OATH: Initiative for Open AuTHentication · 2014. 11. 7. · Identity Federation & OATH...

Preview:

Citation preview

OATH: Initiative for Open AuTHentication

Siddharth BajajVeriSign

2

Who Are You Really Doing Business With?

The New York Magazine, July 5, 1993, Peter Steiner,

3

Static Passwords are bad…

Everyone complains about the weather, but no one does anything.

4

What is OATH?

The Open Authentication Reference Architecture (OATH) initiative is a group of companies working together to help drive the adoption of open strong authentication technology across all networks.

Q1

5

OATH : Mission

Expand secure and safe on-line transactions for consumers and business users with strong, 2-factor authentication

Leverage existing standards and create an open reference architecture for strong authentication which users and service providers can rely upon, and leverage to interoperate

Reduce the cost and complexity of adopting strong authentication solutions

Q1

6

OATH Membership ( 80+)

Coordinating

Contributing

Q2

7

OATH Reference Architecture:Establishes the ‘common ground’

Sets the technical vision for OATH

4 guiding principlesOpen and royalty-free specificationsDevice Innovation & embeddingNative Platform supportInteroperable modules

v2.0 published in 2007Risk based authenticationAuthentication and Identity Sharing

Q4

8

Standardized Authentication Algorithms

HOTP OCRA TOTP

-Open and royalty free specifications

-Proven security: reviewed by industry experts

-Choice: one size does not fit all

-Event-based OTP

-Based on HMAC, SHA-1

-IETF RFC 4226

-Dec 2005

-Based on HOTP

-Challenge-response authentication

-Short digital signatures

-8th draft, expected RFC 2009

-Time-based HOTP

-2nd draft submitted to IETF

Q6

9

OATH Adoption

Multi-Function Token (OTP & USB Smart Card)

Soft OTP Token

OTP Token

OTP embedded in credit card

OTP soft token on mobile phones

HOTP applets on SIM cards and smart-cards

OTP embedded in flash devices

HOTP

50+ shipping products

Q11

and many more…

10

Token manufacturer offline model

Portable Symmetric Key Container standard format (PSKC Internet-Draft)

Dynamic real-time model

Dynamic Symmetric Key Provisioning Protocol (DSKPP Internet-Draft)

OTA provisioning to mobile devices, or online to PC/USB

IETF KeyProv WG

working toward RFC submissionsQ5

Credential Provisioning

11

OATH Progression

CHOICE of AUTHENTICATION

METHODS

APPLICATION INTEGRATION &

ADOPTION

- HOTP- OCRA- TOTP

CREDENTIALPROVISIONING &

LIFECYCLE

- PSKC- DSKPP

- Certification program

- WS Validation - Auth & Identity

Sharing work

2006-08 2007-08 2008+

12

OATH Authentication Sharing ModelsEnables sharing of 2nd factor credential across sites – force

multipliers!

OATH TokenSharing Models

1. Centralized Token Service model

2. Distributed Validation Model

3. Credential Wallet

Simpler liability models…

Shared & Anonymous

2nd factorOnline Bank, auction,

brokerage, e-commerce sites, etc.

“Token Necklace” Dilemma

13

Identity Federation & OATH

Identity is federated/shared across multiple sites

Traditional federation (Liberty)

User-centric models (OpenID, CardSpace)

Single Identity becomes more valuable

Needs to protected using strong authentication

Enable OATH credentials as first class citizens with these

technologies!

Relying Parties

Identity Provider with strong authentication

support

IdentityAssertion

14

Moving Toward More Pervasive Strong Auth

Lower barrier to adoption!

User ConvenienceLeverage devices users already carry todayShared Credential

Lower TCO Interoperable multi-vendor solutionsLeverage existing devices

Reduce Time to ImplementOnline/OTA provisioningEasier to integrate - standard web services and protocols

Q10

15

Device

InnovationLower Cost

Best of Breed

Deployments

Device

Portability

One size does not fit all –risk based authentication

Cost effective devices

No vendor lock-in

Open & Royalty free specifications

User friendly form factors

Embedding in existing devices

Interoperable standards enable enterprises to deploy components from multiple vendors in a single deployment

Proven security!

Authentication & Identity Sharing models enable use of single device across multiple application and networks

Visit www.openauthentication.org

OATH: Driving a fundamental shift from proprietary Driving a fundamental shift from proprietary to open solutions!to open solutions!

16

Questions & Answers

Thank You!

17

Visit the OATH websiteDownload Reference Architecture v2Download and review draft specifications

Engage - contribute ideas, suggestionsReview public draft specificationsGet involved in developing specifications

Become a member!3 levels - Coordinating, Contributing, AdoptingJoin the TFG mailing list

Get Involved!

18

References and Resources

Initiative for Open AuTHentication (OATH)http://www.openauthentication.org

HOTP: An HMAC-Based One-Time Password Algorithm – RFC 4226http://www.ietf.org/rfc/rfc4226.txt

OATH Reference Architecturehttp://www.openauthentication.org

Other draft specificationshttp://www.openauthentication.org

Recommended