SlideShare a Scribd company logo
1 of 22
Download to read offline
Integrated Lifecycle Management
         of Smart Cards, USB Tokens
                  & User Credentials
Badge & Credential Management



 Agenda
• Introduction
   –   IT Security: Too many challenges…
   –   A strong need for “Trusted Identities”
   –   “Trusted Users” Key Benefits
   –   A strong need for Integrated Badge & Credential Management (CMS)

• OpenTrust SCM Overview
   –   OpenTrust SCM Key Benefits
   –   A Simple and Full Featured Enterprise CMS
   –   Making “Trusted Users” a reality
   –   OpenTrust SCM Architecture and Ecosystem
   –   Worldwide References & related business cases

• Use Cases: eBanking, IAM Integation

                                                       Confidential - OPENTRUST - Page 2
IT Security: too many challenges …



     How to allow IS access to roaming users,
     third parties and remote application services
     without How to secure access control to business
              compromising IT security ?
              applications, while authentication schemes
                 How to (safely) provide enough
              rely (mostly) on shareable/spoofable logins
              and passwordsto adapt to :
                 IS flexibility ?
                 How to warrant Enterprise data privacy and
                 ► Evolving business workflow requirements ?
                 integrity in order to protect mission critical
                 ► Organization and regulations changes ?
How to take advantage of electronic to existing regulations
                 assets, with respect
                 ► Heterogeneous connection means and devices ?
transactions to leverage business SAFE, etc.) ?
                 (SOX, PCI, Bale II,
processes and to increase global
productivity to get better protected against
       How ?
       internal threats & frauds ?

       etc…




                                                  Confidential - OPENTRUST - Page 3
Electronic Trust… a global answer


The widespread use of Digital Identities securely granted to any user
and IS component establishes the basis of new and powerful security
                    At OpenTrust, we believe that implementing a
policy enforcement paradigms :
                    global Trust Infrastructure is the Corporate
                                                       only foundation
                                                           User
                    to address upcoming IT security challenges
 ► “Trusted Networks” in one, with respect to :
                    all
                                                                      Authorized
                                         IAN / IBNS                    Employee
                                                                        External
 ► “Trusted Users” - Security standards                                     User
 ► “Trusted Transactions”                          OK
                      - Ease of use
                   Certificate                               KO
                                              KO
          ArchivingProvider (PKI)
            System
                      - Productivity requirements (TCO, ROI)
                                                                          Customer



                               SSOBusiness
                                Application
                               Server
                                     Portal
                                                    OTP
                                                    Server

                                                         Confidential - OPENTRUST - Page 4
Key benefits of “Trusted Users” (1/2)


Prevent user security credentials disclosure using a single,
safe and personal cryptographic support
 ► Enabling IS-wide “two factor” strong authentication, regardless of
   connection means and user types
 ► Confining multiple user “secrets” (OTP, SSO, Key pairs…) in a single
   support that can be fully managed locally and remotely at any time
 ► Providing a suitable mean of convergence for logical (certificate, key
   pairs…) and physical (contactless, biometrics…) access control
   credentials… one step toward unified Corporate Badging

Allow a simple, cost effective and deep integration
of asymmetric cryptography standards in the IT environment
 ► Already supported by most of the IT (infrastructure: routers, switches…
   & software components: web servers, email clients, SSO, Windows
   Logon…)
 ► Enabling easy user (or server) based data encryption and regulation
   compliant digital signature



                                                       Confidential - OPENTRUST - Page 5
Key benefits of “Trusted Users” (2/2)


Establish a user friendly “state of the art” security model
 ► No more passwords (goal : not even a few)
 ► Simple and secure handling of personal authentication means
 ► Enhanced user capabilities and asset protection (encryption, digital
   signature)
 ► Empowered user productivity (focus on core business rather than
   getting lost with multiple access control schemes)

Provide secure and integrated credential lifecycle management
to existing X.509 Certificate (PKI), SSO, OTP & IAM solutions
 ► Allowing them to rely on secure digital identities that can be trusted
   far beyond logins and passwords… and that belong to a global,
   consistent and business effective security policy
 ► Lowering TCO : multiple (i.e. per solution) credential management
   tasks are automated and handled from a focal point :
   the Card Management System (CMS)




                                                      Confidential - OPENTRUST - Page 6
Requirements for an Enterprise CMS

Widespread use of Digital Identities stored
on personal cryptographic supports is a
very attractive approach of user security

But it requires strong and complete
management capabilities to become
a reality across the Enterprise




                   Multiple Lifecycle
                   Operations                       Multiple Supports
                   Distribution & Enrollement       Multi vendors                 Multiple Holders
                   Revocation                       Smart Cards & Tokens          Employees,
                   Credential renewal               (and related drivers,         Externals,
                   Badge recycling                  middlewares…)                 Partners,
                   Self care (unlocking,                                          Customers (B2B, B2C),
                   PIN change, replacement, etc.)                                 Etc…




                                                                     Confidential - OPENTRUST - Page 7
OpenTrust SCM Key Benefits



            is a comprehensive answer that provides enterprise
wide “Trusted Users” management capabilities, while remaining :
 ►   Highly secure (communications,
     access control, operations, auditing…)
 ►   Simple and user friendly (easy endorsement,
     enhanced productivity)
 ►   Open to third party solutions (SSO, OTP, IAM…)
     and trough standard interfaces (Web Services,
     LDAP, PKCS#7...)
 ►   Flexible and complete (multiple smart card & token support,
     many operator and user profiles, heterogeneous
     issuance and lifecycle operations…)
 ►   Cost effective: providing an outstanding security level,
     while lowering user credential management costs
     (automation, centralization, homogeneity)


                                                        Confidential - OPENTRUST - Page 8
OpenTrust SCM a simple
                                                     and full featured CMS

•   Modeling tools: datasources & profiles (users,
    cards, certificates…)
•   Integrated Enrolment & Issuance processes
     –   “Self Enrolment” by the badge holder (end user)
     –   Issuance through the “Badge Office”
     –   Badge “Pre Personalization” process
•   Card & Token Lifecycle Management processes
     –                      • Badge holder Self
         Issuance of replacement/temporary badges Care operations
     –                          –
         Badge loss/theft statement Certificate renewal
     –                          – Auto recovery of old encryption certificates
         Replacement and renewal of cryptographic contents
     –   Badge recycling        – PIN Code change
     –                          – Badge
         Card & Token remote unlocking unlocking (on line, off line)

                           •   Common Platform Services
                                –   Logging, notification, publication, auditing…
                                –   Strong Authentication and Access Control
                                –   Dynamic application skinning and
                                    multi lingual support
                                –   Platform clustering and HA management



                                                               Confidential - OPENTRUST - Page 9
Making “Trusted Users” a reality…

                                         Enterprise AD / LDAP
                                               User Directory
                                                                  Hardware
                                                                     Security
                Help Desk                                            Module                  PKI
               Operator
                                         OK                                                    Server




                                                  Auto
  Security                                     Discovery
                                               Credential
Officer                                     of Generation
                                               User’s Card
                                                 Existing
                                            IT Infrastructure
                                            Profile
                                                Requests
                                                 (SOAP)
                                                                                                          OTP
                            User                                                                        Server
                        Authentication
                                                 Automated Card
 Card User
      Holder                                   Initialization process
   Employee,
   External,
  Partner,
     etc.                                                                                  SSO
                                                                                         Server



                   Enrolled Support
                     Empty Support
                                                                         Confidential - OPENTRUST - Page 10
OpenTrust SCM Architecture


                         Third-party             OpenTrust               OpenTrust
                         Applications               PKI                    OTP

                                                 WS/SOAP                  WS/SOAP




                              OpenTrust SCM Server
                              Smartcard & Cedentials
                                                                               HSM
                              Lifecycle Management

                                 Card profile       Card profile      Card profile
                                Authentication       Signature        encryption
           Smartcard
      Initialization &
Selfcare Operations
                                                                   WS/SOAP


                                     Third-party
                                     Applications
                                        (IAM)




                                                               Confidential - OPENTRUST - Page 11
A large and complete Ecosystem



                        PKI
                         Microsoft
                              PKI                              HSM
                                                               Vendors


      Certificate
             Providers




SSO & IAM
Providers


                                                       Card & Token
                                                       Manufacturers
            OTP
            Solutions     One Time Password


                                                                 Confidential - OPENTRUST - Page 12
Smart Card & Credentials Management
                                   Worlwide References




                    SWISS
                 CARREFOUR
              ALSTOM Transport
                   THALES Office
              MinisterTOTAL
             French Custom
              DASSAULT Defense
                       of Aviation
                  MICHELIN
               RENAULT-NISSAN
                BNP PARIBAS
          Global OpenTrust PKI, SCM and OTP
        Multiservice Smart Card security project
       MigrationPKI deployed ofaccess users,
          Worldwide deployment a multiservice
      Global OpenTrustandBaltimore PKI and
        OpenTrust from a
       Strong physical& SCMproject targeting the
       OpenTrust PKI Cardlogical Management
       Implementation SCM Card 40.000 control
                               Card
       OpenTrust SCM& PlatformtoManagement
      for bothAuthentication Management project
    OpenTrust SCM Corporate Badging project for
                                  implementation,
  targetingCard forlogical access control (integration
     Smart(OCSCards), runningbothto logical (Mifare)
             150. 000both physical and Each dealer
                      holdersrunning physical access
  Projecta(GemaltoSSO from Evidian and with IAMis
                                 in production since
 including:legacy cards) Network. (integration
                               worldwideproduction
both physical and CMS system in OpenTrust
  From PKI, Smart Card
 group’s Worldwide Dealing Management, One Time
(Gemalto Cyberflex Cards), for
   (integration with
   Project
   control – 20.000
   since Sun100.000 enrolled OfficersServices and
   from & fromaaccess control,IAM from 20.000 more
      and logical Platform, badges since 2004,
 with2007 forMicrosystems)andUSB security token to
  withSSO SCMPassLogix30.000 GemaltoIBM “TIM”)
delivered withDigitalCustom-withusersrecycling
    Password, ActivIdentity6 weeks Worldwide
    PKI 2003 with already 2 daily usersworldwide
        SSO from self enrollingontargeting Cyberflex
                       Signature Web deployment,
                                     full
                  thanenrolled supports
                        30.000 the Minister
  get Cards), 70.000userscore business applications
       extranet 30.000 to from badges
            internal branch office users targeted
          secure document exchange platform
                access existing
         Usage:30 000access150.000 (HID, Mifare),
             ofPhysical Authentication (Wifi, VPN,
       Usage: Strong
 (parts, stoks, orders, etc.), control enrolled tokens
             Usage: Strong Authentication,
       Usage: Physical & logical access control
       Usage: logical access Cyberflex control
  Windows) andPhysical Access Control, X.509
   Usage: Strong Authentication, Signaturea legacy
   Usage: Physical (HQ)& Digital Data (viacards),
    OpenTrust OTP (on Access Control Encryption,
      Usage: PhysicalGemaltocontrol (Mifare)
        Data Encryption & logical access
     Usage: Physical accessEncryptionqualified
   Strong authentication, DataData VPN,(Mifare),
               Authentication, control
      Strong authentication (WIFI, Encryption,
       StrongStrong Authentication and Windows),
           SSO System), (WIFI, VPN, Windows),
       Digital Signature &encryption and
    Strong Usage: StrongProof Management,
            authentication Authentication
          Data encryptionSignature Secure
             Strong documentDigital Signature
                  &Digital and
                    Digital Signature
         digitalLogical accessXiring and
             Secure authentication
                 signature (via control
                    Data encryption
                                sendings
               to business applications
                  PIN Entry readers)
                   Data encryption




                                             Confidential - OPENTRUST - Page 13
“Self Enrolment” by the Badge Holder


                                     Enterprise AD/LDAP
                                        User Directory




                                                                                           Card
Central                                                                                  Shipping
Security Officer                                                           Server        Process
                      Card Serial                   a
                      Numbers
                      Registration

                                                c
                                        Auth.
                                                                                  Auto
                                      Scheme
                                                                             Discovery

                                                        User‘s Card
                                           d              Profile                            b



               Registered
                     User




                                                                Confidential - OPENTRUST - Page 14
Badge Enrollement through
                                                               the « Badge Office »




                                                                     Enterprise AD/LDAP
                                                                        User Directory

Enrolling            Badge
User                   Office       Badge
                                  Operator


             « PIN
                                                                                                  Server
             Code »
      Personal Q&A for
                Formal
                                        OK
              OffAuthentication
                  Line     c
            Identification
                                                       a

                                                               User‘s Card
                                              b                  Profile
                                                              OK   Enrolled
                                                                   User



                                                  + « PIN »

                                             EnrolledSupport
                                              Empty Support



                                                                      Confidential - OPENTRUST - Page 15
Badge “Pre Personalization” process
                                      Recording, Shipping and Assignment


                                          Enterprise AD/LDAP
                                             User Directory




Central
Security Officer                                                            Server
                   Card Serial
                   Numbers
                                                       a
                   (CSV file)                                                          b
                                 Card Shipping
                                       Process

                                                           c                Card Activation Code
                                                                            & Instructions
                                                               d



                                                                     e


           Card Delivery
               Operator
                                                                                 Enrolling
                                                                                     User


                                                                   Confidential - OPENTRUST - Page 16
“Pre Perso” Process
           Stage 2 – Final Badge Activation by the Holder




                       Enterprise AD/LDAP
                          User Directory




Enrolled
   User
                       a      « Activation                  Server
                                 Code »
              « PIN
              Code »

                                  b




                                             Confidential - OPENTRUST - Page 17
“Pre Perso” Process
            Stage 1 – Badge recording & “face to face” Issuance




                                          Enterprise AD/LDAP
             Badge                           User Directory
            Bureau
Enrolling        Badge
User           Operator



               c
                                  a
                                                                    Server

                                  b




                                          Confidential - OPENTRUST - Page 18
Use Case : “Trusted Users” in eBanking




                                             Token Serial
                                             Numbers
                              Security       Registration
                               Officer
                                                                               Server




                                      Token’s               
                                       Central                                  Activation
                                    Enrolment                  Production
                                                              Environment          Codes
                     Token
                  Shipping
                  Process


                                                                                        Mailing
                                                                                         Process
                          Secure Auth                      B2C eBanking
                   Secure Transactions                      Infrastructure
                                                                                           
Customer
                   Personal
     Token Activation Code


                                                            Confidential - OPENTRUST - Page 19
Use Case: Tight Coopling with the IAM

                                                « User Properties & Identities »


                                                                 PKI
  Help Desk                                                      Server
 Operator
                    Enterprise
                Portal / IAM
                                                                                                 Enterprise
                                                                                                 AD / LDAP
                                                                                                 User Directory




                                                                                  Secure
Card Holder                                                                LDAP / SOAP
  Employee,                                                                Infrastructure
   External,
     Partner,
                                            Server
       etc.




                                   Security
                                Credentials                                                          OTP
                                                                                                     Server
                 Authentication : WIFI, VPN, SSO, Windows…
                     Encryption : Certificates & Private Keys                           SSO
                      Digital Signature : Signing Certificates                        Server
                                    for Business Applications


                                                                               Confidential - OPENTRUST - Page 20
OpenTrust SCM Sample Card Profile



                          Access
                          Control

    SSO App.                               Workflows
                                           & Options




                           Card
  X.509                   Profile
                                                Security
Certificate                                      Profile
 Profiles



              Smart
              Cards
              (Gemalto,             Operators
               Obertur,
               Aladdin)




                                                       Confidential - OPENTRUST - Page 21
OpenTrust Project Méthodology



                                                    Solution’s
                        Training & Skills        Architecture &
  Project Launch
                           Transfert               Parameters
                                                  specification




   Qualification                                 Qualification
                      Server infrastructure
    Platform’s                                     Platform
                          Installation &
                                                Setup & Config.
Acceptance Testing        Configuration
                                                    Phase




                                              Roll out & Operations
Production Platform         Formal
  Setup & Config.          Reception             Maintenance &
      Phase                & Sign Off              support from
                                                    OpenTrust




                                              Confidential - OPENTRUST - Page 22

More Related Content

What's hot

Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Hitachi ID Solutions Supporting HIPAA Compliance
Hitachi ID Solutions Supporting HIPAA ComplianceHitachi ID Solutions Supporting HIPAA Compliance
Hitachi ID Solutions Supporting HIPAA ComplianceHitachi ID Systems, Inc.
 
Aus lug lotus protector
Aus lug   lotus protectorAus lug   lotus protector
Aus lug lotus protectoraosborne
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationNovell
 

What's hot (19)

Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB Compliance
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
test
testtest
test
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Identity access management
Identity access management Identity access management
Identity access management
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Hitachi ID Solutions Supporting HIPAA Compliance
Hitachi ID Solutions Supporting HIPAA ComplianceHitachi ID Solutions Supporting HIPAA Compliance
Hitachi ID Solutions Supporting HIPAA Compliance
 
Aus lug lotus protector
Aus lug   lotus protectorAus lug   lotus protector
Aus lug lotus protector
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
טכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידעטכנולוגיות אבטחת מערכות מידע
טכנולוגיות אבטחת מערכות מידע
 
IAM
IAM IAM
IAM
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor Authentication
 

Similar to SmartCard Forum 2009 - OpenTrust SCM

SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketOKsystem
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEGreg Stone
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)Torsten Lodderstedt
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesSymantec
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Instituteeshwarvisualpath
 

Similar to SmartCard Forum 2009 - OpenTrust SCM (20)

SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver  ISSA Chapter Meetings - Changing the Security ParadigmDenver  ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Institute
 

More from OKsystem

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslyOKsystem
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesOKsystem
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultOKsystem
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelOKsystem
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíOKsystem
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileOKsystem
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupOKsystem
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesOKsystem
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesOKsystem
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securityOKsystem
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKsystem
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKsystem
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKsystem
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKsystem
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové kartyOKsystem
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorOKsystem
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportuOKsystem
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOKsystem
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?OKsystem
 

More from OKsystem (20)

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial services
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobile
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - Babel
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
 
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setupSmart Cards & Devices Forum 2013 - Wi-fi protected setup
Smart Cards & Devices Forum 2013 - Wi-fi protected setup
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderně
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HR
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIAN
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové karty
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS Connector
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportu
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavatele
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 

SmartCard Forum 2009 - OpenTrust SCM

  • 1. Integrated Lifecycle Management of Smart Cards, USB Tokens & User Credentials
  • 2. Badge & Credential Management Agenda • Introduction – IT Security: Too many challenges… – A strong need for “Trusted Identities” – “Trusted Users” Key Benefits – A strong need for Integrated Badge & Credential Management (CMS) • OpenTrust SCM Overview – OpenTrust SCM Key Benefits – A Simple and Full Featured Enterprise CMS – Making “Trusted Users” a reality – OpenTrust SCM Architecture and Ecosystem – Worldwide References & related business cases • Use Cases: eBanking, IAM Integation Confidential - OPENTRUST - Page 2
  • 3. IT Security: too many challenges … How to allow IS access to roaming users, third parties and remote application services without How to secure access control to business compromising IT security ? applications, while authentication schemes How to (safely) provide enough rely (mostly) on shareable/spoofable logins and passwordsto adapt to : IS flexibility ? How to warrant Enterprise data privacy and ► Evolving business workflow requirements ? integrity in order to protect mission critical ► Organization and regulations changes ? How to take advantage of electronic to existing regulations assets, with respect ► Heterogeneous connection means and devices ? transactions to leverage business SAFE, etc.) ? (SOX, PCI, Bale II, processes and to increase global productivity to get better protected against How ? internal threats & frauds ? etc… Confidential - OPENTRUST - Page 3
  • 4. Electronic Trust… a global answer The widespread use of Digital Identities securely granted to any user and IS component establishes the basis of new and powerful security At OpenTrust, we believe that implementing a policy enforcement paradigms : global Trust Infrastructure is the Corporate only foundation User to address upcoming IT security challenges ► “Trusted Networks” in one, with respect to : all Authorized IAN / IBNS Employee External ► “Trusted Users” - Security standards User ► “Trusted Transactions” OK - Ease of use Certificate KO KO ArchivingProvider (PKI) System - Productivity requirements (TCO, ROI) Customer SSOBusiness Application Server Portal OTP Server Confidential - OPENTRUST - Page 4
  • 5. Key benefits of “Trusted Users” (1/2) Prevent user security credentials disclosure using a single, safe and personal cryptographic support ► Enabling IS-wide “two factor” strong authentication, regardless of connection means and user types ► Confining multiple user “secrets” (OTP, SSO, Key pairs…) in a single support that can be fully managed locally and remotely at any time ► Providing a suitable mean of convergence for logical (certificate, key pairs…) and physical (contactless, biometrics…) access control credentials… one step toward unified Corporate Badging Allow a simple, cost effective and deep integration of asymmetric cryptography standards in the IT environment ► Already supported by most of the IT (infrastructure: routers, switches… & software components: web servers, email clients, SSO, Windows Logon…) ► Enabling easy user (or server) based data encryption and regulation compliant digital signature Confidential - OPENTRUST - Page 5
  • 6. Key benefits of “Trusted Users” (2/2) Establish a user friendly “state of the art” security model ► No more passwords (goal : not even a few) ► Simple and secure handling of personal authentication means ► Enhanced user capabilities and asset protection (encryption, digital signature) ► Empowered user productivity (focus on core business rather than getting lost with multiple access control schemes) Provide secure and integrated credential lifecycle management to existing X.509 Certificate (PKI), SSO, OTP & IAM solutions ► Allowing them to rely on secure digital identities that can be trusted far beyond logins and passwords… and that belong to a global, consistent and business effective security policy ► Lowering TCO : multiple (i.e. per solution) credential management tasks are automated and handled from a focal point : the Card Management System (CMS) Confidential - OPENTRUST - Page 6
  • 7. Requirements for an Enterprise CMS Widespread use of Digital Identities stored on personal cryptographic supports is a very attractive approach of user security But it requires strong and complete management capabilities to become a reality across the Enterprise Multiple Lifecycle Operations Multiple Supports Distribution & Enrollement Multi vendors Multiple Holders Revocation Smart Cards & Tokens Employees, Credential renewal (and related drivers, Externals, Badge recycling middlewares…) Partners, Self care (unlocking, Customers (B2B, B2C), PIN change, replacement, etc.) Etc… Confidential - OPENTRUST - Page 7
  • 8. OpenTrust SCM Key Benefits is a comprehensive answer that provides enterprise wide “Trusted Users” management capabilities, while remaining : ► Highly secure (communications, access control, operations, auditing…) ► Simple and user friendly (easy endorsement, enhanced productivity) ► Open to third party solutions (SSO, OTP, IAM…) and trough standard interfaces (Web Services, LDAP, PKCS#7...) ► Flexible and complete (multiple smart card & token support, many operator and user profiles, heterogeneous issuance and lifecycle operations…) ► Cost effective: providing an outstanding security level, while lowering user credential management costs (automation, centralization, homogeneity) Confidential - OPENTRUST - Page 8
  • 9. OpenTrust SCM a simple and full featured CMS • Modeling tools: datasources & profiles (users, cards, certificates…) • Integrated Enrolment & Issuance processes – “Self Enrolment” by the badge holder (end user) – Issuance through the “Badge Office” – Badge “Pre Personalization” process • Card & Token Lifecycle Management processes – • Badge holder Self Issuance of replacement/temporary badges Care operations – – Badge loss/theft statement Certificate renewal – – Auto recovery of old encryption certificates Replacement and renewal of cryptographic contents – Badge recycling – PIN Code change – – Badge Card & Token remote unlocking unlocking (on line, off line) • Common Platform Services – Logging, notification, publication, auditing… – Strong Authentication and Access Control – Dynamic application skinning and multi lingual support – Platform clustering and HA management Confidential - OPENTRUST - Page 9
  • 10. Making “Trusted Users” a reality… Enterprise AD / LDAP User Directory Hardware Security Help Desk Module PKI Operator OK Server Auto Security Discovery Credential Officer of Generation User’s Card Existing IT Infrastructure Profile Requests (SOAP) OTP User Server Authentication Automated Card Card User Holder Initialization process Employee, External, Partner, etc. SSO Server Enrolled Support Empty Support Confidential - OPENTRUST - Page 10
  • 11. OpenTrust SCM Architecture Third-party OpenTrust OpenTrust Applications PKI OTP WS/SOAP WS/SOAP OpenTrust SCM Server Smartcard & Cedentials HSM Lifecycle Management Card profile Card profile Card profile Authentication Signature encryption Smartcard Initialization & Selfcare Operations WS/SOAP Third-party Applications (IAM) Confidential - OPENTRUST - Page 11
  • 12. A large and complete Ecosystem PKI Microsoft PKI HSM Vendors Certificate Providers SSO & IAM Providers Card & Token Manufacturers OTP Solutions One Time Password Confidential - OPENTRUST - Page 12
  • 13. Smart Card & Credentials Management Worlwide References SWISS CARREFOUR ALSTOM Transport THALES Office MinisterTOTAL French Custom DASSAULT Defense of Aviation MICHELIN RENAULT-NISSAN BNP PARIBAS Global OpenTrust PKI, SCM and OTP Multiservice Smart Card security project MigrationPKI deployed ofaccess users, Worldwide deployment a multiservice Global OpenTrustandBaltimore PKI and OpenTrust from a Strong physical& SCMproject targeting the OpenTrust PKI Cardlogical Management Implementation SCM Card 40.000 control Card OpenTrust SCM& PlatformtoManagement for bothAuthentication Management project OpenTrust SCM Corporate Badging project for implementation, targetingCard forlogical access control (integration Smart(OCSCards), runningbothto logical (Mifare) 150. 000both physical and Each dealer holdersrunning physical access Projecta(GemaltoSSO from Evidian and with IAMis in production since including:legacy cards) Network. (integration worldwideproduction both physical and CMS system in OpenTrust From PKI, Smart Card group’s Worldwide Dealing Management, One Time (Gemalto Cyberflex Cards), for (integration with Project control – 20.000 since Sun100.000 enrolled OfficersServices and from & fromaaccess control,IAM from 20.000 more and logical Platform, badges since 2004, with2007 forMicrosystems)andUSB security token to withSSO SCMPassLogix30.000 GemaltoIBM “TIM”) delivered withDigitalCustom-withusersrecycling Password, ActivIdentity6 weeks Worldwide PKI 2003 with already 2 daily usersworldwide SSO from self enrollingontargeting Cyberflex Signature Web deployment, full thanenrolled supports 30.000 the Minister get Cards), 70.000userscore business applications extranet 30.000 to from badges internal branch office users targeted secure document exchange platform access existing Usage:30 000access150.000 (HID, Mifare), ofPhysical Authentication (Wifi, VPN, Usage: Strong (parts, stoks, orders, etc.), control enrolled tokens Usage: Strong Authentication, Usage: Physical & logical access control Usage: logical access Cyberflex control Windows) andPhysical Access Control, X.509 Usage: Strong Authentication, Signaturea legacy Usage: Physical (HQ)& Digital Data (viacards), OpenTrust OTP (on Access Control Encryption, Usage: PhysicalGemaltocontrol (Mifare) Data Encryption & logical access Usage: Physical accessEncryptionqualified Strong authentication, DataData VPN,(Mifare), Authentication, control Strong authentication (WIFI, Encryption, StrongStrong Authentication and Windows), SSO System), (WIFI, VPN, Windows), Digital Signature &encryption and Strong Usage: StrongProof Management, authentication Authentication Data encryptionSignature Secure Strong documentDigital Signature &Digital and Digital Signature digitalLogical accessXiring and Secure authentication signature (via control Data encryption sendings to business applications PIN Entry readers) Data encryption Confidential - OPENTRUST - Page 13
  • 14. “Self Enrolment” by the Badge Holder Enterprise AD/LDAP User Directory Card Central Shipping Security Officer Server Process Card Serial a Numbers Registration c Auth. Auto Scheme Discovery User‘s Card d Profile b Registered User Confidential - OPENTRUST - Page 14
  • 15. Badge Enrollement through the « Badge Office » Enterprise AD/LDAP User Directory Enrolling Badge User Office Badge Operator « PIN Server Code » Personal Q&A for Formal OK OffAuthentication Line c Identification a User‘s Card b Profile OK Enrolled User + « PIN » EnrolledSupport Empty Support Confidential - OPENTRUST - Page 15
  • 16. Badge “Pre Personalization” process Recording, Shipping and Assignment Enterprise AD/LDAP User Directory Central Security Officer Server Card Serial Numbers a (CSV file) b Card Shipping Process c Card Activation Code & Instructions d e Card Delivery Operator Enrolling User Confidential - OPENTRUST - Page 16
  • 17. “Pre Perso” Process Stage 2 – Final Badge Activation by the Holder Enterprise AD/LDAP User Directory Enrolled User a « Activation Server Code » « PIN Code » b Confidential - OPENTRUST - Page 17
  • 18. “Pre Perso” Process Stage 1 – Badge recording & “face to face” Issuance Enterprise AD/LDAP Badge User Directory Bureau Enrolling Badge User Operator c a Server b Confidential - OPENTRUST - Page 18
  • 19. Use Case : “Trusted Users” in eBanking Token Serial Numbers Security Registration Officer  Server Token’s  Central Activation Enrolment Production Environment  Codes Token Shipping Process  Mailing Process  Secure Auth B2C eBanking Secure Transactions Infrastructure  Customer Personal Token Activation Code Confidential - OPENTRUST - Page 19
  • 20. Use Case: Tight Coopling with the IAM « User Properties & Identities » PKI Help Desk Server Operator Enterprise Portal / IAM Enterprise AD / LDAP User Directory Secure Card Holder LDAP / SOAP Employee, Infrastructure External, Partner, Server etc. Security Credentials OTP Server Authentication : WIFI, VPN, SSO, Windows… Encryption : Certificates & Private Keys SSO Digital Signature : Signing Certificates Server for Business Applications Confidential - OPENTRUST - Page 20
  • 21. OpenTrust SCM Sample Card Profile Access Control SSO App. Workflows & Options Card X.509 Profile Security Certificate Profile Profiles Smart Cards (Gemalto, Operators Obertur, Aladdin) Confidential - OPENTRUST - Page 21
  • 22. OpenTrust Project Méthodology Solution’s Training & Skills Architecture & Project Launch Transfert Parameters specification Qualification Qualification Server infrastructure Platform’s Platform Installation & Setup & Config. Acceptance Testing Configuration Phase Roll out & Operations Production Platform Formal Setup & Config. Reception Maintenance & Phase & Sign Off support from OpenTrust Confidential - OPENTRUST - Page 22