14
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative

The E-Authentication Initiative: A Status Report

  • Upload
    xerxes

  • View
    46

  • Download
    0

Embed Size (px)

DESCRIPTION

The E-Authentication Initiative. The E-Authentication Initiative: A Status Report. Presented at Educause Meeting June 16, 2004. What is the E-Authentication Initiative?. - PowerPoint PPT Presentation

Citation preview

Page 1: The E-Authentication Initiative:  A Status Report

The E-Authentication Initiative: A Status Report

Presented at Educause MeetingJune 16, 2004

The E-Authentication Initiative

Page 2: The E-Authentication Initiative:  A Status Report

2

The E-Authentication Initiative

E-Authentication provides a blueprint for online identity validation that will enable the American public to access government services in a secure, trusted environment with credentials of their choosing

What is the E-Authentication Initiative?

E-Authentication Enables E-Government

Page 3: The E-Authentication Initiative:  A Status Report

3

The E-Authentication Initiative

What are the Goals of the Initiative?

Build and enable mutual trust needed to support wide-spread use of electronic interactions between the public and Government

Minimize the burden on the public when obtaining trusted electronic services from the Government

Deliver common interoperable authentication solutions, appropriately matching the levels of risk and business needs

The Result: Businesses & individuals will be empowered to conduct business with Government at all levels using e-identity credentials provided by trusted institutions

Page 4: The E-Authentication Initiative:  A Status Report

4

The E-Authentication Initiative

The Concept of E-Authentication

Credential Service Provider

Agency ApplicationAccess

Point

Application User

Step 3Step 2Step 1

Step 1:

At access point (portal, agency Web site or credential service provider) user selects agency application and credential provider

Step 2:

•User is redirected to selected credential service provider

•If user already possesses credential, user authenticates

•If not, user acquires credential and then authenticates

Step 3:

Credential service hands off authenticated user to the agency application selected at the access point

Page 5: The E-Authentication Initiative:  A Status Report

5

The E-Authentication Initiative

Government to Citizen

Government to Government Internal Effectiveness & Efficiency

1. USA Service 2. IRS Free File 3. E-Loans 4. Recreation One Stop5. GovBenefits

1. E-Vital 2. Grants.gov3. Disaster Mgmt4. Geospatial One Stop 5. SAFECOM

1. E-Training 2. Recruitment One Stop3. Enterprise HR Integration4. E-Clearance 5. E-Travel 6. Integrated Acquisition7. E-Records Management8. Payroll/HR

E-Government Strategy: Improving Service for Citizens

Managing PartnerOPMOPMOPMOPMGSAGSANARAOPM

Managing PartnerSSAHHSFEMADOI

FEMA

Managing Partner

GSATreasDoEdDOIDOL

Government to Business1. Federal Asset Sales2. Online Rulemaking Mgmt3. Expanding Tax Products for Businesses4. Consolidated Health Informatics 5. Business Gateway6. International Trade Process Streamlining

Managing Partner GSAEPATreas

HHSSBADOC

E-Authentication

Page 6: The E-Authentication Initiative:  A Status Report

6

The E-Authentication Initiative

Critical Elements of E-Authentication

Policy

Applications

Technology

Trusted Credential Service Providers

Program Management

Page 7: The E-Authentication Initiative:  A Status Report

7

The E-Authentication Initiative

Policy

Overall program governance

Credential assurance levels (OMB & National Institute of Standards and Technology)

Certification of credential providers

Business model

Page 8: The E-Authentication Initiative:  A Status Report

8

The E-Authentication Initiative

Applications

6500 Government applications with business and public

Role of Gov’t Paperwork Elimination Act (GPEA) and the Office of Management and Budget (OMB) mandates

Risk assessments (Carnegie Mellon)

Page 9: The E-Authentication Initiative:  A Status Report

9

The E-Authentication Initiative

Technology Requirements

Federated model

Standards-based

COTS-based

Flexible

Scalable

Extensible

Reliable

Manageable

Supportive of multiple protocols

Page 10: The E-Authentication Initiative:  A Status Report

10

The E-Authentication Initiative

Trusted Credential Service Providers

Key tenet of E-Auth is re-use of existing, trusted 3rd party credentials

Allow US citizens, business and government employees to use electronic identity credentials they already have for E-Government purposes

Requires ability to map those 3rd party credentials to E-Authentication policy framework

E-Authentication-developed Credential Assessment Framework is primary tool for mapping – may be modified for use across different business lines

Page 11: The E-Authentication Initiative:  A Status Report

11

The E-Authentication Initiative

Program Management

Managing relationships: Agency Application Owners CSPs

Maintaining tools: E-RA CAF Trust List Approved Technology Providers List Interface Specs Cookbooks Implementation Guides

Developing & Implementing business model

Keeping the trains running

Page 12: The E-Authentication Initiative:  A Status Report

12

The E-Authentication Initiative

E-Authentication Progress to Date

Applications Deployed: 1 GSA’s eOffer, Level 3 (PKI), Hosted CAM

Credentials on Trust List: 12 9 PKI, 3 User ID/Password Discussions underway with individual banks, as well as FSTC

(Bank Industry group)

Approved Technology Providers: 5 Products from Entegrity, HP, Oblix, RSA, Sun Additional products undergoing testing in Interop Lab

Pilots Underway: 8 Grants.gov, EPA, 2 GSA, NIH, NPS, Treasury, VA

Page 13: The E-Authentication Initiative:  A Status Report

13

The E-Authentication Initiative

Near-Term Focus

Delivery of Authentication Service Component of the FEA Steering Committee ratification of technical architecture End user implementation manuals and tools

E-Grants Pilot USDA, NSF, ORC, HHS

Financial Institutions Pilot Financial Services Technical Consortium

Steering Committee Approved Pilots 6 pilots lead by GSA, EPA, Treasury, NPS, VA, NIH

Page 14: The E-Authentication Initiative:  A Status Report

14

The E-Authentication Initiative

For More Information

Phone E-mail

Brian Doherty 703-872-8606 [email protected]

Stephen Sill 703-872-8594 [email protected] Manager

Websiteshttp://cio.gov/eauthenticationhttp://www.eapartnership.org/

http://cio.gov/fpkipa