1 / 7

E-Authentication Vision and Value Steve Timchak, GSA E-Authentication Program Manager

The E-Authentication Initiative. E-Authentication Vision and Value Steve Timchak, GSA E-Authentication Program Manager. “Getting to Green with E-Authentication” February 3, 2004 Technical Session. The E-Authentication Initiative. The Vision for E-Authentication.

maxreed
Download Presentation

E-Authentication Vision and Value Steve Timchak, GSA E-Authentication Program Manager

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The E-Authentication Initiative E-Authentication Vision and ValueSteve Timchak, GSAE-Authentication Program Manager “Getting to Green with E-Authentication”February 3, 2004Technical Session

  2. The E-Authentication Initiative The Vision for E-Authentication • E-Authentication is an online identity validation service that enables the American public to access government services in a secure, trusted environment with credentials of their choosing E-Authentication Enables E-Government 2

  3. The E-Authentication Initiative The E-Authentication Service Concept Step 1 Step 2 Step 3 Application User Agency Application Credential Service Provider Access Point • Step 2: • User is redirected to selected credential service provider • If user already possesses credential, user authenticates • If not, user acquires credential and then authenticates Step 1: At access point (portal, agency Web site or credential service provider) user selects agency application and credential provider Step 3: Credential service hands off authenticated user to the agency application she selected at the access point 3

  4. The E-Authentication Initiative E-Authentication’s Value to Agencies • The E-Authentication Initiative is your agency’s identity validation expert, keeping track of the authentication industry’s evolution so you don’t have to 4

  5. The E-Authentication Initiative Agency Requirements • The E-Authentication offering must simplify, unify and produce results: • Facilitate on-line access – allow users to reuse existing credentials and move among applications without re-authenticating • Secure agency systems and information – verify credentials against standardized assurance levels, accommodating both low and high levels of assurance • Protect privacy – have no central collection point of confidential information • Save money and resources –save the money and man-hours required to build redundant, stand-alone systems and to issue credentials • Speed time to market –enable agencies to implement E-Governmentmore rapidly 5

  6. The E-Authentication Initiative Agency Requirements • The E-Authentication offering must also be: • Standards-based • COTS-based • Flexible • Product/Standard independent • Financially viable • Scalable • Supportive of a variety of environments • Easy to operate and maintain • Extensible • Reliable • Manageable With control of authorizationstill maintained by each individual agency 6

  7. The E-Authentication Initiative Industry’s Direction • The state of the authentication industry is evolving: • Standards-based, federated identity management • SAML 1.0 in place now, SAML 1.1 emerging • Liberty Alliance and WS* are on the way • E-Authentication is committed to accommodating multiple protocols • Initiative’s Interoperability Lab in place to identify products and track evolution 7

More Related