrolled/Controlled/Limited/Exclusion
         areas.
     o   Enabling PIV credentials for multi-factor authentication
         integrating Federal bridge CA and Biometric authentication
         middleware.
               Defines a “Measure of Trust” with confidence levels
               Labelled as SOME, HIGH and VERY HIGH and its required PIV
                credentials using CHUID, PKI and Biometrics.
FICAM : Agency-level Challenges… contd.
• Secure Documents and Communications with PKI.
  • Digitally signed document communication and validation of PIV credentials with PKI
    providers (FBCA).
  • Digitally signed authorizations/approvals using PIV credentials for provisioning/de-
    provisioning actions.
• Convergence of Physical and Logical Access Control
  using PIV Credentials.
  • Automated instantaneous provisioning/de-provisioning of User
    accounts, access privileges and related attributes to PACS and LACS.
       o    Synchronization of User profile attributes, PIV credentials (PKI /
            Biometrics), CRLs, roles, status/attribute changes, access privileges,
            rules and policies to/from target resources.
       o    Automation of Authorization and Approval/Denial workflows and
            notifications for provisioning and deprovisioning of user accounts and
            privileges.
FICAM : Agency-level Challenges… contd.
• Back-end Attribute Exchange (BAE) & Retrieval for Policy
  Enforcement and Decisions.
    •   To support agency-level Policy enforcement and decision making, requires
        use of PIV card holder specific attributes (not available on card).
    •   BAE mandates fetching PIV card-holder’s off-card information from an
        authoritative source (Attribute Authority).
    •   BAE Architecture and interface must be in accordance with the specifications
        (v1.0 May 2008) created by FICC AWF (ICAMSC).
    •   Adopting SAML and SPML for lookup/fetching BAE information from inter-
        agency applications.
E-Authentication Identity Assurance Levels
    NIST specified PIV Authentication Mechanisms : SP800-116
Measure of Trust for PACS & LACS

Level 4: VERY HIGH Confidence
   Attended Biometric (BIO-A)
   PIV Authentication Key (PKI)
   Card Authentication Key (CAK) + (BIO-A)
Level 3: High Confidence
   Biometric (BIO)
Level 2: Some Confidence
   Visual (VIS)
   Cardholder Unique Identifier (CHUID)
   Card Authentication Key (CAK)
E-Authentication Assurance for LACS
         PIV Card Credentials based Authentication: Web SSO/Federation


                                                          SAML 2.0
                                    Service Provider        X.509
                                          (SP)            Exchange




                                                                                   OCSP
                                                                                 Validation

                                                             Identity Provider
                                                                   (IDP)




                                                       SAML 2.0
                                                         X.509
                                                       Exchange
• All 4 Assurance Levels                Other
                                   Service Providers
• PKI, Biometrics, CHUID
                                         (SP)
• PKI credentials verified to CA
• Fingerprints/CBEFF Match to Card
PIV Authentication (PKI + Biometrics)




• Fingerprints (CBEFF) matched to PIV Card.
• PKI Credentials (CAK) will be validated using OCSP or CRL DP.
Convergence of PACS & LACS
Provisioning and De-Provisioning Credentials for PACS/LACS
Digitally-signed Authorizations




• FIPS 201 and SP 800-73 mandates the use of Digital Signature for
  “Integrity and Authenticity”
• IDMS manages the authorization workflow and authority approval and
  denials.
  >   Digitally signed approvals using PIV card credentials verified against a Federal Bridge CA/Validation
      Authority (via OCSP or CRLs).

• Digital authorizations are captured in audit logs as “XML Signature”.
Back-end Attribute Exchange (BAE)
   Exchange of PIV Card holder Information between Back-end Systems
 Mechanisms for securely exchanging PIV Card holder information
  between Relying parties and authoritative sources.
   •   Backend Attribute Exchange Architecture & Interface specification
       is defined by GSA HSPD-12 team (May 2008).
   •   Enables PIV card holder information to relying service provider
       applications.
   •   Relying parties (RP) act as service providers that relies on Off-the-
       card information (Not stored on card) from an authoritative source.
          o    PIV Card information intended for supporting access control decisions, detecting PIV
               card tampering, accessing other agency locations, medical emergency etc.
          o    Enabling access to User attribute profiles, roles, status/attribute changes to/from
               target PIV card holder privileged resources.

 BAE Specification defines the architecture and implementation
  models for secure attribute exchange .
   •   SAML v2. Attribute Sharing Profile for on-demand exchange of PIV
       card hold attributes as a single request/response.
          •    Mandates the requests/responses are signed (XML Signature) and encrypted (XML
               Encryption).
   •   SPML 2.0 based request/responses for supporting lookup
       /updates/ batch query and retrieval of multiple PIV card holders
       attributes.
BAE: SAML Attribute Sharing
     Adopting to SAMLv2 w. X.509 Attribute Sharing Profile
                                 1   SAML Authentication Request


                                 2 SAML Authentication   Statement

                                                                                   Valid:
                                                                                    …


                                             SSL/TLS                               OCSP
                                                                              Request/Response
                SP                                                       IDP
               (Fedlet)                                                                           Validation
                                 3     SAML Attribute Query             (Oracle
                                                                        Identity                   Authority
                                                                     Federation
                                 4   SAML Attribute Statement                                    (PKI Provider)
                                                                     /OpenSSO)



• User authentication using the Smartcard based PKI credentials.
   SP may validate the X.509 credentials directly with a PKI provider or by redirection to IDP.
• To perform authorization, the SP retrieve the user profile attributes from
  the IDP using SAML Attribute exchange.
   SAML Attribute Sharing supports X.509 authentication based systems (SAML v2.0 XASP).
   The IDP (Acting as Attribute authority) identified using pre-configured SAML Metadata info at
    SP.
BAE: SAML w. X.509 Attribute Sharing
Deployment Scenario using Oracle Identity Federation / OpenSSO
BAE: Using SPML 2.0 for Attribute Sharing
SPML based Attribute Lookup/Update from Service Provider
UltraSPARC T2+: For Wire-speed Security
RSA Performance on Oracle Sun CMT
Oracle Weblogic SSL Performance on Sun CMT Servers
Using PIV Cards in Sun Ray Environment
<Insert Picture Here>


Q&A



Ramesh Nagappan
Ramesh.Nagappan@Sun.com
ICAM - Demo Architecture review

More Related Content

What's hot

Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012steveramsthel
 
Pki enabling applications and mca implementation in tcs
Pki enabling applications and mca implementation in tcsPki enabling applications and mca implementation in tcs
Pki enabling applications and mca implementation in tcsH9460730008
 
Identity systems
Identity systemsIdentity systems
Identity systemsJim Fenton
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditBob Rhubart
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1aalwayson
 
Experiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceExperiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceEduserv Foundation
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Hitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Systems, Inc.
 
Globalnest powerpoint presentation
Globalnest powerpoint presentationGlobalnest powerpoint presentation
Globalnest powerpoint presentationMuhammed Hussain
 

What's hot (18)

Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Access management
Access managementAccess management
Access management
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Pki enabling applications and mca implementation in tcs
Pki enabling applications and mca implementation in tcsPki enabling applications and mca implementation in tcs
Pki enabling applications and mca implementation in tcs
 
Identity systems
Identity systemsIdentity systems
Identity systems
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to Audit
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
 
Experiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceExperiences in federated access control for UK e-Science
Experiences in federated access control for UK e-Science
 
IDM & IAM 2012
IDM & IAM 2012IDM & IAM 2012
IDM & IAM 2012
 
20120510 università
20120510 università20120510 università
20120510 università
 
ICAM Target Architecture
ICAM Target ArchitectureICAM Target Architecture
ICAM Target Architecture
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Hitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentation
 
Globalnest powerpoint presentation
Globalnest powerpoint presentationGlobalnest powerpoint presentation
Globalnest powerpoint presentation
 

Viewers also liked

Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy ArchitectureBob Rhubart
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysisGlory Maker
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysisGiuliano Resce
 
Data Envelopment Analysis
Data Envelopment AnalysisData Envelopment Analysis
Data Envelopment AnalysisAnna Rellama
 
DEA Presentation
DEA PresentationDEA Presentation
DEA Presentationbiggame8
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysisAjit Kumar Ray
 

Viewers also liked (7)

Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysis
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysis
 
Data Envelopment Analysis
Data Envelopment AnalysisData Envelopment Analysis
Data Envelopment Analysis
 
Data Envelopment Analysis
Data Envelopment AnalysisData Envelopment Analysis
Data Envelopment Analysis
 
DEA Presentation
DEA PresentationDEA Presentation
DEA Presentation
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysis
 

Similar to ICAM - Demo Architecture review

Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationFIDO Alliance
 
FICAM Impact On Enterprise Architecture And Applications
FICAM Impact On Enterprise Architecture And ApplicationsFICAM Impact On Enterprise Architecture And Applications
FICAM Impact On Enterprise Architecture And ApplicationsSalvatore D'Agostino
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber SecurityArtanContracting
 
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...WSO2
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meetingfcleary
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...Sagara Gunathunga
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2dP2PSystem
 
Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyFIDO Alliance
 
PCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management CompliancePCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management ComplianceControlCase
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Fully Automated Billing Verification
Fully Automated Billing VerificationFully Automated Billing Verification
Fully Automated Billing VerificationReidar Sunde
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 

Similar to ICAM - Demo Architecture review (20)

Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
FICAM Impact On Enterprise Architecture And Applications
FICAM Impact On Enterprise Architecture And ApplicationsFICAM Impact On Enterprise Architecture And Applications
FICAM Impact On Enterprise Architecture And Applications
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
E collaborationscottrea
E collaborationscottreaE collaborationscottrea
E collaborationscottrea
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
 
Issa fi xs briefing
Issa fi xs briefingIssa fi xs briefing
Issa fi xs briefing
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
 
Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case Study
 
PCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management CompliancePCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management Compliance
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Fully Automated Billing Verification
Fully Automated Billing VerificationFully Automated Billing Verification
Fully Automated Billing Verification
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 

More from Ramesh Nagappan

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Ramesh Nagappan
 
Interoperable Provisioning in a distributed world
Interoperable Provisioning in a distributed worldInteroperable Provisioning in a distributed world
Interoperable Provisioning in a distributed worldRamesh Nagappan
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterRamesh Nagappan
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Ramesh Nagappan
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...Ramesh Nagappan
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyRamesh Nagappan
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformRamesh Nagappan
 
Java Platform Security Architecture
Java Platform Security ArchitectureJava Platform Security Architecture
Java Platform Security ArchitectureRamesh Nagappan
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSORamesh Nagappan
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityRamesh Nagappan
 

More from Ramesh Nagappan (13)

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005
 
Interoperable Provisioning in a distributed world
Interoperable Provisioning in a distributed worldInteroperable Provisioning in a distributed world
Interoperable Provisioning in a distributed world
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperCluster
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted Cryptography
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card Platform
 
Java Platform Security Architecture
Java Platform Security ArchitectureJava Platform Security Architecture
Java Platform Security Architecture
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

ICAM - Demo Architecture review

  • 1. <Insert Picture Here> FICAM : Architecture and Design Strategies Ramesh Nagappan Principal Engineer (ISVe) Ramesh.Nagappan@sun.com
  • 2. The following is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 3. Agenda  Quick overview on HSPD-12 Personal Identity Verification (PIV) Life-cycle Solution and its core components.  Explore the Federal Identity Credential and Access Management (FICAM) guidelines and its key architectural and design requirements.  Discuss the conceptual solution architecture and technology components for agency-wide FICAM.  Role and relevance of adopting to Oracle Identity Management Solution Suite and its supporting technologies for FICAM.
  • 4.
  • 5. The PIV Life-cycle PIV Identity Management Activities (From registration to till its retirement) Identity Registration Identity PIV Credential Enrolment & Termination Adjudication PIV Credential PIV Credential Maintenance Issuance PIV Physical & Logical Access Control
  • 6. The PIV Ecosystem Core technology components of a PIV Lifecycle
  • 7. Logical PIV Architecture Solution Putting it all together
  • 8. PIV Solution from Oracle and ISV Partners Pre-Integrated, Pre-Verified and Pre-Tested for PIV Deployment
  • 9. <Insert Picture Here> FICAM Architecture & Design Strategies
  • 10. FICAM – Overview Understanding its rationale • Federal Identity, Credential and Access Management (FICAM) > Represents the policy and guidelines for consistent and comprehensive approach for government-wide Identity and Access Management. > Defines a set of goals and objectives for achieving the ICAM end-state. > Comply with Federal laws, Regulations, Standards and Governance > Facilitate E-Government by streamlining access to services > Improve Security posture across the Federal enterprise > Enable Trust and Interoperability > Reduce cost and increase efficiency > The President’s FY2010 budgets cites the development of FICAM. • FICAM Part A: Defines the Segment architecture outlining the principles, use cases. transition roadmap and milestones. > To ensure alignment, clarity and interoperability across agencies. • FICAM Part B: Defines the Implementation Planning and Guidance.
  • 11. FICAM: Conceptual Model FICAM – Conceptual Model and its key Service Areas Source: ICAM – The Future of Identity Management, Judith Spencer (GSA), Smartcard Alliance Conference 2009
  • 12. FICAM : Segment Architecture Use Cases High-level use cases that describe ICAM activities 1. Create and Maintain Digital Identity Record for Internal User. 2. Create and Maintain Digital Identity Record for External User. 3. Perform Background Investigation for Federal Applicant. 4. Create, Issue and Maintain PIV card. 5. Create, Issue and Maintain PKI credential. 6. Create, Issue and Maintain Password Token. 7. Provision and De-provision User Account for an Application. 8. Grant Physical Access to Employee or Contractor. 9. Grant Visitor or Local Access to Federally-controlled Facility or Site. 10. Grant Logical Access. 11. Secure Document or Communication with PKI. 12. Application of the ICAM use cases.
  • 13. FICAM: Services Framework FICAM – Services Framework Source: ICAM – The Future of Identity Management, Judith Spencer (GSA), Smartcard Alliance Conference 2009
  • 14. A Quick Look at PIV Card FIPS-201 Mandatory and Optional On-Card Credentials Mandatory Credentials PIN (Personal Identification Number) Cardholder Unique Identifier (CHUID) PIV Authentication Data (asymmetric key pair and corresponding PKI certificate) Two biometric fingerprints (CBEFF) Optional Credentials An asymmetric key pair and corresponding Source: GSA USAccess certificate for digital signatures An asymmetric key pair and corresponding certificate for key management Asymmetric or symmetric card authentication keys for supporting additional physical access applications Symmetric key(s) associated with the card management system
  • 15. FICAM : Agency-level Challenges • Enforcing Identity Assurance Authentication Levels for Physical Access Control Systems (PACS) and Logical Access Control Systems (LACS). • Need for multi-factor Identity assurance using PIV credentials for accessing PACS and LACS. o OMB M-04-04 E-Authentication Guidance established 4 authentication levels. o NIST SP 800-116 defines PIV credentials based Identity assurance levels for Uncontrolled/Controlled/Limited/Exclusion areas. o Enabling PIV credentials for multi-factor authentication integrating Federal bridge CA and Biometric authentication middleware.  Defines a “Measure of Trust” with confidence levels  Labelled as SOME, HIGH and VERY HIGH and its required PIV credentials using CHUID, PKI and Biometrics.
  • 16. FICAM : Agency-level Challenges… contd. • Secure Documents and Communications with PKI. • Digitally signed document communication and validation of PIV credentials with PKI providers (FBCA). • Digitally signed authorizations/approvals using PIV credentials for provisioning/de- provisioning actions. • Convergence of Physical and Logical Access Control using PIV Credentials. • Automated instantaneous provisioning/de-provisioning of User accounts, access privileges and related attributes to PACS and LACS. o Synchronization of User profile attributes, PIV credentials (PKI / Biometrics), CRLs, roles, status/attribute changes, access privileges, rules and policies to/from target resources. o Automation of Authorization and Approval/Denial workflows and notifications for provisioning and deprovisioning of user accounts and privileges.
  • 17. FICAM : Agency-level Challenges… contd. • Back-end Attribute Exchange (BAE) & Retrieval for Policy Enforcement and Decisions. • To support agency-level Policy enforcement and decision making, requires use of PIV card holder specific attributes (not available on card). • BAE mandates fetching PIV card-holder’s off-card information from an authoritative source (Attribute Authority). • BAE Architecture and interface must be in accordance with the specifications (v1.0 May 2008) created by FICC AWF (ICAMSC). • Adopting SAML and SPML for lookup/fetching BAE information from inter- agency applications.
  • 18. E-Authentication Identity Assurance Levels NIST specified PIV Authentication Mechanisms : SP800-116 Measure of Trust for PACS & LACS Level 4: VERY HIGH Confidence Attended Biometric (BIO-A) PIV Authentication Key (PKI) Card Authentication Key (CAK) + (BIO-A) Level 3: High Confidence Biometric (BIO) Level 2: Some Confidence Visual (VIS) Cardholder Unique Identifier (CHUID) Card Authentication Key (CAK)
  • 19. E-Authentication Assurance for LACS PIV Card Credentials based Authentication: Web SSO/Federation SAML 2.0 Service Provider X.509 (SP) Exchange OCSP Validation Identity Provider (IDP) SAML 2.0 X.509 Exchange • All 4 Assurance Levels Other Service Providers • PKI, Biometrics, CHUID (SP) • PKI credentials verified to CA • Fingerprints/CBEFF Match to Card
  • 20. PIV Authentication (PKI + Biometrics) • Fingerprints (CBEFF) matched to PIV Card. • PKI Credentials (CAK) will be validated using OCSP or CRL DP.
  • 21. Convergence of PACS & LACS Provisioning and De-Provisioning Credentials for PACS/LACS
  • 22. Digitally-signed Authorizations • FIPS 201 and SP 800-73 mandates the use of Digital Signature for “Integrity and Authenticity” • IDMS manages the authorization workflow and authority approval and denials. > Digitally signed approvals using PIV card credentials verified against a Federal Bridge CA/Validation Authority (via OCSP or CRLs). • Digital authorizations are captured in audit logs as “XML Signature”.
  • 23. Back-end Attribute Exchange (BAE) Exchange of PIV Card holder Information between Back-end Systems  Mechanisms for securely exchanging PIV Card holder information between Relying parties and authoritative sources. • Backend Attribute Exchange Architecture & Interface specification is defined by GSA HSPD-12 team (May 2008). • Enables PIV card holder information to relying service provider applications. • Relying parties (RP) act as service providers that relies on Off-the- card information (Not stored on card) from an authoritative source. o PIV Card information intended for supporting access control decisions, detecting PIV card tampering, accessing other agency locations, medical emergency etc. o Enabling access to User attribute profiles, roles, status/attribute changes to/from target PIV card holder privileged resources.  BAE Specification defines the architecture and implementation models for secure attribute exchange . • SAML v2. Attribute Sharing Profile for on-demand exchange of PIV card hold attributes as a single request/response. • Mandates the requests/responses are signed (XML Signature) and encrypted (XML Encryption). • SPML 2.0 based request/responses for supporting lookup /updates/ batch query and retrieval of multiple PIV card holders attributes.
  • 24. BAE: SAML Attribute Sharing Adopting to SAMLv2 w. X.509 Attribute Sharing Profile 1 SAML Authentication Request 2 SAML Authentication Statement Valid: … SSL/TLS OCSP Request/Response SP IDP (Fedlet) Validation 3 SAML Attribute Query (Oracle Identity Authority Federation 4 SAML Attribute Statement (PKI Provider) /OpenSSO) • User authentication using the Smartcard based PKI credentials.  SP may validate the X.509 credentials directly with a PKI provider or by redirection to IDP. • To perform authorization, the SP retrieve the user profile attributes from the IDP using SAML Attribute exchange.  SAML Attribute Sharing supports X.509 authentication based systems (SAML v2.0 XASP).  The IDP (Acting as Attribute authority) identified using pre-configured SAML Metadata info at SP.
  • 25. BAE: SAML w. X.509 Attribute Sharing Deployment Scenario using Oracle Identity Federation / OpenSSO
  • 26. BAE: Using SPML 2.0 for Attribute Sharing SPML based Attribute Lookup/Update from Service Provider
  • 27. UltraSPARC T2+: For Wire-speed Security
  • 28. RSA Performance on Oracle Sun CMT Oracle Weblogic SSL Performance on Sun CMT Servers
  • 29. Using PIV Cards in Sun Ray Environment
  • 30. <Insert Picture Here> Q&A Ramesh Nagappan Ramesh.Nagappan@Sun.com