360 likes | 478 Views
SESSION CODE: SIA305. Top 3 Security and Privacy Challenges in Identity Infrastructures and How to Overcome Them with U-Prove . Christian Paquin Senior Program Manager Microsoft Corporation. Identity landscape. More and more business/government services are migrated online
E N D
SESSION CODE: SIA305 Top 3 Security and Privacy Challenges in Identity Infrastructures and How to Overcome Them with U-Prove Christian Paquin Senior Program Manager Microsoft Corporation
Identity landscape • More and more business/government servicesare migrated online • Improves convenience • Reduces costs • High-value transactions require high-level of identity assurance • Usernames/passwords are ubiquitous, but provide low-security (NIST’s LoA) • Conventional “enterprise” solutions (e.g., Kerberos, PKI) don’t scale or are not flexible enough for an internet-wide system • How can you show some ID online, just like in real life?
Identity federation • Most popular proposed architecture • Very flexible • Easy to deploy • Many protocols: WS-Federation/Trust, SAML,Information Cards, OpenID, OAuth, … • But many challenges • Security • Privacy • Scalability
Federated architecture Identity Provider (IdP) Relying Party (RP) trust STS 4. Token response 3. Tokenrequest 1. Request access 2. Policy 5. Token Client
Challenge #1: Security • Compromise IdP credential, access all RPs • Phishing problem • Strong authentication to IdP is possible, but authentication to RP is weaker • Issued tokens are software only (token hijacking attacks, transferability) • IdP is all powerful • IdP (insider, malicious code) can surreptitiously act on the users’ behalf • Selectively deny access
Challenge #2: Privacy • IdP can profile user’s activities • Even if IdP doesn’t learn the visited RP, profiling is possible by colluding parties (or insiders) • Timing correlation • Unique correlation handles (e.g., digital signatures, serial numbers, etc.)
Challenge #3: Scalability • All tokens are retrieved on-demand • IdP must be available 24/7 • IdP is a central point of failure • Nice target for denial of service attack • IdP is a bottleneck for every user access
U-Prove Technology • Crypto technology combining the security of PKI with the flexibility of federation, providing privacy-by-design • Can be used to build various types of electronic credentials and entitlement documents • Has unique security, privacy, and efficiency benefits over “conventional” crypto tokens (X.509 certificates, SAML assertions, Kerberos tickets)
What’s new? Minimal disclosure! • U-Prove tokens contain no inescapable correlation handles • Token issuance and presentation are unlinkable • Think “coins” vs. “bills” • Users can disclose a subset of the encoded claims • To respond to unanticipated requests of RPs • Without invalidating the token integrity
Name: Alice Smith Address: 1234 Pine, Seattle, WA Over-21:true Minimal disclosure illustrated This is an animated slide Gov Name: Alice SmithAddress: 1234 Pine, Seattle, WAOver-21.:true CohoWinery
Name: Alice Smith Address: 1234 Pine, Seattle, WA Over-21:true Minimal disclosure illustrated This is an animated slide Gov Which adult from WA is this? ? Prove that you are over 21 and from WA Coho Winery
Underlying crypto • Based on the Brands protocols • 30+ papers (from ‘93 onward) • Evolution of PKI • MIT Press book, foreword by Ron Rivest • Issuance uses a “restrictive blind signature” • Issuer knows the attributes, but never sees the resulting public key and signature on tokens • Presentation uses a proof of knowledge • Prove a secret without leaking any info about it • Generalization of the Schnorr protocol
Federation + U-Prove IP IP Identity Provider Relying Party trust STS B. Token response A. Tokenrequest 1. Request access 2. Policy 3. Token Client
Unimplemented U-Prove features • Device-protected tokens • Privacy-preserving revocation • Proving attribute properties • Limited-use tokens • Zero-knowledge token presentation • Censoring of token presentation • Hiding the Issuer’s identity • Token recertification and updating • Verifiable attribute encryption
Key markets • E-Government (citizen identities) • E-Health (health record management) • Cloud computing (“don’t trust us” cloud providers) • Document signing (with minimal disclosure) • Advertising (privacy-respecting ad platform) • E-Cash • Social Networking • Document signing
Challenges, and how U-Prove helps One technology to meet the desired levels of security, privacy, and scalability Security Software Shared Hardware Privacy Anonymity Pseudonymity Full identification Scalability Offline Mixed Online
U-Prove Community Technology Preview • Specifications (released under Open Specification Promise) • U-Prove crypto specification (addressing feature subset) • Integration into the ID metasystem specification • Open-source crypto SDKs (implementing crypto spec) • Posted on Code Gallery, under the BSD license • C# and Java versions • Integration with Microsoft products • Modified version of Windows CardSpace 2.0 • Extension to the Windows Identity Foundation • Modified version of Active Directory Federation Services 2.0 http://www.microsoft.com/u-prove
Integration with Microsoft products • Windows Identity Foundation • U-Prove issuer key management • U-Prove aware STS for IdP • U-Prove token handler for RP • Active Directory Federation Services 2.0 • IP-STS • RP-STS • Windows CardSpace 2.0 • U-Prove aware information card • Retrieve, store, and present U-Prove tokens
Fraunhofer FOKUS / Microsoft demo Secure and privacy-protecting student information card derived from German eID card VIDEO
Demo architecture OKS Registration E-Book Active Directory Federation Services 2.0 OKS Feedback 2. Prove registered student, view e-book online 1. Register online, get student information card 3. Leave anonymous feedback German nPA card Windows CardSpace 2.0
Configuring WIF to use U-Prove Register the U-Prove WIF Extension in the application web.config <compilation> <assemblies> … <add assembly="Microsoft.IdentityModel.UProve, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"/> </assemblies> </compilation> … <microsoft.identityModel> <service> <serviceCertificate>…</serviceCertificate> <securityTokenHandlers> <add type="Microsoft.IdentityModel.UProve.Tokens.UProve.PresentationTokenHandler, Microsoft.IdentityModel.UProve, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31BF3856AD364E35"> <issuerParametersStore type="SampleIssuerParametersStore, UProveUtil, Version=1.0.0.0, Culture=neutral" /> </add> </securityTokenHandlers> <audienceUris>…</audienceUris> </service> </microsoft.identityModel>
Configuring AD FS 2.0 to use U-Prove Use PowerShell to setup the server # Enable the EveryoneScope Enable-ADFSRelyingPartyTrust -TargetNameEveryoneScope # Adjust the lifetime of issued U-Prove tokens # Set-ADFSRelyingPartyTrust -TargetNameEveryoneScope -TokenLifetime 11520 # Adjust the number of U-Prove tokens issued # Set-ADFSProperties -DisconnectedTokenCount 25 # Generate Issuer parameters and private key (valid for 5 years) Set-ADFSIssuanceParameters -Lifetime 1825.00:00:00.00 # Export signed Issuer parameters $ipLocation = "c:\users\public\issuance.xml" Export-ADFSIssuanceParameters -Path c:\issuerparams.xml # Update the information card to support for U-Prove tokens Update-ADFSInformationCard
U-Prove Resources • Videos: • Scott Charney’sRSA announcement: http://www.rsaconference.com/2010/usa/recordings/keynote-catalog.htm • Intro:http://channel9.msdn.com/shows/Identity/Announcing-Microsofts-U-Prove-Community-Technical-Preview-CTP • Technology overview:http://edge.technet.com/Media/Learn-what-Microsofts-U-Prove-release-is-all-about • U-Prove Community Technology Preview: • Download location: http://www.microsoft.com/u-prove • Developer video: http://channel9.msdn.com/shows/Identity/U-Prove-CTP-a-developers-perspective/
Identity and Access Management Enable more secure, identity-based access to applications on-premises and in the cloud from virtually any location or device PROTECT everywhere ACCESS anywhere INTEGRATE and EXTEND security SIMPLIFY security, MANAGE compliance • Provide more secure, always-on access • Enable access from virtually any device • Control access across organizations • Provide standards-based interoperability • Extend powerful self-service capabilities to users • Automate and simplify management tasks
Business Ready Security Solutions Secure Messaging Secure Collaboration Secure Endpoint Information Protection Identity and Access Management
Related Content SIA321 |Business Ready Security: Exploring the Identity and Access Management Solution SIA201 |Understanding Claims-Based Applications: An Overview of Active Directory Federation Services (AD FS) 2.0 and Windows Identity Foundation SIA302 | Identity and Access Management: Centralizing Application Authorization Using Active Directory Federation Services 2.0 SIA303|Identity and Access Management: Windows Identity Foundation and Windows Azure SIA304 | Identity and Access Management: Windows Identity Foundation Overview SIA305 | Top 5 Security and Privacy Challenges in Identity Infrastructures and How to Overcome Them with U-Prove SIA306 | Night of the Living Directory: Understanding the Windows Server 2008 R2 Active Directory Recycle Bin SIA307 | Identity and Access Management: Deploying Microsoft Forefront Identity Manager 2010 Certificate Management for Microsoft IT SIA318 | Microsoft Forefront Identity Manager 2010: Deploying FIM SIA319 | Microsoft Forefront Identity Manager 2010: In Production SIA326 | Identity and Access Management: Single Sign-on Across Organizations and the Cloud - Active Directory Federation Services 2.0 Architecture Drilldown SIA327 | Identity and Access Management: Managing Active Directory Using Microsoft Forefront Identity Manager SIA01-INT | Identity and Access Management: Best Practices for Deploying and Managing Active Directory Federation Services (AD-FS) 2.0 SIA03-INT | Identity and Access Management: Best Practices for Deploying and Managing Microsoft Forefront Identity Manager SIA06-INT | Identity and Access Management Solution Demos • SIA02-HOL | Microsoft Forefront Identity Manager 2010 Overview • SIA06-HOL | Identity and Access Management Solution: Business Ready Security with Microsoft Forefront and Active Directory • Red SIA-5 & SIA-6 | Microsoft Forefront Identity and Access Management Solution
Track Resources Learn more about our solutions: • http://www.microsoft.com/forefront Try our products: • http://www.microsoft.com/forefront/trial
Required Slide Resources Learning • Sessions On-Demand & Community • Microsoft Certification & Training Resources www.microsoft.com/teched www.microsoft.com/learning • Resources for IT Professionals • Resources for Developers • http://microsoft.com/technet • http://microsoft.com/msdn
Required Slide Complete an evaluation on CommNet and enter to win!
Sign up for Tech·Ed 2011 and save $500 starting June 8 – June 31st http://northamerica.msteched.com/registration You can also register at the North America 2011 kiosk located at registrationJoin us in Atlanta next year
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.