Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Similar documents
STORK Secure Identity Across Borders Linked

Open mustard seed. Patrick Deegan, Ph.D. ID3

STORK PRESENTATION 07/04/2009. Frank LEYMAN. Manager International Relations. Stork is an EU co-funded project INFSO-ICT-PSP

Prof. Christos Xenakis

Prof. Christos Xenakis

Cross border eservices STORK 2.0

eidas cross-sector interoperability

1. Publishable Summary

FIDO & PSD2. Providing for a satisfactory customer journey. April, Copyright 2018 FIDO Alliance All Rights Reserved.

Managed Access Gateway. Request Management Guide (For Administrators)

HID goid Mobile ID Solution

The challenges of (non-)openness:

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

Introduction to Device Trust Architecture

HID goid Mobile ID Solution

SAP Security in a Hybrid World. Kiran Kola

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Technical Overview. Version March 2018 Author: Vittorio Bertola

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition

Introduction of the Identity Assurance Framework. Defining the framework and its goals

Office 365 External Sharing Webinar November 7, 2017

Moving Digital Identity to the Cloud, a Fundamental Shift in rethinking the enterprise collaborative model.

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

STORK PRESENTATION. STORK Overview STePS workshop, 17 June Herbert Leitold. Stork is an EU co funded project INFSO ICT PSP

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Open Mobile API The enabler of Mobile ID solutions. Alexander Summerer, Giesecke & Devrient 30th Oct. 2014

Cross-Operator Identity Services. 13. January 2012, Telekom Innovation Laboratories

INDIGO AAI An overview and status update!

Centrify for Dropbox Deployment Guide

SAFE-BioPharma RAS Privacy Policy

Security Guide Zoom Video Communications Inc.

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

Operator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

eidas Regulation eid and assurance levels Outcome of eias study

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

eid building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics

Adobe Sign and 21 CFR Part 11

Define Your Office 365 External Sharing Strategy

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

JUNIPER NETWORKS PRODUCT BULLETIN

Identity and Access Management PIN App Owner Town Hall Meeting. March 31, 2015 Tuesday 3:00 4:30 p.m. Taubman, T-520 (HKS)

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

DreamFactory Security Guide

Virtual Machine Encryption Security & Compliance in the Cloud

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World

DT-ICT : Big data solutions for energy

IBM SmartCloud Engage Security

Trusted National Identity Schemes. Coralie MESNARD

Canadian Access Federation: Trust Assertion Document (TAD)

UFED Cloud Analyzer. Traces and changes. February Version 6.0

Canadian Access Federation: Trust Assertion Document (TAD)

The Internet of Things

Certification Exam Guide SALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER. Summer Salesforce.com, inc. All rights reserved.

BlackBerry Enterprise Identity

5 OAuth Essentials for API Access Control

ETSY.COM - PRIVACY POLICY

Canadian Access Federation: Trust Assertion Document (TAD)

Challenges in Authenticationand Identity Management

Partner Center: Secure application model

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

Managed Access Gateway One-Time Password Guide Version 1.0 February 2017

Privacy Policy of ManualsLib App

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD)

Visa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations

Certification Exam Guide SALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER. Winter Salesforce.com, inc. All rights reserved.

Securing Europe's Information Society

Accelerate Your Enterprise Private Cloud Initiative

Electronic ID at work: issues and perspective

Electronic Prescribing for Controlled Substances. EPCS with NewCrop e-prescribing Identity Proofing with Exostar. Setup and User Guide

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.

Scottish Wide Area Network (SWAN) update & Partnership Connectivity

TECHNOLOGY PARTNER. WatchGuardONE Technology Partner Program Guide. Partner. Promote. Solve.

GDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0

Administrator s Guide. June 15, 2018

The Benefits of EPCS Beyond Compliance August 15, 2016

Gmail Integration for Salesforce and Dynamics 365

Google Identity Services for work

RapidIdentity Mobile Guide

October J. Polycom Cloud Services Portal

SharePoint 2019 and Extranet User Manager

Intro to the Identity Experience Engine. Kim Cameron, Microsoft Architect of Identity ISSE Paris November 2016

Unified Communication Platform

CREATE Compact REtrofit Advanced Thermal Energy storage. European Commission Archive 1x

European Interoperability Reference Architecture (EIRA) overview

Information Governance SIG. Phil Stradling Citizen Identity Lead NHS England

New Paradigms of Digital Identity:

Verizon MDM UEM Unified Endpoint Management

ehealth Network ehealth Network Governance model for the ehealth Digital Service Infrastructure during the CEF funding

Managed Access Gateway. User Guide

Xerox Connect for Dropbox App

Executive Summary for deliverable D6.1: Definition of the PFS services (requirements, initial design)

Sri Lanka THE JOURNEY OF TOWARDS A CREATIVE KNOWLEDGE BASED ECONOMY

Canadian Access Federation: Trust Assertion Document (TAD)

Liferay Security Features Overview. How Liferay Approaches Security

Canadian Access Federation: Trust Assertion Document (TAD)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

Transcription:

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015

Table of content 1. Introduction... 3 2. Demonstrator Objectives... 4 3. State of the Art Analysis... 4 4. Followed Approach... 4 4.1 High Level Design of the Solution... 5 4.2 Components of the Solution... 6 5. Demo Setup... 8 6. Storyline of the D3.5 Demonstrator... 9 7. Demonstrator Screenshots... 10 7.1 Student mobile Application... 10 7.2 Web Application for Student Profile and, Consent Management... 11 8. Deviations from the DoW... 12 9. Corrective Actions... 12 10. Conclusion and Outlook... 12 2

1. Introduction In this demonstrator, the STORK platform is integrated with the existing solution D3.2 as a new Identity and authentication provider. For readability reasons, we have decided to reuse some of the content and explanations from D3.2. Within the existing solution, the user is now provided with a choice to select STORK log in and authenticate against it for accessing the services from the service provider for both mobile and web application. This document provides a background to the live demonstrator. According to the ATTPS project Task 3.5 description: Task 3.5: Technology test bed (M1 M40, task leader: BIC) In this task, a limited TDL real life test bed environment will be implemented using the current and future available hard and software components contributed from TDL partners and integration based upon the developed trust architecture principles of the TDL community. This will be called from now on as Generic Architecture Center (GTAC). test bed supports generic trust architectures (developed in WP3 of ATTPS) and allows other TDL members to integrate & test their state of the art solutions. ATTPS will implement two separate forums: Certified hackers to test provided worthy ICT solutions and the ICT expert forum to support providers of worthy ICT solutions on integration and deployment aspects. GTAC infrastructure consists of a technology platform provided and composed by: TDL members for enabling infrastructure on: communication level (Internet; Telecom) and on trustworthy platforms such as the e-authentication framework architecture, and TDL members providing trustworthy ICT solutions for integration and deployment on the enabling infrastructure ATTPS will provide the overall design of the GTAC, taking into account the preparedness of TDL members to provide the necessary technology. ATTPS will operate and maintain the GTAC and provide access: To providers of trustworthy components with access to the TDL test bed infrastructure by providing user groups and ethical hackers in order to validate and test modules, systems, concepts and services, To support new developments of TDL members for innovative ICT concepts, To realize a harmonized-european e-authentication architecture, by close collaboration with the STORK platform, and To test the components of generic trust architecture of Work Package 3, i.e., mobile service and platform integrity, trusted stack and data life cycle management. 3

During the course of the ATTPS project, the GTAC can be found at: https://attpssurvey.nlehd.de/gtac/. After the end of the project GTAC will be taken over by TDL and accessed via the TDL website. This deliverable provides a Demonstrator allowing validation of interoperability allowing the private and public identity providers to offer their technologies to a variety of relying parties. 2. Demonstrator Objectives This project aims to test and demonstrate the feasibility of technical solution for a cross country identity assurance ecosystem with government issued identity consumed by a third party service provider. 3. State of the Art Analysis With the increase in the number of identity providers, the consumer ends up with more than one digital identity. For the ease of transaction between service provider and end consumer, various federation techniques are applied. Eg, service providers nowadays provide options to log in with Facebook account or google account etc. In addition there are solutions such as OpenID account chooser 1 that allow user to choose the type of identity for authentication. Referring to the genetic trust architecture principles, in this demonstration, we aimed to test a solution where the user has a choice to select a government issued ID to complete a commercial transaction such as buying an offer online. key differentiator is that our solution is integrated with the STORK platform to show the federation between private and public sector identity providers. user can select an identity provider and in addition has full control over his personal data. He decides what data should be shared with whom. Using such a solution, it is possible to facilitate private and public sector collaboration and demonstrate an improved level of trust for consuming online digital services. 4. Followed Approach This demonstrator uses an existing solution built for ISIC business users (Students, Merchants and Issuers) in Europe and employs a collaborative approach across all ecosystem 1 https://www.accountchooser.com/learnmore.html 4

participants such as Relying Parties, Identity and Attribute Providers. For this reason, the solution is developed referencing the TDL framework and is contextualized for this pilot. Verizon plays the role of technology enabler and solution integrator for this project. In addition to the existing Verizon credential issuance and authentication system called Universal Identity Services (UIS), the STORK platform is added as a new identity and authentication provider. A hub is deployed that offers proxy service and user interface applications for access on mobile and laptop/pc devices. Verizon is working with the International Student ID Card (ISIC) Association 2 that will provide a real life context for this pilot within its community. This pilot has two tracks. technical track covers defining use cases, hosting the technology components, and integrating the solution. Due to the open architecture, the solution is scalable using APIs, making its design flexible for integration with different types of platforms. In the second track, the commercial model will be developed and tested within the ISIC community. This includes developing revenue models and a going-to-market strategy to develop the eco system. 4.1 High Level Design of the Solution As mentioned in section 4, the solution has the hub and spoke model architecture detailed in the TDL research paper Architecture Serving complex identity infrastructures 3. This demonstrator implements user authentication with the STORK platform in conjunction with the following key services: Credential life cycle management for digitizing student identities (defining user enrolment/registration processes, issuance, renewing and/or revoking identity credentials) Authentication utilizing a wide variety of second form factors such as SMS, email, Voice based OTP, Software token, or Hardware Token Consumer consent and privacy management Attribute Verification (e.g., student status or age) Integrate with multiple identity/attribute providers, and various relying parties Campaign management 2 http://www.isic.org/about/about-the-isic-association.html 3http://www.trustindigitallife.eu/uploads/Architecture%20serving%20complex%20Identity %20Infrastructures.pdf 5

4.2 Components of the Solution following diagram gives an overview of the key components in this solution. Credential Issuance & Authentication Platform (STORK) Credential Issuance & Authentication Platform (Other IDP) User Manager Mobile App Student Mobile App OAuth Integration layer Authentication Proxy Push/Pull Messaging User Account Management (Registration, Provisioning credentials) Preference Management (Privacy) Consent Management User Consent User Preferen ces Merchant Redeem App Web Service Management Merchant Manager Consent Policy Management Analytics Management Merchant Account Management (Registration, Provisioning credentials) Merchants Campaign Management Billing Admin Voucher Management Reporting database Payment Management Reporting Campaigns, Transactions Reporting Campaigns, Transactions Figure 1: High Level Design of the overall Solution STORK Platform: STORK based ID is used as an identity provider for this demonstration. STORK is a protocol to allow authentication across national borders. aim of the STORK project is to establish a European eid Interoperability Platform that will allow citizens to establish new e-relations across borders, just by presenting their national eid. role of the STORK platform is to identify a user who is in a session with a service provider and to send his data to this service. Verizon Universal Identity Services (UIS): It is a cloud based identity management system that supports multi factor authentication mechanism. This is used as another identity provider in this solution. Mobile applications: re are two mobile applications one for the student and one for the merchant. student mobile app offers the feature to access the benefits or discounts. All the purchased offers are stored in user profile. user can redeem such a voucher at the merchant location. user can also manage his preferences and privacy settings through this mobile app. In addition, the solution aims for a better user experience, since this is one of the critical criteria for gaining students to use this platform. 6

For the merchant, can scan the purchased offer and also verify the student status. Integration layer: integration layer contains the consent policy management, databases and push/pull messaging services. se databases are used to draw reports on transactions for billing. Through analytics, the merchant is able to introduce context based promotions based on various factors such as past buying behavior of the student, his/her purchasing preferences, and geo location based services. For such analytics, only the aggregated data is used removing individual user names, to protect user privacy. Since the service is offered as opt-in to the user, in addition to the explanation of what kind of data are captured from the user and how they will be used, users will be asked explicitly to provide consent for using any specific attributes. In addition, there is an authentication proxy in the integration layer that is capable of adding more Identity providers, making the solution scalable. Billing Admin: creates reports from the system for transaction based revenue sharing amongst the parties involved. billing admin team will only able to view the transactions happened in that period, and calculate the invoice amount for the service provider. User Manager: Using the user manager, the student user can log into the application to manage his/her profile, preferences, privacy settings etc. Whilst the service provider may request various data items, the user always controls the data to be sent. explicit consent of the owner of the data, the user, is always required before his data can be sent to the service provider. Merchant manager, the issuer can manage the user registration process for both student and merchants. Merchants can log into their own accounts to perform activities such as adding a new payment provider, manage campaigns etc. merchant registration also needs to be approved by Issuer. merchant can create campaigns using this portal and run reports to analyze the campaign performance. re is also a mobile app that the merchant can use to scan and redeem the purchased voucher. Through this app, the merchant can also validate the student ID by scanning the QR code based student ID. Campaign Manager (Web Application). back end application is hosted on the Verizon cloud environment. In this particular demonstration, referring to the STORK set up, we have installed STORK Local Pan-European Proxy Services model (PEPS), STORK Foreign PEPS and emulated country specific authentication portal. STORK proxy used is a custom implementation of Verizon that does not offer an open source version. During the course, we encountered several issues 7

with the deployment and configuration of the OpenAM based STORK proxy which were overcome; More details on the generic STORK implementation can be found here 4. Service Provider STORK Local National PEPS STORK Foreign National PEPS Authentication Portal Authentication request Authentication request Authentication request Authentication Response Authentication Response Authentication Response Figure 2 Authentication Sequence with STORK ID re are two scenarios in this use case. In scenario one, the student user logs in to the mobile application and browses for the offers. In the second case, this user will log into the web application to manage his profile. In both cases, at the beginning of the workflow, the user is presented with a screen to select the authentication method. After the user selects STORK authentication method, the request is routed to STORK National PEPS. service provider and the National PEPS belong to the same country. When the user tries to access the service provider application, by default the request goes to the authentication portal via local national PEPS in the country. In cases when the user is from a different country, then the national PEPS reroutes the authentication request to the authentication portal via foreign PEPS. 5. Demo Setup platform is hosted in the Verizon Cloud in the proof of concept environment. This can be accessed from the GTAC. To setup the demo, two smartphones (android based), one PC, and Wi-Fi Internet connection are needed. On one smartphone, the student (user) mobile 4http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/others/2011_04_15_letter_artwp _atos_origin_annex_en.pdf 8

app should be installed and on the other device the merchant redeem application. Various users (Student, Merchant, Issuer, and Billing Admin) should be created. 6. Storyline of the D3.5 Demonstrator In this deliverable, the following use case is demonstrated. A Netherlands citizen (Student) wants to access a third party application from ISIC issuer which supports STORK. A test user is created for this purpose. Following is the demo script for the technical proof of concept: Table 1: Demonstrator Storyline Serial # Activity Comments Log in to mobile application 1 Launch the mobile application STORK ID configured for the Netherlands 2 Select STORK Authentication 3 Select NL flag 4 Enter the log in ID and Password On successful authentication, user is able to see the home screen of the app to browse offers Log in to the web application 5 Launch the web application 6 Select STORK Authentication 7 Select NL flag 8 Enter the log in ID and Password On successful authentication, user is able to see the home page. 9

7. Demonstrator Screenshots 7.1 Student mobile Application Select Authentication method Select Country Log In Application Home Page

7.2 Web Application for Student Profile and, Consent Management Select Authentication method Select the country Log In Home Page of the application

8. Deviations from the DoW None 9. Corrective Actions None 10. Conclusion and Outlook Verizon has developed a prototype to implement a real-time use case for identity federation with government identity providers and able to demonstrate that how private service providers can use the stork identity. This solution is scalable and can be integrated with more number of identity providers and service providers. This is a Verizon sandbox demonstrator, which can also serve as a test bed, where different aspects of the solution can be tested such as security, privacy and interoperability. From the user point of view; it offers flexibility to authenticate against an existing national ID. For the service providers, it saves a lot of infrastructure costs for managing the identity lifecycle of the users by simply integrating with the STORK platform. In the first run, we demonstrated a cloud based identity management system where the user can select the second factor authentication method. In the second run, we demonstrated the use of a government issued National ID as an authentication option for a commercial transaction. key achievement is that we were able to develop a technical solution is based on a real use case within the guidelines of Generic Architecture principles. As a next step, any service provider who is interested in such an implementation can reference to this prototype concept of federation between governments and private enterprises and approach the local governments for integrating the applications with STORK authentication.