DoD Identity & Access Management (IdAM) Portfolio Overview

Size: px
Start display at page:

Download "DoD Identity & Access Management (IdAM) Portfolio Overview"

Transcription

1 DoD Identity & Access Management (IdAM) Portfolio Overview UNCLASSIFIED DISA Enterprise Services Directorate (ESD) 17 July 2013

2 Overview IdAM Concepts & IdAM Portfolio 7/15/13 UNCLASSIFIED 1

3 IdAM Overview Identity and Access Management (IdAM) is the combination of technical systems, policies and processes that create, define, and govern the utilization and safeguarding of identity information, as well as managing the relationship between an entity and the resources to which access is needed. IdAM can be divided into three fundamental capabilities: Manage Digital Identities, Authenticate Users, and Authorize Access to Resources. IdAM supports the warfighter by creating assured identity and access management services for the DoD Enterprise. 7/15/13 UNCLASSIFIED 2

4 IdAM in a Nutshell IdAM Authentication Decision Is the identity valid / authenticated? 2 Resources I am John. Here is my identity credential. Can I access the resource? 1 Resource Access 5 Is John authorized to access the resource? Give access to resource? 3 4 Web Page, File, etc Authorization Decision 7/15/13 UNCLASSIFIED 3

5 IdAM Terms Digital Identity: the electronic representation of an individual s identity Authentication: process of verifying that a claimed identity is genuine and based on valid credentials Authorization and Access: processes of granting or denying specific requests for obtaining and using information processing services or data Source: Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance, version 1.0, 10 Nov /15/13 UNCLASSIFIED 4

6 IdAM Portfolio Joint Defense Information Systems Agency (DISA) /Defense Manpower Data Center (DMDC)/National Security Agency (NSA) organizational construct for managing an array of core material solutions to enable DoD enterprise-wide digital identity, authentication, and authorization capabilities Creates a foundation for building a secure and trusted computing environment Provides the capabilities for secure enterprise information sharing Utilizes account and attribute management services, assured digital identity capabilities, automated account provisioning, and attribute based access control 7/15/13 UNCLASSIFIED 5

7 IdAM Portfolio High-Level Capability Model Provide Enterprise IdAM Services (CONOPS, Governance,Target State & Vision, Architecture, Data Quality) Manage Digital Identities Authenticate Users Authorize Access to Resources Enterprise Identity Attribute Services (EIAS) Enterprise Directory Services (EDS) Batch Broker Service (BBS) DoD Enterprise White Pages Identity Synchronization Services (IdSS) Enterprise Directory Query Service (EDQS) IdSS Machine Interface (IdMI) milconnect Real-Time Broker Service (RBS) Authentication Gateway Service (AGS) DoD Visitor Global Directory Service (GDS) Public Key Enablement (PKE) Public Key Infrastructure (PKI) Attribute Based Access Control (ABAC) Legend Service provided by DISA Service provided by DISA in partnership with NSA Service provided by DMDC Suite of services- not an independent service 7/15/13 UNCLASSIFIED 6

8 Overview IdAM Portfolio Activities 7/15/13 UNCLASSIFIED 7

9 IdAM CONOPS & Governance IdAM Policy and Guidance Developed by DoD CIO in coordination with DISA and DMDC Combatant Commands, Services, and Agencies (CC/S/As) included in review and adjudication Ensures alignment to existing DoD policy and guidance Mandates usage of enterprise IdAM services and defines relevant processes and procedures IdAM Services Developed, deployed, and maintained by DISA and DMDC Other entities such as NSA may be included in the fielding process where appropriate Coordination with CC/S/As for requirements development and pilots Services primarily deployed at enterprise level within Defense Enterprise Computing Centers (DECCs) Specific services deployed locally at CC/S/A level (DoD Visitor, AGS) DISA and DMDC coordinate with CC/S/As to integrate IdAM services into local CC/S/A infrastructures 7/15/13 UNCLASSIFIED 8

10 IdAM Target State & Vision IdAM Goals Mission-enabling capabilities: Enterprise User capability I can go anywhere in the DoD, login, and be productive automatic and data driven Security: IT resources protected from inappropriate modification or disclosure and users are able to be held accountable for their actions automatic and data driven Efficiency: reduce required resources automatic and data driven IdAM Target State Capabilities used by all DoD IT devices, systems, applications & services on NIPRNET, SIPRNET, and commercial enclaves Same user identifiers, attributes, and credentials used everywhere, managed automatically from accountable data source to consumer Persona-based from DMDC s Person Data Repository (PDR) and DISA s Global Directory Service (GDS) for users with DoD PKI credentials Accountable source-based for other users (other federal, coalition, state & local, etc.) Dynamic authentication, authorization and access control Automatic and user data driven (all use cases) Directly or through gateway services DoD-wide people and organization discovery services 7/15/13 UNCLASSIFIED 9

11 IdAM Portfolio Architecture Persona Contact Information Persona Contact Information PKI Authentication Brokered Authentication PKI Authentication Certificates & CRLs PKE milconnect White Pages Enterprise Applications / Services Local Applications / Services AGS DoD Visitor PDR BBS RBS EIAS EDQS IdSS IdMI EASF CC/S/A Directories PEP ABAC Attribute Broker PDP Policy Store PAP PKI Validation PKI RCVS PKI Validation CA Certificates GDS Legend Identity Information Flow Authentication Information Flow Authorization Information Flow Identity Service Authentication Service Authorization Service Service External to IdAM IdAM Services Consumer ABAC: Attribute Based Access Control AGS: Authentication Gateway Service BBS: Batch Broker Service CA: Certificate Authority CC/S/A: Combatant Commands/Services/Agencies CRL: Certificate Revocation List EASF: Enterprise Applications Services Forest EDQS: Enterprise Directory Query Service EIAS: Enterprise Identity Attribute Service GDS: Global Directory Service IdMI: IdSS Machine Interface IdSS: Identity Synchronization Service PAP: Policy Administration Point PDP: Policy Decision Point PDR: Person Data Repository PEP: Policy Enforcement Point PKE: Public Key Enablement PKI: Public Key Infrastructure RBS: Real-time Broker Service RCVS: Robust Certificate Validation Service 7/15/13 UNCLASSIFIED 10

12 Data Quality Initiative The Data Quality Initiative is an initiative to improve and maintain the accuracy of enterprise identity and organizational contact information Leverages milconnect to provide users with a self-service portal to manage their contact data in DMDC for access via RBS, BBS, and IdSS Currently coordinating with CC/S/As to provide DMDC with initial authoritative data Currently developing enterprise data specifications, including DoD IdAM Data Dictionary 7/15/13 UNCLASSIFIED 11

13 Overview Manage Digital Identities 7/15/13 UNCLASSIFIED 12

14 Enterprise Identity Attribute Service (EIAS) The Enterprise Identity Attribute Service (EIAS) distributes DoD person, persona, and personnel attributes to applications and services in a controlled, consistent, and secure manner for making authorization decisions Provides ability for relying party to confirm an individual s identity and affiliation to the DoD for the purpose of enabling Attribute Based Access Control (ABAC) Provides the capability to cross-reference, share, and distribute the DoD Electronic Data Interchange Person Identifier (EDI-PI) and the DoD Enterprise Username Leverages real-time, signed SAML Request/Response Available on NIPRNet and SIPRNet 7/15/13 UNCLASSIFIED 13

15 Enterprise Directory Services (EDS) Suite of services providing authoritative DoD Enterprise organizational and contact attributes Consists of: Real-Time Broker Service (RBS) Batch Broker Service (BBS) Identity Synchronization Services (IdSS) Enterprise Directory Query Service (EDQS) Enterprise White Pages milconnect Local directories must leverage the provisioning and sync services Applications requiring people discovery functions must use EDS as the source for their enterprise directory information 7/15/13 UNCLASSIFIED 14

16 Real-time Broker Service (RBS) The Real-time Broker Service (RBS) is a synchronous web service that provides DoD identity and contact data to CC/S/As Delivers one record per transaction, customized to the requester Useful for integration into applications in lieu of local data store / directory server Target response < 2 seconds Recommended persona population under 1 million records 7/15/13 UNCLASSIFIED 15

17 Batch Broker Service (BBS) The Batch Broker Service (BBS) is an asynchronous web service that provides DoD identity and contact data to CC/S/As Can deliver tens of thousands of records per transaction, customized to the requester, for populations in the millions Supports local directory provisioning and updating Useful for periodically updating large populations Provides the largest set of authentication attributes of any EDS service Provides DoD dependent and retiree data Feeds the Identity Synchronization Service (IdSS) 7/15/13 UNCLASSIFIED 16

18 Identity Synchronization Service (IdSS) The Identity Synchronization Service (IdSS) is a DoD Enterprise directory service forest synchronization service Connects to accountable identity sources to collect and groom identity information for all CAC holders DMDC Person Data Repository (PDR) for identity data DISA Global Directory Service (GDS) for encryption certificates Controls all account creation, deletion, and updates into DISA s Enterprise Application Services Forest (EASF) which is used for DISA-hosted DoD enterprise services (DEE, DEPS, etc) Data available for consumption via the IdSS Machine Interface (IdMI) and the Enterprise Directory Query Service (EDQS) 7/15/13 UNCLASSIFIED 17

19 IdSS Machine Interface (IdMI) The IdSS Machine Interface (IdMI) provides DoD identity and contact data to CC/S/As from IdSS Supports local directory provisioning and updating Supports populating Global Address List (GAL) Active Directory, LDAP v3, CSV, other formats available Available on both NIPRNet and SIPRNet No cost for initial connection (both NIPR and SIPR) 7/15/13 UNCLASSIFIED 18

20 Enterprise Directory Query Service (EDQS) The Enterprise Directory Query Service (EDQS) provides an LDAP interface to query IdSS data Provides flexible integration for applications for identity/authentication in lieu of local directory store Currently utilized as data service for DoD Enterprise White Pages Fee for service (cost model TBD) 7/15/13 UNCLASSIFIED 19

21 DoD Enterprise White Pages DoD Enterprise White Pages is a website to search for identity and organizational contact information for members of the DoD Enterprise Leverages persona-based authoritative data provided by IdSS Enables search by an individual s full name, rank, addresses, and other relevant information NIPRNet deployment occurred in April SIPRNet deployment planned FY13; Legacy capability provided by JEDS No cost enterprise service 7/15/13 UNCLASSIFIED 20

22 milconnect For the purposes of EDS, milconnect is a website that allows members of the DoD to access and update their persona contact data Designated interface for maintaining DoD person and persona information such as Duty Organization, Job Title, Installation, Address, and Phone Number milconnect populates DMDC systems, and, in turn, supports all EDS capabilities Keeping persona contact data updated is integral to ensuring local directories, Global Address Lists (GALs), and enterprise applications such as DoD Enterprise White Pages have up-to-date information DoD personnel, including DoD contractors, may access milconnect at No cost enterprise service 7/15/13 UNCLASSIFIED 21

23 Overview Authenticate Users 7/15/13 UNCLASSIFIED 22

24 Public Key Infrastructure (PKI) DoD Public Key Infrastructure (PKI) is a framework established to issue, maintain, and revoke public key certificates, including systems, processes, and people Provides certificates for NIPRNet (DoD Root CA) and SIPRNet (NSS PKI CA) as software certificates or on hardware (e.g., Common Access Card PKI certificates) Interoperates with DoD External Certificate Authorities (ECA), federal PIV certificate issuers, selected approved commercial PKI CAs, and selected approved Combined Communications Electronics Board (CCEB) PKI CAs No cost enterprise service 7/15/13 UNCLASSIFIED 23

25 Public Key Enablement (PKE) DoD Public Key Enablement (PKE) is the process of ensuring that applications can use certificates issued by the DoD PKI, NSS PKI, or DoD-approved external PKIs to support identification and authentication, data integrity, confidentiality, and/or technical non-repudiation Common uses include enabling: Smart card logon to DoD networks and certificate-based authentication to systems Secure connections (SSL/TLS) to DoD servers Digital signature and encryption of s from desktop, web, and mobile clients Digital signature of forms No cost enterprise service 7/15/13 UNCLASSIFIED 24

26 Global Directory Service (GDS) The Global Directory Service (GDS) is a DISA-provided enterprise-wide directory service that supports the DOD PKI Program GDS is the DoD PKI distribution point for its Certificate Revocation Lists (CRLs) and individual public key encipherment certificates Currently provides a DoD-wide search capability for information (names, e- mail addresses, and public key encipherment certificates) regarding DoD personnel with a DoD PKI certificate on the NIPRNet and SIPRNet No cost enterprise service 7/15/13 UNCLASSIFIED 25

27 DoD Visitor DoD Visitor is GOTS software deployed to CC/S/A user-facing MS domain controllers allowing CAC-holding employees temporary access to basic productivity tools while on travel Provisions temporary access accounts allowing access to a web browser, Microsoft Office, and local print services at a non-home location Files are stored temporarily on the workstation and automatically removed when the user logs off the system NIPRNet: CTO was released FY12 directing local components to upgrade to latest version of DoD Visitor SIPRNet : CTO J was released in FY13 mandating initial installation of DoD Visitor on SIPRNet No cost GOTS software 7/15/13 UNCLASSIFIED 26

28 Authentication Gateway Service (AGS) The Authentication Gateway Service (AGS) is an authentication middleware that performs PKI authentication for applications and systems that cannot be directly PK-enabled Where possible, DoD components are directed to perform direct PKI authentication using approved PKI certificates; When not possible, AGS provides an alternative for CAC users only May be locally deployed or deployed at DECC; any instance must be placed in same logical security boundary as the applications associated with it All DoD applications must either become compliant via direct PKI authentication or migrate to the DISA provided service until such time as they are able to become compliant Will be deployed into DECC OKC in August for applications located in the same logical security boundary AGS is participating in the Google Applications for Government Pilot Fee for service GOTS middleware (cost model TBD) 7/15/13 UNCLASSIFIED 27

29 Overview Authorize Access to Resources 7/15/13 UNCLASSIFIED 28

30 Enterprise Attribute Based Access Control (ABAC) Enterprise Attribute Based Access Control (ABAC) provides authorization decision support for web services, Enterprise Messaging, and internal applications Allows Programs of Record to develop custom code for application use Open source software available at Click on Documents at top of page Expand Open Source Attribute Based Access Control (OS ABAC) folder Identify most recent version and expand that folder (e.g. ABAC V1.4 ) Expand UserGuide/Installation/Training folder and download OS ABAC Install Guide CC/S/As may deploy locally or utilize DISA-managed service (currently deployed at Columbus and Oklahoma City DECCs) No cost GOTS software; Fee for service if utilizing DISA-managed service (cost model TBD) DISA also evaluating COTS software for enterprise service 7/15/13 UNCLASSIFIED 29

31 IdAM Contact Information IdAM Division Chief: Jackie Huff IdAM Engineering Chief: Amanda Cunningham Enterprise Directory Services Chief: Lee Taylor Authentication and Authorization Chief: Rich Abram IdAM Website: 7/15/13 UNCLASSIFIED 30

32 Questions? 7/15/13 UNCLASSIFIED 31

33 Backup Slides 7/15/13 UNCLASSIFIED 32

34 EIAS Architecture PDR GDS Legend Identity Service Authentication Service Authorization Service EIAS Service External to IdAM IdAM Services Consumer 1 Requests / Receives Attributes 2 Attribute Service Consumers Application or Service 3 Makes Authentication or Access Decision Attribute Broker 7/15/13 UNCLASSIFIED 33

35 EDS Architecture Legend Identity Service Authentication Service Persona Contact Info Authorization Service Service External to IdAM milconnect GDS IdAM Services Consumer Credentials PKI Certificate DEE DEPS UC RBS PDR BBS IdMI IdSS EDQS EASF Enterprise Apps CC/S/A Directories DoD Enterprise White Pages DoD White Pages Search / Retrieve Persona Contact Info User 7/15/13 UNCLASSIFIED 34

36 Global Directory Service (GDS) Architecture DoD PKI Root CA s (certs &CRL s) DoD PKI CA s ( certs) DoD PKI CA s ( and ID CRL s) ECA Vendor CRL s (Verisign, ORC, IdenTrust) GDS NIPRNET HTTPS webpage LDAPS ldaps queries Legacy Systems IdSS AKO USAF SPAWAR GDS OUTPUTS Distribution point for DoD PKI Encryption Certificates to individual DoD and ECA Users DoD replication partners (AKO, AFDS, IdSS, SPAWAR) for delivery of DoD PKI Encryption Certificates Informally, a part of the local site account provisioning process. Distribution point worldwide for DoD PKI CA and ECA CRL(s) Distribution point for DoD PKI Root CRLs, Certificates, and cross certificates Servicing of AIA and CDP extensions for all DOD PKI issued certificates Servicing of AIA and CDP extensions for all DOD PKI Test certificates Distribution point for DoD PKI Test and preproduction Root CRLs, Certificates, and cross certificates Distribution to GCDS for NIPR users, directly for Internet users and to PKI RCVS servers. Customized Data Consumer Connections DoD PKI CA s 17,18,21,23 ( certs) DoD PKI CA s 17,18,21,23 ( and ID CRL s) CNSS CA ( certs) CNSS CA (CRL s) GDS SIPRNET HTTPS webpage LDAPS Legacy Systems IdSS GDS OUTPUTS Distribution point for Encryption Certificates for individual DoD users DoD replication partners ( IdSS) for delivery of DoD PKI Encryption Certificates Distribution point for DoD PKI CA CRL(s) Distribution point for DoD PKI Root CRLs Servicing of AIA and CDP extensions for all CNSS DOD PKI issued certificates Servicing of AIA and CDP extensions for all CNSS DOD PKI Test certificates Distribution point for CNSS DoD PKI Root CRLs, Certificates, and cross certificates Distribution point for CNSS DoD PKI Test and preproduction Root CRLs, Certificates, and cross certificates Customized Data Consumer Connection 7/15/13 UNCLASSIFIED 35

37 DoD Visitor Architecture Visiting User 1 Present Credentials for Authentication 4 Provision Guest Account Credentials 2 DoD Visitor Request / Retrieve Credential Status 3 Legend Identity Service Local Network Resources Authentication Service Authorization Service Service External to IdAM PKI / PKE Services IdAM Services Consumer 7/15/13 UNCLASSIFIED 36

38 AGS Architecture User 1 Present Credentials for Authentication 4 Provide Brokered Authentication Credentials 2 Local User Directory AGS Request / Retrieve Credential Status DoD Enterprise/COI Credential Services 3 PKI / PKE Services Legacy Apps Legend Identity Service Authentication Service Authorization Service Service External to IdAM IdAM Services Consumer 7/15/13 UNCLASSIFIED 37

39 Enterprise ABAC Architecture User 1 Request Access Grant / Deny Access 10 Resources Legend Identity Service Authentication Service Authorization Service Service External to IdAM Credentials PEP IdAM Services Consumer 2 4 Request / Retrieve Decision 9 PKI Services 3 Request / Retrieve Credential Status PDP PDP 5 Request / Retrieve Digital Policy 6 Policy Store Request / Retrieve Attributes 7 8 PAP Non-DoD Identity Mgmt. DoD Enterprise/COI Attribute Services Deployed Attribute Services Cache DMDC GFM DI Resource Attributes Attribute Broker Enterprise/COI Attributes Cache Resource Attributes Cache 7/15/13 UNCLASSIFIED 38

40 DMDC Identity Web Services (IWS) Identity Web Services (IWS) are capabilities developed by DMDC to provide identity verification services to government agencies for DoD military personnel, their dependents, retirees, DoD civilians, and contractors Data is fed from DMDC Person Data Repository (PDR) Includes: Enterprise Identity Attribute Service (EIAS) Real-Time Broker Service (RBS) Batch Broker Service (BBS) 7/15/13 UNCLASSIFIED 39

Innovations in Identity & Access Management (IdAM)

Innovations in Identity & Access Management (IdAM) Innovations in Identity & Access Management (IdAM) Lee Taylor Chief, Infrastructure Applications Branch Disclaimer The information provided in this briefing is for general information purposes only. It

More information

Identity Synchronization Service Machine Interface (IdMI) NIPRNet Customer Interface Specification Between. <<Component>> and

Identity Synchronization Service Machine Interface (IdMI) NIPRNet Customer Interface Specification Between. <<Component>> and Identity Synchronization Service Machine Interface (IdMI) NIPRNet Customer Interface Specification Between and DISA Enterprise Services Directorate Enterprise Infrastructure Division 27 December

More information

Cryptologic and Cyber Systems Division

Cryptologic and Cyber Systems Division Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,

More information

Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016

Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version September 8, 2016 Services Directorate Dual Persona User Guide for DoD Enterprise Portal Service Military Sealift Command Version Document Approval Document Approved By Date Approved Name: Brian Purdy??/??/2016 ii Revision

More information

Alternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS)

Alternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS) Alternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS) DEFENSE INFORMATION SYSTEMS AGENCY COMMON USER SERVICES VERSION 1.0 DRAFT 1 JANUARY 2013 Page 1 of 11 Revision History

More information

Helping Meet the OMB Directive

Helping Meet the OMB Directive Helping Meet the OMB 11-11 Directive March 2017 Implementing federated identity management OMB Memo 11-11 Meeting FICAM Objectives Figure 1: ICAM Conceptual Diagram FICAM Targets Figure 11: Federal Enterprise

More information

Federated Access. Identity & Privacy Protection

Federated Access. Identity & Privacy Protection Federated Access Identity & Privacy Protection Presented at: Information Systems Security Association-Northern Virginia (ISSA-NOVA) Chapter Meeting Presented by: Daniel E. Turissini Board Member, Federation

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

Department of Defense Fiscal Year (FY) 2013 IT President's Budget Request Defense Technical Information Center Overview

Department of Defense Fiscal Year (FY) 2013 IT President's Budget Request Defense Technical Information Center Overview Mission Area Department of Defense Business System Breakout Appropriation All Other Resources 19.083 EIEMA 19.083 RDT&E 19.083 FY 2013 ($M) FY 2013 ($M) FY 2013 ($M) FY12 to FY13 Comparision ($M) FY2012

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

Enabling Smart Card Logon for Mac OS X Using Centrify Suite

Enabling Smart Card Logon for Mac OS X Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Application Virtualization Hosting Environment

Application Virtualization Hosting Environment Infrastructure and Operations Division Engineering, Design and Deployment Branch Application Virtualization Hosting Environment June 15, 2016 Version: 16 Unclassified/For Official Use Only (FOUO) Document

More information

How to Update your Information in the DoD Enterprise (DEE), Global Address List (GAL). Army users know it as Enterprise

How to Update your Information in the DoD Enterprise  (DEE), Global Address List (GAL). Army users know it as Enterprise How to Update your Information in the DoD Enterprise Email (DEE), Global Address List (GAL). Army users know it as Enterprise Email Presented by: Michael J. Danberry Last Revision / review: 12 March 2017

More information

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA LANL s Multi-Factor Authentication (MFA) Initiatives NLIT Summit 2018 Glen Lee Network and Infrastructure Engineering

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Cloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1

Cloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1 Cloud Overview Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 1 DoD Cloud Deployment Models DoDIN On-Premise Commercial Cloud Commercially provided cloud service hosted within DoD facilities

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

NESSO QUICKSTART GUIDE

NESSO QUICKSTART GUIDE Fleet Numerical Meteorology and Oceanography Center NESSO QUICKSTART GUIDE REGISTRATION AND USE April 20, 2007 Version 2.04 Approved for public release; distribution is unlimited Navy Enterprise Single

More information

How to Update your Information in the DoD Enterprise (DEE), Army users know it as mail.mil Global Address List (GAL)

How to Update your Information in the DoD Enterprise  (DEE), Army users know it as mail.mil Global Address List (GAL) How to Update your Information in the DoD Enterprise Email (DEE), Army users know it as mail.mil Global Address List (GAL) Presented by: Michael J. Danberry Last Revision / review: 15 February 2015 This

More information

Interagency Advisory Board Meeting Agenda, April 27, 2011

Interagency Advisory Board Meeting Agenda, April 27, 2011 Interagency Advisory Board Meeting Agenda, April 27, 2011 1. Open Remarks (Mr. Tim Baldridge, IAB Chair) 2. FICAM Plan for FIPS 201-2 (Tim Baldridge, IAB Chair and Deb Gallagher, GSA) 3. NSTIC Cross-Sector

More information

NCES Program Overview. Rita Espiritu NCES Program Manager

NCES Program Overview. Rita Espiritu NCES Program Manager NCES Program Overview Rita Espiritu NCES Program Manager Components of Net-Centric Warfare DoD Net-Centric Data Strategy Information Assurance Strategy Global Connectivity (Transformational Communications)

More information

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics IDENTITY Mary Dixon February 12, 2003 1 A Short Review and Update 2 DoD is issuing 4 million smart cards to: Active Duty Military

More information

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs)

Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Interagency Advisory Board Meeting Agenda, July 28, 2010

Interagency Advisory Board Meeting Agenda, July 28, 2010 Interagency Advisory Board Meeting Agenda, July 28, 2010 1. Opening Remarks 2 Research Collaboration in the Cloud: How NCI and Research Partners Are Improving Business Processes using Digital Identities

More information

Public Key Enabling Oracle Weblogic Server

Public Key Enabling Oracle Weblogic Server DoD Public Key Enablement (PKE) Reference Guide Public Key Enabling Oracle Weblogic Server Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke URL: http://iase.disa.smil.mil/pki-pke Public Key Enabling

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST

More information

DoD CIO s Areas of Focus. David A. Cotton Deputy CIO for Information Enterprise May 20, 2015

DoD CIO s Areas of Focus. David A. Cotton Deputy CIO for Information Enterprise May 20, 2015 DoD CIO s Areas of Focus David A. Cotton Deputy CIO for Information Enterprise May 20, 2015 DoD CIO s Areas of Focus Joint Regional Security Stacks Cloud Computing & Data Center Consolidation Mission Partner

More information

State of Colorado Cyber Security Policies

State of Colorado Cyber Security Policies TITLE: State of Colorado Cyber Security Policies Access Control Policy Overview This policy document is part of the State of Colorado Cyber Security Policies, created to support the State of Colorado Chief

More information

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

DoD Wireless Smartphone Security Requirements Matrix Version January 2011 DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation

More information

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1 Cisco ISE Overview, page 2 Key Functions, page 2 Identity-Based Network Access, page 2 Support for Multiple Deployment Scenarios, page 3 Support for UCS Hardware, page 3 Basic User Authentication and Authorization,

More information

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

DHS ID & CREDENTIALING INITIATIVE IPT MEETING DHS ID & CREDENTIALING INITIATIVE IPT MEETING October 14, 2004 Part 02 of 02 IMS/CMS Functional Specification General Issuance Requirements Issue a GSC-IS 2.1 compliant dual chip hybrid ICC/DESFire v0.5

More information

Managed Access Gateway Third-Party Credential User Guide August 2017

Managed Access Gateway Third-Party Credential User Guide August 2017 Managed Access Gateway Third-Party Credential User Guide August 2017 Copyright 2017 Exostar, LLC All rights reserved 1 Contents Audience... 3 How to Register for a New MAG Account with your Third-Party

More information

ADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc.

ADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc. ADmitMac PKI Executive Summary Thursby Software Systems, Inc. November 15,2010 Why ADmitMac PKI? Leverage your existing Active Directory and PKI infrastructure when adding Macintosh computers. Helps meet

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Access Management Access management enforces the policies that define the actions that an entity may or may not perform

More information

Guardium UI Login using a Smart card

Guardium UI Login using a Smart card IBM Security Guardium Guardium UI Login using a Smart card Overview Guardium Smart card support meets the United States government mandate that all vendors must support multi-factor authentication for

More information

Enterprise Services & Unified Capabilities Development & Delivery

Enterprise Services & Unified Capabilities Development & Delivery Enterprise Services & Unified Capabilities Development & Delivery Karl Kurz Enterprise Services Development Division and UC Portfolio Chief Engineer October 2017 DoD Environment Goal State (DEOS) Current

More information

Department of Defense Fiscal Year (FY) 2015 IT President's Budget Request Defense Contract Audit Agency Overview

Department of Defense Fiscal Year (FY) 2015 IT President's Budget Request Defense Contract Audit Agency Overview BMA 3.308 Mission Area Business System Breakout Appropriation PROCUREMENT 1.594 Total 31.395 Defense Business Systems 3.528 EIEMA 28.087 All Other Resources 27.867 FY 2015 ($M) FY 2015 ($M) OPERATIONS

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

DATA SHEET. ez/piv CARD KEY FEATURES:

DATA SHEET. ez/piv CARD KEY FEATURES: Personal Identity Verification (PIV) Card ez/piv Card satisfies FIPS 201, HSPD-12. It allows your users to authenticate to z/os Security Server through the use of a government PIV or CAC Card. KEY FEATURES:

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Key Management Key Management is a service and process that provides, controls, and maintains the cryptographic keys,

More information

1. Federation Participant Information DRAFT

1. Federation Participant Information DRAFT INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES [NOTE: This document should be considered a as MIT is still in the process of spinning up its participation in InCommon.] Participation in InCommon

More information

UNCLASSIFIED // FOUO Pegasus 101 Brief

UNCLASSIFIED // FOUO Pegasus 101 Brief Pegasus 101 Brief Multi-National Information Sharing Program Management Office March 2015 2 Outline Pegasus Defined Pegasus Requirements Pegasus Today Product / Service update Pegasus Improved Service

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

Nov ember 14, Memo

Nov ember 14, Memo Memo Subject: Comparison of Validation Capabilities between Axway Desktop Validator and MS Windows Clients as well as Validation Authority Serv er and Windows Serv er Date: December 2016 1/5 1. Introduction

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

Homeland Security Information Sharing Architecture

Homeland Security Information Sharing Architecture Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community

More information

Identity Management (IdM) is a crosscutting focus area for DHS

Identity Management (IdM) is a crosscutting focus area for DHS DHS & Identity Management Anil John Telephone: (443) 778-0612 Email: anil.john@jhuapl.edu 1 Identity Management (IdM) is a crosscutting focus area for DHS Enabling Homeland Capabilities EHC #1: Cross-Agency

More information

Enforcing Certificate Assurance Levels for Secure Interoperability

Enforcing Certificate Assurance Levels for Secure Interoperability Fall 2010 Volume 2, Issue 1 Published quarterly by DoD PKE The PKE Quarterly Post Enforcing Certificate Assurance Levels for Secure Interoperability By Julia Ott In This Issue Notes from DoD PKE... 2 Missing

More information

Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form

Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Page 1 of 5 Submitted to DISA s DoD Cloud Support Office by: Signature (Prefer CAC

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

DoDD DoDI

DoDD DoDI DoDD 8500.1 DoDI 8500.2 Tutorial Lecture for students pursuing NSTISSI 4011 INFOSEC Professional 1 Scope of DoDD 8500.1 Information Classes: Unclassified Sensitive information Classified All ISs to include:

More information

Leveraging the LincPass in USDA

Leveraging the LincPass in USDA Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass

More information

There is an increasing desire and need to combine the logical access and physical access functions of major organizations.

There is an increasing desire and need to combine the logical access and physical access functions of major organizations. Introduction There is an increasing desire and need to combine the logical access and physical access functions of major organizations. This can be as simple as merely having an access card that can be

More information

Novell Access Manager 3.1

Novell Access Manager 3.1 Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE

DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE DEFENSE SECURITY SERVICE PRIVACY IMPACT ASSESSMENT GUIDANCE AND TEMPLATE Version 1.0 28 October 2008 1 DSS PRIVACY IMPACT ASSESSMENT For Industrial Security Facilities Database (ISFD) Project Identifying

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

GLOBALPLATFORM CASE STUDY. Overview. Development of the Solution. The Standard for Smart Card Infrastructure

GLOBALPLATFORM CASE STUDY. Overview. Development of the Solution. The Standard for Smart Card Infrastructure Overview In 1999, the US Department of Defense (DoD) began work on a program to issue a smart, common-access identification card to 4.5 million Active Duty, Selected Reserve, DoD civilian and eligible

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering. 2 April Ross Adjei Mike Nguyen

Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering. 2 April Ross Adjei Mike Nguyen Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering 2 April 2014 Ross Adjei Mike Nguyen Agenda Background Architecture Implementation/Demo Performance Challenges

More information

Mobile Derived Credentials Purebred Information Brief

Mobile Derived Credentials Purebred Information Brief Mobile Derived Credentials Purebred Information Brief Disclaimer The information provided in this briefing is for general information purposes only. It does not constitute a commitment on behalf of the

More information

DBsign for HTML Applications Version 4.0 Release Notes

DBsign for HTML Applications Version 4.0 Release Notes DBsign for HTML Applications Version 4.0 Release Notes Copyright 2010 Version 4.0 Copyright Notice: The Release Notes has a copyright of 2000-2010 by Gradkell Computers, Inc. This work contains proprietary

More information

Public Key Infrastructure

Public Key Infrastructure Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure

More information

Intelligence Community Communications Architecture

Intelligence Community Communications Architecture Intelligence Community Communications Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 UNCLASSIFIED William F. Dawson Deputy Intelligence

More information

JRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing

JRSS. GPIs MNIS DMCC-S. Assured Identity NBIS. Joint Regional Security Stacks. Global Private Internets. Multinational Information Sharing SummerLook 2018Book JRSS Joint Regional Security Stacks GPIs Global Private Internets MNIS Multinational Information Sharing DMCC-S DOD Mobility Classified Capability - Secret Assured Identity NBIS National

More information

DoD & FiXs : Identity Superiority

DoD & FiXs : Identity Superiority DoD & FiXs : Identity Superiority Implementing common authentication now & into the future. The Federation for Identity and Cross-Credentialing Systems (FiXs) www.fixs.org FiXs - The Federation for Identity

More information

UNCLASSIFIED LANDWARNET LandWarNet Unified Communications and Collaboration (UC&C) Update UNCLASSIFIED

UNCLASSIFIED LANDWARNET LandWarNet Unified Communications and Collaboration (UC&C) Update UNCLASSIFIED LandWarNet 2011 Unified Communications and Collaboration (UC&C) Update What is UC&C? Why does the Army need UC&C? UC&C Requirements UC&C Challenges Unique to the DoD Current UC&C Status Timelines Activities

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

IBM C Exam. Volume: 65 Questions

IBM C Exam. Volume: 65 Questions Volume: 65 Questions Question No: 1 A customer has a requirement which is currently unavailable in an out-of-the-box product. Who would be able to assist in troubleshooting the customer when developing

More information

Using Workspace ONE PIV-D Manager. VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager

Using Workspace ONE PIV-D Manager. VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager Using Workspace ONE PIV-D Manager VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Multi-National Information Sharing Briefing

Multi-National Information Sharing Briefing Multi-National Information Sharing Briefing AFCEA TechNet Mr. Donald Parker DISA Multinational Information Sharing (MNIS) Division 2 Nov 2017 Current DISA-Managed Coalition Information Sharing Systems

More information

Federal PKI. Trust Store Management Guide

Federal PKI. Trust Store Management Guide Federal PKI Trust Store Management Guide V1.0 September 21, 2015 FINAL Disclaimer The Federal PKI Management Authority (FPKIMA) has designed and created the Trust Store Management Guide as an education

More information

Cybersecurity Capabilities Overview

Cybersecurity Capabilities Overview Cybersecurity Capabilities Overview Jack Wilmer Infrastructure Development Executive March 2016 Day in the Life of DISA INTERNET DoDIN DISN Operate DISA Provides, Operates and Assures the DODIN - $30 B

More information

Forecast to Industry Program Executive Office Mission Assurance/NetOps

Forecast to Industry Program Executive Office Mission Assurance/NetOps Defense Information Systems Agency A Combat Support Agency Forecast to Industry Program Executive Office Mission Assurance/NetOps Mark Orndorff Director, PEO MA/NetOps 29 July 2010 What We Do We develop,

More information

for Unclassified Systems

for Unclassified Systems DoD Public Key Enablement (PKE) Reference Guide InstallRoot 5.0 User Guide Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke InstallRoot 5.0 User Guide for Unclassified Systems 7 December 2015

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 1. Opening Remarks 2. A Security Industry Association (SIA) Perspective on the Cost and Methods for Migrating PACS Systems to Use PIV

More information

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3.

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3. Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary Version 3.3.2 May 30, 2007 Copyright 2007, Operational Research Consultants,

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: British Columbia Institute of Technology Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation

More information

No More Excuses: Feds Need to Lead with Strong Authentication!

No More Excuses: Feds Need to Lead with Strong Authentication! No More Excuses: Feds Need to Lead with Strong Authentication! Dr. Sarbari Gupta sarbari@electrosoft-inc.com Annual NCAC Conference on Cybersecurity March 16, 2016 Electrosoft Services, Inc. 1893 Metro

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams MCSE Server Infrastructure This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams 1. MCSE: Server Infrastructure / Exam 70-413 (Designing and Implementing

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary

More information

Version 3.4 December 01,

Version 3.4 December 01, FIXS OPERATING RULES Version 3.4 December 01, 2015 www.fixs.org Copyright 2015 by the Federation for Identity and Cross-Credentialing Systems, Inc. All Rights Reserved Printed in the United States of America

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Indeed Card Management Smart card lifecycle management system

Indeed Card Management Smart card lifecycle management system Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Securing Content in the Department of Defense s Global Information Grid

Securing Content in the Department of Defense s Global Information Grid Securing Content in the Department of Defense s Global Information Grid Secure Knowledge Workshop State University of New York - Buffalo 23-24 September 2004 Robert W. McGraw Technical Director IA Architecture

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information