Author of Record Digital Identity Management Sub-Workgroup October 24, 2012 Meeting Etiquette • Please announce your name each time prior to making comments or suggestions during the call • Remember: If you are not speaking keep your phone on mute • Do not put your phone on hold – if you need to take a call, hang up and dial in again when finished with your other call – Hold = Elevator Music = very frustrated speakers and participants • This meeting, like all of our meetings, is being recorded – Another reason to keep your phone on mute when not speaking! • Feel free to use the “Chat” or “Q&A” feature for questions or comments NOTE: This meeting is being recorded and will be posted on the esMD Wiki page after the meeting 2 From S&I Framework to Participants: Hi everyone: remember to keep your phone on mute Agenda Topic Presenter Authentication Credential Overview Debbie Bucci Overview of the DEA Interim Rule Debbie Bucci 3 Authentication Credentials LOA3/LOA4 Oct 24, 2012 Authentication • Authentication is the process of establishing confidence that an individual who uses a credential that is known to the system (e.g., login name, digital certificate) is indeed the person to whom the credential was issued – Three types of authenticators: • Something you know (e.g., password) • Something you have (e.g., smartcard, hard token, mobile phone) • Something you are (e.g., fingerprint) – Multi-factor authentication requires more than one type – Authentication is performed when a user logs into a system and may be required again within a given session – Credential – binds the identity to the token 800-63-1 Matrix Memorized Secret Token Memorized Secret Level 2 Token Pre-registered X Knowledge Token Preregistered Knowledge Look-up Secret Out of Band SF OTP SF Crypto MF Softwar e Crypto Level 2 Level 3 Level 3 Level 3 Level 3 Level 3 Level 4 Level 4 Level 2 Level 3 Level 3 Level 3 Level 3 Level 3 Level 4 Level 4 MF OTP MF Crypto Look-up Secret Token X X Level 2 Level 2 Level 2 Level 2 Level 3 Level 4 Level 4 Out of Band Token X X X Level 2 Level 2 Level 2 Level 3 Level 4 Level 4 SF OTP Device X X X X Level 2 Level 2 Level 3 Level 4 Level 4 SF Cryptographic Device X X X X X Level 2 Level 3 Level 4 Level 4 MF Software Cryptographic Token X X X X X X Level 3 Level 4 Level 4 MF OTP Device X X X X X X X Level 4 Level 4 MF Cryptographic Device X X X X X X X X Level 4 Memorized Secret Tokens • Shared secret between user and credential provider • Something you know • Examples – Active Directory Passwords – WiFi Passphrases – PIN Pre Registered Knowledge Tokens • • • • • Challenge/Response Pre-registered responses or images Set of shared secrets Something you know Examples • I forgot my password setup • Transaction information - “what was the amount of your last payment to your phone company” Look-up secret Tokens • Electronic or physical set of shared secrets often printed on paper or plastic – the user is asked to provide a subset of characters printed on the card • Something you have • Examples • Entrust Grid Cards • DualShield GridID Out of Band Tokens • Physical token that can receive a secret for one time use • Something you have • Examples • SMS message on a registered cell phone Single Factor One-Time Password (OTP) Device • Hardware device • Something you have • Examples • RSA key fob token • Credit card password generator Single Factor Cryptographic Device • Hardware device that performs crypto operation on input provided to the device • Does not require a second factor • Generally a signed message • Something you have • Examples • PKI certificate Multi-Factor Cryptographic Device • • • • • Key is stored on a disk or soft media and requires activation Does not require a second factor Generally a signed message Something you have and something you know Examples • PKI certificate + PIN Multi-Factor OTP • OTP hardware device that requires activation via PIN or biometric • Something you have and something you know /or something you are • Examples • Verizon or Symmantec OTP offering • DAON IdentityX Multi-Factor Cryptographic Device • Hardware device that contains protected key that requires activation through a second factor • Possession of device and control of key • Something you have and something you know or something you are • Examples • PIV • PIV-I • ATM cards DEA Interim Rule • Requires the practitioner to authenticate to the application using an authentication protocol that uses two of the following three factors: 1.Something only the practitioner knows, such as a password or response to a challenge question. 2.Something the practitioner is, biometric data such as a fingerprint or iris scan. 3.Something the practitioner has, a device (hard token) separate from the computer to which the practitioner is gaining access. DEA Interim Rule • Biometrics – Consulted extensively with NIST for recommendation – DEA did not specify type as to allow for greatest flexibility and adaptation for new technologies in the future • Hard token must meet FIPS 140-2 – New hard token or provide credential for an existing token – Must be separate from the machine used to access application – Delivered thru 2 channels (mail, telephone, email) • Would consider an alternative that does not diminish safety and security of the system • Not to be confused with certificates needed to dispense controlled substances although that DEA number/certificate information needs to be associated with the signing