Technologies and Tokens Used in the Identity Ecosystem Bryan Ichikawa Senior Manager Deloitte & Touche LLP Myisha Frazier-McElveen Manager Deloitte & Touche LLP Agenda The Identity Ecosystem Levels of Assurance Technology Types Step-up Authentication Use Cases Conclusion The Identity Ecosystem - Overview The Identity Ecosystem contains of multiple stakeholders representing different user groups and different policy and technical needs Risk-based approach toward identity yields a mixed environment aggregated by common interests. Communities of Interest (COI) can vary in needs from requiring very little to very high confidence in the asserted identity. COIs can cross typical market segmentation (e.g., commercial vs. public sector). Transactions can cross COI assuming common risk profile. Levels of Assurance – What does this mean for a Relying party Relying Parties (RP) need understand the implications of a false positive authentication given their specific business process Level 1 – Little or no confidence in the asserted identity’s validity Level 2 – Some confidence in the asserted identity’s validity Level 3 – High confidence in the asserted identity’s validity Level 4 – Very high confidence in the asserted identity’s validity – OMB M-04-04, E-Authentication Guidance for Federal Agencies. Levels of Assurance – Technology Types Variety of token types and identity proofing requirements allow for customization of deployment based on RP and customer requirements. Level 1 – Password or PIN Level 2* – Memorized Secret Token (Password or PIN), Pre-Registered Knowledge (favorite color), Look-up Secret Tokens (grid card), Out of Band Tokens (text message), and Single Factor One-Time Password (OTP) Devices (hardware OTP generator) Level 3* – Multi-factor requirement. Software crypto allowed Level 4* – Hard crypto tokens with FIPS 140-2 L2 (physical security at L3) validated * – Identity Proofing Requirement – NIST SP 800-63 Step-up Authentication RPs need to balance competing needs: technology, policy, and implementation realities. Compensating Controls Outside of System Example – Requiring additional identification prior to issuance of a service to verify the identity of the user. Within System Example – Secondary approval prior to completion of a transaction. Step up Authentication Why would they be used Example – Additional credentials requested prior to completion of a transaction. Use Case - OpenID OpenID is an open source community and a legal entity Provides simplicity and control of shared information by end users Provides relying party authentication capabilities, accepting third party credentials OpenID is an example of a Level 1 credential Use Case – Consumer Step-up Public access to web site requires no assurance, for individuals or the site. Access to an individual’s account requires a level of assurance from both the individual and the site. Customer enters user id Bank replies with authentication graphic and (previously supplied) user phrase Customer replies with password Large Value transaction requires additional factor (OTP) Use Case – Consumer Step-up Bank’s mutual authentication sent after user id is entered Account password entered after both parties are authenticated Use Case – Consumer Step-up ******** Use Case – National Strategy for Trusted Identities in Cyberspace (NSTIC) Pilots Round 1 saw five pilots with varying objectives Strong focus on Trust Frameworks Common challenges with lack of: Consistent policies Consistent procedures Common levels of assurance (LOA) risk mitigation strategies Harmonized standards Equivalency of token types Tremendous learning and movement of the concepts that are the Identity Ecosystem Conclusion There is an increasing recognition for the need of strong(er) credentials Individuals and organizations understand the convenience associated with utilizing credentials issued by different entities Understanding for different LOA is growing There is not a “one size fits all” approach There exists a wide range of token technologies, both in-use and planned, that will enable stronger authentication across LOAs Bryan Ichikawa Myisha Frasier-McElveen [email protected] [email protected] Smart Card Alliance 191 Clarksville Rd. · Princeton Junction, NJ 08550 · (800) 556-6828 www.smartcardalliance.org This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation . About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
© Copyright 2026 Paperzz