1 / 9

E-Government Program

E-Government Program . E-Government Program Office April 2007. Agenda. What is the Secure Extranet Gateway (SEG)? SEG History Providing Secure Access The SEG and E-Authentication Supported Applications Questions.

harken
Download Presentation

E-Government Program

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. E-Government Program E-Government Program Office April 2007

  2. Agenda • What is the Secure Extranet Gateway (SEG)? • SEG History • Providing Secure Access • The SEG and E-Authentication • Supported Applications • Questions

  3. What is the Secure Extranet Gateway? (SEG) • Treasury’s E-Authentication solution for access to public facing web applications requiring level three assurance (PKI credential). • Entrust COTS products TruePass and GetAccess provide authentication and authorization services. • The SEG provides a central point of access and authentication for Treasury web-based application users • Internal and external users are supported

  4. SEG History • Implemented in 2003 as a solution for former Treasury bureaus that required secure uninterrupted application access that leveraged the Internet • Primary customer is the Department of Homeland Security • Access requires an X.509 PKI credential. • Other authentication methods in support of eAuthentication are under review.

  5. Other Agency User Secure Treasury Applications Treasury Remote User Treasury Business Partner Providing Secure Access External Users The SEG PKI Enabled Authentication Required

  6. Providing Secure Access (con’t) • The SEG uses a reverse proxy approach to access protected resources. This provides for increased security over the VPN approach • Requires minor client modification • TruePass enables web applications for authentication, digital signature and encryption • Acts as a “Gatekeeper” ensuring only authenticated users can access protected resources • GetAccess enables centralized security management of user identities, and enables authentication and authorization across multiple applications. • Provides Role Based Access Control • Supports multiple authentication methods to include: UserID/Password, Random Number Token, PKI credentials etc.

  7. The SEG and E-Authentication • The SEG has been a member/relying party of the E-Authentication federation since Sept 06 • In a federated environment the SEG will consolidate 80% of the compliance for all protected resources • Reduces costs on federating/compliance to Federation Membership documents. • All path validation and processing functions are performed by TruePass. This removes the burden of PKI-enabling each protected resource.

  8. Supported Applications • Office of Foreign Asset Control (OFAC) Automated Blocking and Reporting Reject System (ABaRRS) • Supports financial institutions in reporting “blocked transactions” • ABaRRS has been a member/relying party of the E-Authentication Federation since Sept 06 • Treasury Executive Office of Asset Forfeiture (TEOAF) Automated Joint Operation Payment Processing System • Automates the allocation of funds to Treasury and other law enforcement agencies • The Joint Operation Payment Processing System will join the E-Authentication federation by Sept 07

  9. Questions and Comments

More Related