Federated electronic authentication projects: DOD and Personnel Identity Protection - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Federated electronic authentication projects: DOD and Personnel Identity Protection

Description:

Information and Technology for Better Decision Making. Federated ... Fakes come as a package with everything needed. Overseas hundreds of fakes are detected ... – PowerPoint PPT presentation

Number of Views:48
Avg rating:3.0/5.0
Slides: 13
Provided by: Kalino6
Category:

less

Transcript and Presenter's Notes

Title: Federated electronic authentication projects: DOD and Personnel Identity Protection


1
Federated electronic authentication
projectsDOD and Personnel Identity Protection
Information and Technology for Better Decision
Making
Electronic Authentication Partnership
  • Presented byMary Dixon

Director DoD Access Card Office
April 2004
2
What is Personnel Identity Protection?
  • Establishment of identity is a basic business
    function
  • In the past this was taken for grantedpeople
    were who they said they claimed to be
  • Today, assumptions about identity can create
    security issues
  • Each business or government must take steps to
    provide assurance of identity

3
Why Personnel Identity Protection is Important?
Counterfeits on the Internet
Social Security Cards (40.00)
Birth Certificates (79.00)
Military ID Card (75.00)
  • Fakes come as a package with everything needed
  • Overseas hundreds of fakes are detected
  • For physical security authenticating the ID is
    rare

4
Personnel Identity Protection is a Process
  • Strong authentication of the individual
  • A face to face interaction between individual and
    a trusted agent
  • Business process provides sufficient evidence of
    identity -- checks of public records, background
    investigations, examination of primary documents
  • Binding identity to a management system
  • A credential, the best linkage to the personnel
    identity protection system
  • 3. Binding credential to the individual
  • Biometrics and PINs bind credential to the person
  • Credential then becomes a proxy for
    digital/physical access given technology is used
  • 4. Authentication of credential at all access
    points
  • Logical and Physical
  • Safeguarding identity information from
    unwarranted disclosure

5
But we are not so good at step 4Authentication
of the credential at all access points logical
and physicalEspecially for Physical Access
6
The Real Questions Should Be
  • Is the credential still valid?
  • Was it issued to the person presenting the
    credential?
  • Conditions
  • Privacy protection
  • Minimum standards
  • Identity vetting
  • Credential
  • Timely revocations
  • Liability
  • Privilege granting remains local decision
  • Minimize the number of credentials for a single
    person

7
DoD Personnel Identity Protection Systems
DoD Cross-Credentialing Identification System
(DCIS) (Federated Identity Management and
Cross-credentialing System (FiXs))
DoD National Visitors Center (DNVC)
AuthenticatesDoD ID Credential holders at DoD
bases and facilities for physical access
Authenticates Federated Commercial and
Government ID Credentials at each others
facilities
  • Features
  • Secure Web-based access within DoD and between
    Partners
  • Signed delivery of authentication data including
    biometrics
  • Trust server can be scaled to add federated
    partners quickly
  • Standards based (signed XML)

8
DoD National Visitors Center (DNVC)
Concept
  • Authentication of DoD Credentials increasing
    requirement
  • Services need web based, enterprise-wide
    capability anywhere, any credential requiring
    only a browser
  • Use comprehensive DEERS/RAPIDS data store to
    provide information
  • Incorporate biometrics photo and fingerprint
  • Accommodates Members, retirees and families
  • Links strong authentication to base access
    systems and local access policies

9
Defense Cross-Credentialing Identification System
(DCIS)
Concept
  • Extend DoD National Visitors Center capability to
    Defense Contractors and other Federal Agencies
  • Develop trust model to establish standards and
    practices for inclusion
  • Develop capability so that Federated Partners
    retain control of employee/member data
  • Develop data standards for participation
  • Establish procedures for implementation and
    authentication options based on threat or local
    requirements

10
(No Transcript)
11
Summary
  • Personnel Identity Protection is increasing in
    importance for provisioning benefits and for
    secure logical and physical access
  • DoD has a strong program in place (world class)
  • DCIS and DNVC can provide strong identity
    authentication in the physical access world
  • -----------------------
  • Substantive improvements in physical access
    requires a huge cultural change
  • Translation NOT ACCOMPLISHED OVER NIGHT

12
Questions?
Mary Dixon (703) 696-7396 dixonmm_at_osd.pentagon.mil
Write a Comment
User Comments (0)
About PowerShow.com