Interagency Advisory Board Meeting Agenda, March 5, 2009

Similar documents
Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, July 28, 2010

Interagency Advisory Board Meeting Agenda, February 2, 2009

Biometric Use Case Models for Personal Identity Verification

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011

Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013

Interagency Advisory Board Meeting Agenda, August 25, 2009

Secure Lightweight Activation and Lifecycle Management

Biometrics & Smart Cards In Use Today

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Cryptologic and Cyber Systems Division

Leveraging HSPD-12 to Meet E-authentication E

Leveraging the LincPass in USDA

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013

IMPLEMENTING AN HSPD-12 SOLUTION

No More Excuses: Feds Need to Lead with Strong Authentication!

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS

Single Secure Credential to Access Facilities and IT Resources

IAB Minutes Page 1 of 6 April 18, 2006

Interagency Advisory Board Meeting Agenda, December 7, 2009

Secure Government Computing Initiatives & SecureZIP

Interagency Advisory Board Meeting Agenda, April 27, 2011

Interagency Advisory Board (IAB) Meeting. August 09, 2005

Strategies for the Implementation of PIV I Secure Identity Credentials

IAB Minutes Page 1 of 6 January 18, 2006

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Match On Card MINEX 2

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

Top Reasons To Audit An IAM Program. Bryan Cook Focal Point Data Risk

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

There is an increasing desire and need to combine the logical access and physical access functions of major organizations.

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA

Interagency Advisory Board Meeting Agenda, December 7, 2009

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Defining IT Security Requirements for Federal Systems and Networks

NFC Identity and Access Control

Physical Access Control Systems and FIPS 201

TWIC Implementation Challenges and Successes at the Port of LA. July 20, 2011

Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005

Yubico with Centrify for Mac - Deployment Guide

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace.

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011

Revision 2 of FIPS 201 and its Associated Special Publications

ADmitMac PKI Executive Summary. 2010, Thursby Software Systems, Inc.

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

Electronic Signature Policy

ENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION

Managing PIV Life-cycle & Converging Physical & Logical Access Control

Using the Prototype TWIC for Access A System Integrator Perspective

PKI and FICAM Overview and Outlook

U.S. E-Authentication Interoperability Lab Engineer

Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility

Virtual Machine Encryption Security & Compliance in the Cloud

Indeed Card Management Smart card lifecycle management system

How Next Generation Trusted Identities Can Help Transform Your Business

Endpoint Protection with DigitalPersona Pro

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Crash course in Azure Active Directory

Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop. Scalability: Dimensions for PACS System Growth

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

000027

DATA SHEET. ez/piv CARD KEY FEATURES:

Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform

Canadian Access Federation: Trust Assertion Document (TAD)

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003

Texas A&M University: Learning Management System General & Application Controls Review

SAML-Based SSO Solution

Introduction of the Identity Assurance Framework. Defining the framework and its goals

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

See the ID Rules Before Us: FAL IAL AAL eh? Aaaagh!!! How, How, How, How?

BioPassport TM Enterprise Server

Safelayer's Adaptive Authentication: Increased security through context information

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

An Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication

Mobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013

Dissecting NIST Digital Identity Guidelines

PIV Data Model Test Guidelines

Federal PKI. Trust Store Management Guide

Velocity Certificate Checking Service Installation Guide & Release Notes

FREEDOM ACCESS CONTROL

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

TWIC / CAC Wiegand 58 bit format

Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research

Authentication Methods

Identity Management as a Service

FiXs - Federated and Secure Identity Management in Operation

Duo End User Education Templates

IT Governance Committee Review and Recommendation

Canadian Access Federation: Trust Assertion Document (TAD)

Applying biometric authentication to physical access control systems

FICAM in Brief: A Smart Card Alliance Summary of the Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

SAML-Based SSO Solution

Transcription:

Interagency Advisory Board Meeting Agenda, 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy (Judy Spencer, GSA) 3. Co-Development of PKI/BLADE and PIV: Requirements and Roadmaps (Jarrod Frahm, DOS and Bill Macgregor, NIST) 4. Winter Chill Exercise Debrief (Craig Wilson, FEMA) 5. MSO SSP Update (Steve Duncan, GSA) 6. PAIIWG Update (Tim Baldridge, NASA) 7. Closing Remarks (Tim Baldridge, NASA)

Department of State Bureau of (IRM) Directorate of Information Technology Infrastructure (ITI) Systems Integrity Division (SI) Information Integrity Branch (IIB) Jarrod M. Frahm BLADE Program Manager IRM/OPS/ITI/SI/IIB

Biometric Objectives Provide an operational and more secure IT environment for networked users that complies with Federal regulations Use technology to keep ahead of existing security trends, including the growing weaknesses of passwords Employ multi-factor authentication Provide convenience to the user at or above the current level available without compromising security Use the existing infrastructure wherever possible Existing DoS Smart ID badges Existing High Assurance PKI system Already approved COTS products reduce risk and costs IRM/OPS/ITI/SI/IIB 16

Biometric Solution Existing PKI-enabled Smart ID badges replace need for username/password for workstation logon PKI keys on smart card used to authenticate securely using Kerberos Active Directory provides a repository for PKI information and forces smart card logon at clients Biometrics used to unlock PKI credentials on card Fingerprint template stored only on smart card Match-on-Card technology performs fingerprint matching for release of PKI credentials IRM/OPS/ITI/SI/IIB 17

BLADE Biometrics for Logical Access, Development & Execution - Integrates PKI and Smart Card with fingerprint Biometric - Requires Windows XP and Active Directory Current Status: Enabling Single Sign On (SSO) for DoS applications and websites Completing Overseas deployments and Planning HW refresh Near Term Goal: Elimination of Passwords on the Department OpenNet+ system (over 45,000 users at over 300 offices and posts world wide) Future Goal: Implementation on the Department s ClassNet. IRM/OPS/ITI/SI/IIB 18

BLADE Technology Precise MC Series hardware integrates biometric capture device with smart card reader. Uses existing smart badges with Match-On-Card (MOC). Only extracted templates stored on the smart card (up to 4 fingers) Biometric templates never leave the smart card 1-1 verification occurs on the smart card Matching algorithm is a hybrid of minutiae and pattern matching technologies. IRM/OPS/ITI/SI/IIB 19

HSPD-12 Phase 1 New applications developed to use either PIV authentication certificate or PKI/BLADE signing certificate for authentication Phase 2 Incorporation of PKI/BLADE container and PIV container on a single PIV compliant smart card. Phase 3 Move PKI/BLADE functionality into PIV Container (w/ NIST-approved authentication) IRM/OPS/ITI/SI/IIB 20

BLADE Challenges Integration of new logon paradigm Education and training Coordination among various approval groups Coordination among multiple vendor products Card Reader / Middleware / Application interaction Use of open standards where possible Implementation within DoS environment HW/SW upgrades both domestic and overseas Availability of sufficient smart card memory Failure To Enroll (FTE) mitigation IRM/OPS/ITI/SI/IIB 21

Summary BLADE/PKI has strengthened IT security & access control to DoS computer networks and applications. Biometrics & PKI are mutually supporting and both are stored on the Smart Cards to provide added security. BLADE/PKI will return to a single credential that is employed in a number of SSO solutions. IRM/OPS/ITI/SI/IIB 22

Questions & Contacts about the Department of State PKI/BLADE Program Jarrod M. Frahm BLADE Program Manager Mark A. McCloy PKI Program Manager Steven E. Gregory IIB Branch Chief PKIRegistrationCenter@state.gov IRM/OPS/ITI/SI/IIB 23