270 likes | 455 Views
MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013. Concept of identity. Identity and Access Management. User Identity Feed and Role Management. Application SSO & Strong Authentication Support. Identity Provisioning Policy Management.
E N D
MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013
Identity and Access Management User Identity Feed and Role Management Application SSO & Strong Authentication Support Identity Provisioning Policy Management Authoritive Identity Source Workflow and User Lifecycle Credentials Management Recertification Attestation Policy Rules Engine Compliance Governance Identity & Administration with Role and Credential Modeling Access Control User Self-Service USERS DESK Identity Provisioning Integration Adapters USERS MOBILE Unix Servers ORACLE EBS MS Active Directory and MS Exchange Legacy Applications & Physical Access Control RACF Databases
The Corporate Reality Today Physical Partners Customers Logical Employees Remote Employees Suppliers
Considerations Drivers Physical and Logical Security Costs IP Protection Effectiveness Regulatory/Audit Pressures User Experience Balancing needs with effective implementation 6
Logical Access • Complexity & cost of systems increasing • Unmanaged devices • Applications • Different user requirements • Fraud threats • Audit Compliance Websites & Remote Access Windows Logon Encryption & Digital Signatures
Mobile Device Impact • 50% of firms have embraced a multiplatform mobile strategy • 60% of firms provide some support to personal devices * Forrester Fall 2010
Legacy Physical Access (PACs) • Closed loop legacy systems • Easy to clone cards • No integration with Logical Access data Panel decides who can enter door radio Physical Access Reader Control Panel Logical Access data
Multiple Identities and Credentials per User Logical Access • Physical Access 10
One Credential, multiple functions Physical • Simultaneous - legacy & new (PKI) systems. • Easy Transition • Secure Logical One Card • No password changes • Portable across devices • Multiple applications • Secure
You have seen a digital certificate before: the yellow padlock indicates certificate based banking security
Windows Smartcard Logon • What can be done? • Strong certificate authentication to Windows • PIN protected – eliminates need for password • Easy to use
Smart Card Log On llll
VPN • What can be done? • Strong certificate based authentication for remote access • VPN • Outlook Web Access • PIN protected – eliminates need for password
Email and Digital Signature • What can be done? • Secure storage of certificates for • Secure email • Digitally signing documents
Secure Email llll
Physical Access Control (PACs) • What can be done? • Legacy and Next Generation PACs support in one card • Multiple card and applet options • PIV support
Digital Signature capability Document Signing for integrity and accountability
Government Signing Use cases Cloud Based Workflow Existing Workflow Signing DocFusion Personal Signing Document Generation BAS, Persal, Logis, SAP OrganisationalSigning Transactional Signing
Authentication and electronic signatures Positive Act of Acceptance with verifiable integrity Positive Act of Acceptance Positive Act of Acceptance with verifiable integrity and F2F and 3FA Server Chip, pin, key Biometric Acceptance Chip, bio, key Password Acceptance Smartcard Adv Electronic Signature - Accredited digital certificate based Digital Signature -digital certificate based Electronic Signature Mobile, Pin, Key NID, bio, Key OTP Acceptance Windows store Mobile Phone Digitised tablet Signature Signature Image
Transactional SigningNon repudiation User enrolled with face to face verification and supporting documentation Creates user and personalizes card with fingerprint and digital certificate User prompted for fingerprint, smartcard and digital signature on logon Recognize request for sensitive page User prompted for fingerprint, smartcard and digital signature on transaction approval Create Time Stamp and seals the record before storing in the evidence vault No transaction can be concluded if user does not acknowledge with a fingerprint and a smartcard present Forensic report drawn with enrolment data, downstream page, transaction changes and fingerprint