SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
<Insert Picture Here>




FICAM : Architecture and Design Strategies
Ramesh Nagappan
Principal Engineer (ISVe)
Ramesh.Nagappan@sun.com
The following is intended for information purposes
only, and may not be incorporated into any contract.
It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in
making purchasing decisions.
The development, release, and timing of any
features or functionality described for Oracle’s
products remains at the sole discretion of Oracle.
Agenda

 Quick overview on HSPD-12 Personal Identity Verification (PIV)
  Life-cycle Solution and its core components.
 Explore the Federal Identity Credential and Access Management
  (FICAM) guidelines and its key architectural and design
  requirements.
 Discuss the conceptual solution architecture and technology
  components for agency-wide FICAM.
 Role and relevance of adopting to Oracle Identity Management
  Solution Suite and its supporting technologies for FICAM.
The PIV Life-cycle
PIV Identity Management Activities (From registration to till its retirement)


                                   Identity
                                Registration


                                                         Identity
         PIV Credential
                                                       Enrolment &
           Termination
                                                       Adjudication




         PIV Credential                               PIV Credential
          Maintenance                                   Issuance



                               PIV Physical &
                               Logical Access
                                  Control
The PIV Ecosystem
Core technology components of a PIV Lifecycle
Logical PIV Architecture Solution
Putting it all together
PIV Solution from Oracle and ISV Partners
Pre-Integrated, Pre-Verified and Pre-Tested for PIV Deployment
<Insert Picture Here>


FICAM Architecture &
Design Strategies
FICAM – Overview
   Understanding its rationale
• Federal Identity, Credential and Access Management (FICAM)
  > Represents the policy and guidelines for consistent and comprehensive
    approach for government-wide Identity and Access Management.
  > Defines a set of goals and objectives for achieving the ICAM end-state.
      > Comply with Federal laws, Regulations, Standards and Governance
      > Facilitate E-Government by streamlining access to services
      > Improve Security posture across the Federal enterprise
      > Enable Trust and Interoperability
      > Reduce cost and increase efficiency
  > The President’s FY2010 budgets cites the development of FICAM.
• FICAM Part A: Defines the Segment architecture outlining the
  principles, use cases. transition roadmap and milestones.
  > To ensure alignment, clarity and interoperability across agencies.
• FICAM Part B: Defines the Implementation Planning and
  Guidance.
FICAM: Conceptual Model




                                     FICAM – Conceptual Model and its key Service Areas

Source: ICAM – The Future of Identity Management, Judith Spencer (GSA), Smartcard Alliance Conference 2009
FICAM : Segment Architecture Use Cases
     High-level use cases that describe ICAM activities

1.    Create and Maintain Digital Identity Record for Internal User.
2.    Create and Maintain Digital Identity Record for External User.
3.    Perform Background Investigation for Federal Applicant.
4.    Create, Issue and Maintain PIV card.
5.    Create, Issue and Maintain PKI credential.
6.    Create, Issue and Maintain Password Token.
7.    Provision and De-provision User Account for an Application.
8.    Grant Physical Access to Employee or Contractor.
9.    Grant Visitor or Local Access to Federally-controlled Facility or Site.
10. Grant Logical Access.
11. Secure Document or Communication with PKI.
12. Application of the ICAM use cases.
FICAM: Services Framework




                                                  FICAM – Services Framework


Source: ICAM – The Future of Identity Management, Judith Spencer (GSA), Smartcard Alliance Conference 2009
A Quick Look at PIV Card
   FIPS-201 Mandatory and Optional On-Card Credentials

Mandatory Credentials
 PIN (Personal Identification Number)
 Cardholder Unique Identifier (CHUID)
 PIV Authentication Data (asymmetric key pair
 and corresponding PKI certificate)
 Two biometric fingerprints (CBEFF)

Optional Credentials
 An asymmetric key pair and corresponding
                                                  Source: GSA USAccess
 certificate for digital signatures
 An asymmetric key pair and corresponding
 certificate for key management
 Asymmetric or symmetric card authentication
 keys for supporting additional physical access
 applications
 Symmetric key(s) associated with the card
 management system
FICAM : Agency-level Challenges
• Enforcing Identity Assurance Authentication Levels for
  Physical Access Control Systems (PACS) and Logical
  Access Control Systems (LACS).
  • Need for multi-factor Identity assurance using PIV
    credentials for accessing PACS and LACS.
     o   OMB M-04-04 E-Authentication Guidance established 4
         authentication levels.
     o   NIST SP 800-116 defines PIV credentials based Identity
         assurance levels for Uncontrolled/Controlled/Limited/Exclusion
         areas.
     o   Enabling PIV credentials for multi-factor authentication
         integrating Federal bridge CA and Biometric authentication
         middleware.
               Defines a “Measure of Trust” with confidence levels
               Labelled as SOME, HIGH and VERY HIGH and its required PIV
                credentials using CHUID, PKI and Biometrics.
FICAM : Agency-level Challenges… contd.
• Secure Documents and Communications with PKI.
  • Digitally signed document communication and validation of PIV credentials with PKI
    providers (FBCA).
  • Digitally signed authorizations/approvals using PIV credentials for provisioning/de-
    provisioning actions.
• Convergence of Physical and Logical Access Control
  using PIV Credentials.
  • Automated instantaneous provisioning/de-provisioning of User
    accounts, access privileges and related attributes to PACS and LACS.
       o    Synchronization of User profile attributes, PIV credentials (PKI /
            Biometrics), CRLs, roles, status/attribute changes, access privileges,
            rules and policies to/from target resources.
       o    Automation of Authorization and Approval/Denial workflows and
            notifications for provisioning and deprovisioning of user accounts and
            privileges.
FICAM : Agency-level Challenges… contd.
• Back-end Attribute Exchange (BAE) & Retrieval for Policy
  Enforcement and Decisions.
    •   To support agency-level Policy enforcement and decision making, requires
        use of PIV card holder specific attributes (not available on card).
    •   BAE mandates fetching PIV card-holder’s off-card information from an
        authoritative source (Attribute Authority).
    •   BAE Architecture and interface must be in accordance with the specifications
        (v1.0 May 2008) created by FICC AWF (ICAMSC).
    •   Adopting SAML and SPML for lookup/fetching BAE information from inter-
        agency applications.
E-Authentication Identity Assurance Levels
    NIST specified PIV Authentication Mechanisms : SP800-116
Measure of Trust for PACS & LACS

Level 4: VERY HIGH Confidence
   Attended Biometric (BIO-A)
   PIV Authentication Key (PKI)
   Card Authentication Key (CAK) + (BIO-A)
Level 3: High Confidence
   Biometric (BIO)
Level 2: Some Confidence
   Visual (VIS)
   Cardholder Unique Identifier (CHUID)
   Card Authentication Key (CAK)
E-Authentication Assurance for LACS
         PIV Card Credentials based Authentication: Web SSO/Federation


                                                          SAML 2.0
                                    Service Provider        X.509
                                          (SP)            Exchange




                                                                                   OCSP
                                                                                 Validation

                                                             Identity Provider
                                                                   (IDP)




                                                       SAML 2.0
                                                         X.509
                                                       Exchange
• All 4 Assurance Levels                Other
                                   Service Providers
• PKI, Biometrics, CHUID
                                         (SP)
• PKI credentials verified to CA
• Fingerprints/CBEFF Match to Card
PIV Authentication (PKI + Biometrics)




• Fingerprints (CBEFF) matched to PIV Card.
• PKI Credentials (CAK) will be validated using OCSP or CRL DP.
Convergence of PACS & LACS
Provisioning and De-Provisioning Credentials for PACS/LACS
Digitally-signed Authorizations




• FIPS 201 and SP 800-73 mandates the use of Digital Signature for
  “Integrity and Authenticity”
• IDMS manages the authorization workflow and authority approval and
  denials.
  >   Digitally signed approvals using PIV card credentials verified against a Federal Bridge CA/Validation
      Authority (via OCSP or CRLs).

• Digital authorizations are captured in audit logs as “XML Signature”.
Back-end Attribute Exchange (BAE)
   Exchange of PIV Card holder Information between Back-end Systems
 Mechanisms for securely exchanging PIV Card holder information
  between Relying parties and authoritative sources.
   •   Backend Attribute Exchange Architecture & Interface specification
       is defined by GSA HSPD-12 team (May 2008).
   •   Enables PIV card holder information to relying service provider
       applications.
   •   Relying parties (RP) act as service providers that relies on Off-the-
       card information (Not stored on card) from an authoritative source.
          o    PIV Card information intended for supporting access control decisions, detecting PIV
               card tampering, accessing other agency locations, medical emergency etc.
          o    Enabling access to User attribute profiles, roles, status/attribute changes to/from
               target PIV card holder privileged resources.

 BAE Specification defines the architecture and implementation
  models for secure attribute exchange .
   •   SAML v2. Attribute Sharing Profile for on-demand exchange of PIV
       card hold attributes as a single request/response.
          •    Mandates the requests/responses are signed (XML Signature) and encrypted (XML
               Encryption).
   •   SPML 2.0 based request/responses for supporting lookup
       /updates/ batch query and retrieval of multiple PIV card holders
       attributes.
BAE: SAML Attribute Sharing
     Adopting to SAMLv2 w. X.509 Attribute Sharing Profile
                                 1   SAML Authentication Request


                                 2 SAML Authentication   Statement

                                                                                   Valid:
                                                                                    …


                                             SSL/TLS                               OCSP
                                                                              Request/Response
                SP                                                       IDP
               (Fedlet)                                                                           Validation
                                 3     SAML Attribute Query             (Oracle
                                                                        Identity                   Authority
                                                                     Federation
                                 4   SAML Attribute Statement                                    (PKI Provider)
                                                                     /OpenSSO)



• User authentication using the Smartcard based PKI credentials.
   SP may validate the X.509 credentials directly with a PKI provider or by redirection to IDP.
• To perform authorization, the SP retrieve the user profile attributes from
  the IDP using SAML Attribute exchange.
   SAML Attribute Sharing supports X.509 authentication based systems (SAML v2.0 XASP).
   The IDP (Acting as Attribute authority) identified using pre-configured SAML Metadata info at
    SP.
BAE: SAML w. X.509 Attribute Sharing
Deployment Scenario using Oracle Identity Federation / OpenSSO
BAE: Using SPML 2.0 for Attribute Sharing
SPML based Attribute Lookup/Update from Service Provider
UltraSPARC T2+: For Wire-speed Security
RSA Performance on Oracle Sun CMT
Oracle Weblogic SSL Performance on Sun CMT Servers
Using PIV Cards in Sun Ray Environment
<Insert Picture Here>


Q&A



Ramesh Nagappan
Ramesh.Nagappan@Sun.com
ICAM - Demo Architecture review

Mais conteúdo relacionado

Mais procurados

Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
steveramsthel
 
Pki enabling applications and mca implementation in tcs
Pki enabling applications and mca implementation in tcsPki enabling applications and mca implementation in tcs
Pki enabling applications and mca implementation in tcs
H9460730008
 
Identity systems
Identity systemsIdentity systems
Identity systems
Jim Fenton
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
Roger CARHUATOCTO
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
alwayson
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
Hendrix Bodden
 

Mais procurados (18)

Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Access management
Access managementAccess management
Access management
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
Code objects overview sep 2012
Code objects overview   sep 2012Code objects overview   sep 2012
Code objects overview sep 2012
 
Pki enabling applications and mca implementation in tcs
Pki enabling applications and mca implementation in tcsPki enabling applications and mca implementation in tcs
Pki enabling applications and mca implementation in tcs
 
Identity systems
Identity systemsIdentity systems
Identity systems
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to Audit
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
 
Experiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceExperiences in federated access control for UK e-Science
Experiences in federated access control for UK e-Science
 
IDM & IAM 2012
IDM & IAM 2012IDM & IAM 2012
IDM & IAM 2012
 
20120510 università
20120510 università20120510 università
20120510 università
 
ICAM Target Architecture
ICAM Target ArchitectureICAM Target Architecture
ICAM Target Architecture
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Hitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentation
 
Globalnest powerpoint presentation
Globalnest powerpoint presentationGlobalnest powerpoint presentation
Globalnest powerpoint presentation
 

Destaque (7)

Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysis
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysis
 
Data Envelopment Analysis
Data Envelopment AnalysisData Envelopment Analysis
Data Envelopment Analysis
 
Data Envelopment Analysis
Data Envelopment AnalysisData Envelopment Analysis
Data Envelopment Analysis
 
DEA Presentation
DEA PresentationDEA Presentation
DEA Presentation
 
Data envelopment analysis
Data envelopment analysisData envelopment analysis
Data envelopment analysis
 

Semelhante a ICAM - Demo Architecture review

Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Ramesh Nagappan
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
Ramesh Nagappan
 
Issa fi xs briefing
Issa fi xs briefingIssa fi xs briefing
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
fcleary
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
Risk Crew
 

Semelhante a ICAM - Demo Architecture review (20)

Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
FICAM Impact On Enterprise Architecture And Applications
FICAM Impact On Enterprise Architecture And ApplicationsFICAM Impact On Enterprise Architecture And Applications
FICAM Impact On Enterprise Architecture And Applications
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
E collaborationscottrea
E collaborationscottreaE collaborationscottrea
E collaborationscottrea
 
US Security for Cyber Security
US Security for Cyber SecurityUS Security for Cyber Security
US Security for Cyber Security
 
PKI Interoperability
PKI InteroperabilityPKI Interoperability
PKI Interoperability
 
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
 
Issa fi xs briefing
Issa fi xs briefingIssa fi xs briefing
Issa fi xs briefing
 
Posecco clustering meeting
Posecco clustering meetingPosecco clustering meeting
Posecco clustering meeting
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Kookmin Bank FIDO Case Study
Kookmin Bank FIDO Case StudyKookmin Bank FIDO Case Study
Kookmin Bank FIDO Case Study
 
PCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management CompliancePCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management Compliance
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Fully Automated Billing Verification
Fully Automated Billing VerificationFully Automated Billing Verification
Fully Automated Billing Verification
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 

Mais de Ramesh Nagappan

High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...
Ramesh Nagappan
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Ramesh Nagappan
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card Platform
Ramesh Nagappan
 
Java Platform Security Architecture
Java Platform Security ArchitectureJava Platform Security Architecture
Java Platform Security Architecture
Ramesh Nagappan
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO
Ramesh Nagappan
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Ramesh Nagappan
 

Mais de Ramesh Nagappan (13)

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005
 
Interoperable Provisioning in a distributed world
Interoperable Provisioning in a distributed worldInteroperable Provisioning in a distributed world
Interoperable Provisioning in a distributed world
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperCluster
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted Cryptography
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card Platform
 
Java Platform Security Architecture
Java Platform Security ArchitectureJava Platform Security Architecture
Java Platform Security Architecture
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
 

Último

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

ICAM - Demo Architecture review

  • 1. <Insert Picture Here> FICAM : Architecture and Design Strategies Ramesh Nagappan Principal Engineer (ISVe) Ramesh.Nagappan@sun.com
  • 2. The following is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 3. Agenda  Quick overview on HSPD-12 Personal Identity Verification (PIV) Life-cycle Solution and its core components.  Explore the Federal Identity Credential and Access Management (FICAM) guidelines and its key architectural and design requirements.  Discuss the conceptual solution architecture and technology components for agency-wide FICAM.  Role and relevance of adopting to Oracle Identity Management Solution Suite and its supporting technologies for FICAM.
  • 4.
  • 5. The PIV Life-cycle PIV Identity Management Activities (From registration to till its retirement) Identity Registration Identity PIV Credential Enrolment & Termination Adjudication PIV Credential PIV Credential Maintenance Issuance PIV Physical & Logical Access Control
  • 6. The PIV Ecosystem Core technology components of a PIV Lifecycle
  • 7. Logical PIV Architecture Solution Putting it all together
  • 8. PIV Solution from Oracle and ISV Partners Pre-Integrated, Pre-Verified and Pre-Tested for PIV Deployment
  • 9. <Insert Picture Here> FICAM Architecture & Design Strategies
  • 10. FICAM – Overview Understanding its rationale • Federal Identity, Credential and Access Management (FICAM) > Represents the policy and guidelines for consistent and comprehensive approach for government-wide Identity and Access Management. > Defines a set of goals and objectives for achieving the ICAM end-state. > Comply with Federal laws, Regulations, Standards and Governance > Facilitate E-Government by streamlining access to services > Improve Security posture across the Federal enterprise > Enable Trust and Interoperability > Reduce cost and increase efficiency > The President’s FY2010 budgets cites the development of FICAM. • FICAM Part A: Defines the Segment architecture outlining the principles, use cases. transition roadmap and milestones. > To ensure alignment, clarity and interoperability across agencies. • FICAM Part B: Defines the Implementation Planning and Guidance.
  • 11. FICAM: Conceptual Model FICAM – Conceptual Model and its key Service Areas Source: ICAM – The Future of Identity Management, Judith Spencer (GSA), Smartcard Alliance Conference 2009
  • 12. FICAM : Segment Architecture Use Cases High-level use cases that describe ICAM activities 1. Create and Maintain Digital Identity Record for Internal User. 2. Create and Maintain Digital Identity Record for External User. 3. Perform Background Investigation for Federal Applicant. 4. Create, Issue and Maintain PIV card. 5. Create, Issue and Maintain PKI credential. 6. Create, Issue and Maintain Password Token. 7. Provision and De-provision User Account for an Application. 8. Grant Physical Access to Employee or Contractor. 9. Grant Visitor or Local Access to Federally-controlled Facility or Site. 10. Grant Logical Access. 11. Secure Document or Communication with PKI. 12. Application of the ICAM use cases.
  • 13. FICAM: Services Framework FICAM – Services Framework Source: ICAM – The Future of Identity Management, Judith Spencer (GSA), Smartcard Alliance Conference 2009
  • 14. A Quick Look at PIV Card FIPS-201 Mandatory and Optional On-Card Credentials Mandatory Credentials PIN (Personal Identification Number) Cardholder Unique Identifier (CHUID) PIV Authentication Data (asymmetric key pair and corresponding PKI certificate) Two biometric fingerprints (CBEFF) Optional Credentials An asymmetric key pair and corresponding Source: GSA USAccess certificate for digital signatures An asymmetric key pair and corresponding certificate for key management Asymmetric or symmetric card authentication keys for supporting additional physical access applications Symmetric key(s) associated with the card management system
  • 15. FICAM : Agency-level Challenges • Enforcing Identity Assurance Authentication Levels for Physical Access Control Systems (PACS) and Logical Access Control Systems (LACS). • Need for multi-factor Identity assurance using PIV credentials for accessing PACS and LACS. o OMB M-04-04 E-Authentication Guidance established 4 authentication levels. o NIST SP 800-116 defines PIV credentials based Identity assurance levels for Uncontrolled/Controlled/Limited/Exclusion areas. o Enabling PIV credentials for multi-factor authentication integrating Federal bridge CA and Biometric authentication middleware.  Defines a “Measure of Trust” with confidence levels  Labelled as SOME, HIGH and VERY HIGH and its required PIV credentials using CHUID, PKI and Biometrics.
  • 16. FICAM : Agency-level Challenges… contd. • Secure Documents and Communications with PKI. • Digitally signed document communication and validation of PIV credentials with PKI providers (FBCA). • Digitally signed authorizations/approvals using PIV credentials for provisioning/de- provisioning actions. • Convergence of Physical and Logical Access Control using PIV Credentials. • Automated instantaneous provisioning/de-provisioning of User accounts, access privileges and related attributes to PACS and LACS. o Synchronization of User profile attributes, PIV credentials (PKI / Biometrics), CRLs, roles, status/attribute changes, access privileges, rules and policies to/from target resources. o Automation of Authorization and Approval/Denial workflows and notifications for provisioning and deprovisioning of user accounts and privileges.
  • 17. FICAM : Agency-level Challenges… contd. • Back-end Attribute Exchange (BAE) & Retrieval for Policy Enforcement and Decisions. • To support agency-level Policy enforcement and decision making, requires use of PIV card holder specific attributes (not available on card). • BAE mandates fetching PIV card-holder’s off-card information from an authoritative source (Attribute Authority). • BAE Architecture and interface must be in accordance with the specifications (v1.0 May 2008) created by FICC AWF (ICAMSC). • Adopting SAML and SPML for lookup/fetching BAE information from inter- agency applications.
  • 18. E-Authentication Identity Assurance Levels NIST specified PIV Authentication Mechanisms : SP800-116 Measure of Trust for PACS & LACS Level 4: VERY HIGH Confidence Attended Biometric (BIO-A) PIV Authentication Key (PKI) Card Authentication Key (CAK) + (BIO-A) Level 3: High Confidence Biometric (BIO) Level 2: Some Confidence Visual (VIS) Cardholder Unique Identifier (CHUID) Card Authentication Key (CAK)
  • 19. E-Authentication Assurance for LACS PIV Card Credentials based Authentication: Web SSO/Federation SAML 2.0 Service Provider X.509 (SP) Exchange OCSP Validation Identity Provider (IDP) SAML 2.0 X.509 Exchange • All 4 Assurance Levels Other Service Providers • PKI, Biometrics, CHUID (SP) • PKI credentials verified to CA • Fingerprints/CBEFF Match to Card
  • 20. PIV Authentication (PKI + Biometrics) • Fingerprints (CBEFF) matched to PIV Card. • PKI Credentials (CAK) will be validated using OCSP or CRL DP.
  • 21. Convergence of PACS & LACS Provisioning and De-Provisioning Credentials for PACS/LACS
  • 22. Digitally-signed Authorizations • FIPS 201 and SP 800-73 mandates the use of Digital Signature for “Integrity and Authenticity” • IDMS manages the authorization workflow and authority approval and denials. > Digitally signed approvals using PIV card credentials verified against a Federal Bridge CA/Validation Authority (via OCSP or CRLs). • Digital authorizations are captured in audit logs as “XML Signature”.
  • 23. Back-end Attribute Exchange (BAE) Exchange of PIV Card holder Information between Back-end Systems  Mechanisms for securely exchanging PIV Card holder information between Relying parties and authoritative sources. • Backend Attribute Exchange Architecture & Interface specification is defined by GSA HSPD-12 team (May 2008). • Enables PIV card holder information to relying service provider applications. • Relying parties (RP) act as service providers that relies on Off-the- card information (Not stored on card) from an authoritative source. o PIV Card information intended for supporting access control decisions, detecting PIV card tampering, accessing other agency locations, medical emergency etc. o Enabling access to User attribute profiles, roles, status/attribute changes to/from target PIV card holder privileged resources.  BAE Specification defines the architecture and implementation models for secure attribute exchange . • SAML v2. Attribute Sharing Profile for on-demand exchange of PIV card hold attributes as a single request/response. • Mandates the requests/responses are signed (XML Signature) and encrypted (XML Encryption). • SPML 2.0 based request/responses for supporting lookup /updates/ batch query and retrieval of multiple PIV card holders attributes.
  • 24. BAE: SAML Attribute Sharing Adopting to SAMLv2 w. X.509 Attribute Sharing Profile 1 SAML Authentication Request 2 SAML Authentication Statement Valid: … SSL/TLS OCSP Request/Response SP IDP (Fedlet) Validation 3 SAML Attribute Query (Oracle Identity Authority Federation 4 SAML Attribute Statement (PKI Provider) /OpenSSO) • User authentication using the Smartcard based PKI credentials.  SP may validate the X.509 credentials directly with a PKI provider or by redirection to IDP. • To perform authorization, the SP retrieve the user profile attributes from the IDP using SAML Attribute exchange.  SAML Attribute Sharing supports X.509 authentication based systems (SAML v2.0 XASP).  The IDP (Acting as Attribute authority) identified using pre-configured SAML Metadata info at SP.
  • 25. BAE: SAML w. X.509 Attribute Sharing Deployment Scenario using Oracle Identity Federation / OpenSSO
  • 26. BAE: Using SPML 2.0 for Attribute Sharing SPML based Attribute Lookup/Update from Service Provider
  • 27. UltraSPARC T2+: For Wire-speed Security
  • 28. RSA Performance on Oracle Sun CMT Oracle Weblogic SSL Performance on Sun CMT Servers
  • 29. Using PIV Cards in Sun Ray Environment
  • 30. <Insert Picture Here> Q&A Ramesh Nagappan Ramesh.Nagappan@Sun.com