Federal CIO Council Information Security and Identity Management Committee IDManagement.gov Externalizing Authentication Federal ICAM Day June 18, 2013 Panel Participants Phil Wenger, OMB Douglas Glair, USPS Anil John, GSA (Moderator) 2 Align Collaborate Enable http://www.IDManagement.gov Phil Wenger, OMB 3 ICAM Information Sharing Day and Vendor Expo Externalizing Authentication using MAX Authentication as a Service (AaaS) Phil Wenger, OMB June 2013 Key Takeaways • Understand the MAX Ecosystem • Understand how Agencies can externalize authentication using MAX’s Shared Credentialing, Provisioning, Authentication, and Authorization and Services MAX.gov - A Complete Cloud Services Platform Enabling the “Shared First” and “Cloud First” eGov Policies Identity Management & SSO Collaboration Analytics Data Collections & Surveys Web Meetings Remote Desktops for Telework Federated Search Wiki & Web Content Document Management Social Networking & Publishing Governmentwide Directory MAX AaaS provides Government-wide ID Plus state, local, international, & non-governmental partner users Government-to-Government Intra-agency Inter-agency Policymaking, Management and Budget class of activities State, Local, International, and Non-Governmental Partners The Public Available for use by agencies for both cross-government and intra-agency activities User accounts available for interactions with non-governmental partners in secure Enclaves 7 What MAX AaaS Provides to Agencies Immediate Government-wide Identity Rapid HSPD-12, DOD CAC PIV Implementation Federation and Multi-Agency Single Sign-on • Allow citizen access to agency websites using NSTIC or anonymous logins while enforcing admin access via MAX ID • Use government-wide organic and organizational MAX groups for role-based access control and fine-grained permissions • Use MAX PIV validation service to meet eGov policies (OMB M11-11, M-10-28) • Use MAX PIV to SAML gateway service to map 2-factor identity to agency logins or MAX ID • Federate MAX Authentication with your Agency’s Active Directory • Federate MAX Authentication with SAML 2.0 Single Sign-on (SSO) MAX AaaS Solution Benefits Low Total Cost of Ownership Instant Deployment FIPS 199 FISMA Moderate Cloud based, C&A’d Mission-critical use No new software to build or license Self-service delegated administration Dual authentication Government-wide Directory Augments existing identities Automatically Maintained Eases management burden MAX AaaS - Scope Auto Registration for .gov, .mil and other domains 120+ Agencies 85,000+ 6,000+ 300+ users user groups Bureaus Thousands of HSPD-12 users from 90+ agencies Federal, State, Local, International, and Non-government partner users MAX AaaS – Multiple Login Methods Web Services that support HSPD-12 and ICAM SAML 2.0 Web Browser SSO Profile Choose between single-factor, dual-factor, or federated login PIV validation and mapping service • Full path building, validation, revocation checking • Identity data extraction and normalization Can be mapped to your agency ID Federate your agency Active Directory or SAML 2.0 instances http://www.idmanagement.gov/documents/SAML20_Web_SSO_Profile.pdf How Agencies have Externalized Authentication using MAX AaaS Today MAX Apps MAX A11, Apportionment BFEM MAX ID Agency Apps Other Apps Adobe Connect Online Meetings Wordpress DOJ CyberScope Drupal eGov Apps IT Dashboard, Data.Gov, Performance.Gov Active Directory MAX Authentication as a Service (AaaS) Sponsored by the Budget Formulation and Execution Line of Business (BFELoB) BFELoB Organization and Contacts: Executive Sponsor: Courtney Timberlake, Assistant Dir. for Budget, OMB Managing Partner: Tom Skelly, Director of Budget Service, Education Policy Lead: Andy Schoenbach, Chief, Budget Systems Branch, OMB Deputy Policy Lead: Phil Wenger, Budget Systems Branch, OMB Program Management Office Lead: Mark Dronfield, Education MAX Authentication Lead: Barry Napear, Budget Systems Branch, OMB MAX Architect: Shahid Shah, Budget Systems Branch (CTR), OMB Learn More about the Budget LoB: www.BudgetLoB.gov Visit MAX.gov: www.max.gov Contact the Budget LoB: BudgetLoB@Ed.gov Contact MAX Support: 202 395-6860 13 BACKGROUND SLIDES MAX AaaS: Full featured identity services Self-Service Provisioning Multi-factor Authentication Delegated Authorization Common Identity, Profile, and Directory Single factor (user/password) Group Management Self service registration and account management Multi factor (PIV/PIV-I/CAC) Role Management Auto-provisioning for .gov, .mil, etc. Federated (SAML2, ADFS) Delegated Administration Identity assurance for Levels 2 and 3 Machine2Machine (M2M) SAML Self Service User Provisioning Process Less than 5 minutes to get an account for “trusted domains” Agency user and his/her management defines need to access MAX (employee, contactor, partner) User self registers on line at MAX portal https://max. gov MAX validates user’s email address MAX checks sponsor requirement for outside users Email confirmation sent to user User accepts MAX User Agreement Self or Managed Authorization Process User and his/her management defines MAX application and role to access MAX assigns user to groups, communities and/or applications as authorized by user’s management User applies for application access via MAX portal MAX or delegated admin reviews access requests MAX notifies user and application administrators MAX Identity Management (IDM) Services Provides APIs for MAX Identities, Profiles, Groups, and Authorization data AaaS Enhanced JSON based RESTful Web Services IDM MAX PIV Validation (PV) Services Provides APIs for PIV/PIV-I/CAC validation and identity data extraction “Public” service available: https://pv.test.max.gov/ Full Path Building, Validation, Revocation Checking PKIF: The PKI Framework Identity Data Extraction / Normalization PV MAX PIV-to-SAML Translation Services • Performs PIV validation, maps to MAX ID, then translates to SAML • Apps do not need to be aware of PIV validation details (they are given assurance level as part of SAML assertion) Perform MAX PIV Validation Map to MAX ID Translate to SAML Pass Assertion to App Agency AD/LDAP Integration (Federation) Supports ICAM SAML 2.0 Web Browser SSO Profile http://www.idmanagement.gov/documents/SAML20_Web_SSO_Profile.pdf MAX HSPD-12 Authentication Process HSPD-12 Certificate 1 4 2 Internet 3 SSL/TLS Apache Proxy 1. 2. 3. 4. 5. 6. 7. 8. User connects to MAX and receives Login Page User enters user/pass or inserts HSPD-12 card into reader and selects PIV login For HSPD-12 login, browser establishes a TLS connection to Proxy, and Proxy requests a certificate Browser extracts certificate from card and forwards it to Proxy Proxy forwards certificate to CAS CAS matches certificate against Identities Directory CAS extracts MAX ID and user profile information and prepares a SAML assertion CAS "forwards" the SAML assertion to the application requesting authentication (no certificates are exchanged) 5 7 Apps Identities Directory 6 8 Align Collaborate Enable http://www.IDManagement.gov Douglas Glair, USPS 23 Federal Cloud Credential Exchange (FCCX) Doug Glair – Manager, Digital Partnerships and Alliances – United States Postal Service Federal Cloud Credential Exchange (FCCX) enables the NSTIC and ICAM vision of interoperable credential usage by allowing agencies to securely interact with a single “broker” to facilitate the authentication of consumers Market Problem (Government) • Requires Agencies to integrate with multiple Identity Service Providers (IDPs) The Solution (FCCX) • Creates a single interface between Agencies and IDPs • Speeds up integration • Requires IDPs to integrate with multiple Agencies • Reduces costs and complexity NIST Levels of Assurance (LOA) FCCX will integrate with ICAM approved IDPs across the Levels of Assurance (LOA) defined by NIST and approved via the ICAM Trust Framework Solutions LOA 4 LOA 3 LOA 2 LOA 1 Little or no confidence in asserted identity – selfassertion Some confidence in asserted identity Equifax, Google, PayPal, Symantec, VeriSign, Verizon, Wave Systems, Virginia Tech High confidence in asserted identity Approved IdPs: Approved IdPs: Symantec, Verizon Approved IdPs: Approved IdPs: Very high confidence in asserted identity Symantec, Verizon, Virginia Tech Complexity & Security PIV/ PIV-I Cards FCCX Anticipated User Experience Flow Align Collaborate Enable http://www.IDManagement.gov 28