Technologies and Tokens Used in the Identity Ecosystem

Technologies and Tokens Used
in the Identity Ecosystem
  Bryan Ichikawa
  Senior Manager
  Deloitte & Touche LLP
  Myisha Frazier-McElveen
  Manager
  Deloitte & Touche LLP
Agenda
 The Identity Ecosystem
 Levels of Assurance
 Technology Types
 Step-up Authentication
 Use Cases
 Conclusion
The Identity Ecosystem - Overview
The Identity Ecosystem contains of multiple stakeholders
representing different user groups and different policy
and technical needs
  Risk-based approach toward
identity yields a mixed
environment aggregated by
common interests.
  Communities of Interest (COI)
can vary in needs from requiring
very little to very high confidence
in the asserted identity.
  COIs can cross typical market
segmentation (e.g., commercial
vs. public sector).
  Transactions can cross COI
assuming common risk profile.
Levels of Assurance – What does this mean
for a Relying party
Relying Parties (RP) need understand the implications of a
false positive authentication given their specific business
process
Level 1 – Little or no confidence in
the asserted identity’s validity
Level 2 – Some confidence in the
asserted identity’s validity
Level 3 – High confidence in the
asserted identity’s validity
Level 4 – Very high confidence in
the asserted identity’s validity
– OMB M-04-04, E-Authentication Guidance for Federal Agencies.
Levels of Assurance – Technology
Types
Variety of token types and identity proofing requirements
allow for customization of deployment based on RP and
customer requirements.
Level 1 – Password or PIN
Level 2* – Memorized Secret Token
(Password or PIN), Pre-Registered
Knowledge (favorite color), Look-up
Secret Tokens (grid card), Out of Band
Tokens (text message), and Single
Factor One-Time Password (OTP)
Devices (hardware OTP generator)
Level 3* – Multi-factor requirement.
Software crypto allowed
Level 4* – Hard crypto tokens with FIPS
140-2 L2 (physical security at L3)
validated
* – Identity Proofing Requirement
– NIST SP 800-63
Step-up Authentication
RPs need to balance competing needs: technology,
policy, and implementation realities.
  Compensating Controls
  Outside of System
  Example – Requiring additional identification prior to issuance
of a service to verify the identity of the user.
  Within System
  Example – Secondary approval prior to completion of a
transaction.
 Step up Authentication
  Why would they be used
  Example – Additional credentials requested prior to completion of a
transaction.
Use Case - OpenID
  OpenID is an open source community and a legal
entity
  Provides simplicity and control of shared
information by end users
  Provides relying party authentication capabilities,
accepting third party credentials
  OpenID is an example of a Level 1 credential
Use Case – Consumer Step-up
  Public access to web site requires no assurance, for
individuals or the site.
  Access to an individual’s account requires a level of
assurance from both the individual and the site.
  Customer enters user id
  Bank replies with authentication graphic and
(previously supplied) user phrase
  Customer replies with password
  Large Value transaction requires additional factor
(OTP)
Use Case – Consumer Step-up
Bank’s mutual authentication
sent after user id is entered
Account password entered after
both parties are authenticated
Use Case – Consumer Step-up
********
Use Case – National Strategy for
Trusted Identities in Cyberspace
(NSTIC) Pilots
  Round 1 saw five pilots with varying objectives
  Strong focus on Trust Frameworks
  Common challenges with lack of:
  Consistent policies
  Consistent procedures
  Common levels of assurance (LOA) risk mitigation
strategies
  Harmonized standards
  Equivalency of token types
  Tremendous learning and movement of the concepts
that are the Identity Ecosystem
Conclusion
 There is an increasing recognition for the need of
strong(er) credentials
 Individuals and organizations understand the
convenience associated with utilizing credentials
issued by different entities
 Understanding for different LOA is growing
 There is not a “one size fits all” approach
 There exists a wide range of token technologies,
both in-use and planned, that will enable stronger
authentication across LOAs
Bryan Ichikawa
Myisha Frasier-McElveen
[email protected]
[email protected]
 Smart Card Alliance
 191 Clarksville Rd. · Princeton Junction, NJ 08550 · (800) 556-6828
 www.smartcardalliance.org
This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting,
business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such
professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before
making any decision or taking any action that may affect your business, you should consult a qualified professional advisor.
Deloitte shall not be responsible for any loss sustained by any person who relies on this presentation
.
About Deloitte
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of
member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed
description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about
for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest
clients under the rules and regulations of public accounting.