SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
PIV Card
based
Identity Assurance
in
Sun Ray & IDM Environment


Ramesh Nagappan
Sun Microsystems
ramesh.nagappan@sun.com
PIV Credentials – What is in your PIV card ?
FIPS-201 Mandatory and Optional On-Card Credentials
   Mandatory Credentials
      PIN (Personal Identification Number)
      Cardholder Unique Identifier (CHUID)
      PIV Authentication Data (asymmetric key pair and
      corresponding PKI certificate)
      Two biometric fingerprints (CBEFF)
   Optional Credentials
      An asymmetric key pair and corresponding certificate
                                                             Source: GSA USAccess
      for digital signatures
      An asymmetric key pair and corresponding certificate
      for key management
      Asymmetric or symmetric card authentication keys for
      supporting additional physical access applications
      Symmetric key(s) associated with the card
      management system
Sun Rays In a PIV Environment




                                  Security
                                Manageability
                                 Reliability
                                  Mobility
                                   Value

      Sun Ray supports the use of PIV Cards
Rationale
PIV card based Identity Assurance in Sun Ray Environment

 • Mobility with Security
    > In accordance with HSPD-12/FIPS-201 Logical access control requirements.
    > Use PIV card credentials for Desktop authentication and single sign-on (SSO) of IT
      systems and applications.
    > PIV card based Hot-desking and secure LAN/WAN access

 • PIV credentials based Multi-factor authentication as
   equivalent to face-to-face verification of a person.
    > Combining Smart card based PIN and PKI Certificates for authentication against
      FBCA or Agency's PKI authority.
    > Combining Match-to- PIV card Biometric authentication with traditional authentication
      schemes such as username/passwords.
    > Stronger authentication using random challenges with biometric fingerprints.

 • Mission-critical availability with high degree of Identity
   assurance.
PIV based Logical Access Control




      Sun Confidential: Sun Employees and Immersion Week 2008 Partner Attendees Only.
                                                                                        5
Sun Technologies for PIV
Integration with PIV Smart card / Biometric authentication middleware
  • Sun Ray Desktops
      > Verified integration with PIV Smartcard based PKI/Biometric authentication providers.
      > Verified integration with USB based Biometric scanners
      > Desktop authentication for Solaris/Solaris Trusted Extensions and Linux (using PAM)
        and Microsoft environment (using GINA).
      > Multi-factor authentication support combining Biometrics with Smartcard PIN + PKI
        certificates.
      > Use Sun Ray Server and Sun VDI environment (on Sun VirtualBox or VMWare ESX)

  • Sun OpenSSO / Sun Java System Access Manager
      > Multi-factor credential (PKI and Biometrics) based Single sign-on authentication to
         Enterprise applications.

  • Sun Java System Identity Manager
      > Provisioning and De-provisioning of PIV credentials across applications.
      > Convergence of Physical and Logical Access control systems
      > Digitally Signed approvals and authorization workflows.
Smartcard/PKI Technology Providers
Integration with Sun Rays and Sun Identity Management Suite
 • Daon Credential Connect
    > Integrates Physical access control systems (PACS)
        – Integrates with Sun IDM to support provisioning of credentials/roles to PACS.

 • Smartcard Client Middleware
    > ActivClient 6.x (ActivIdentity), OpenSC (OpenSC.org)
        –   Enables PKI authentication for Sun Ray based Desktop environments
        –   Integrates Sun OpenSSO for PKI authentication enabling SSO.
        –   Supports Sun Ray Windows connector and VDI environment.
        –   Supports Windows Desktop SSO on Sun Rays.
        –   Tested to work with FBCA PKI and DoD PKI
        –   Supports Unix, Linux and Windows VDI environments

 • PKI Provider
    > Entrust, Verisign, Verizon Cybertrust
    > OCSP, CRLs
Biometric Technology Providers
Integration with Sun Rays and Sun Identity Management Suite

  • Biometric Middleware
     > BioBex (Advanced Biometric Controls) and BioSP (Aware Inc.)
         – Biometric authentication middleware using samples such as Fingerprints,
           Iris, Facial and Hand geometry.
         – Biometric authentication for Sun Ray based Desktop environments
         – Provisioning and De-provisioning of Biometric credentials
         – Biometric authentication based Single sign-on for applications.
         – Biometrics based physical access control to restrict person access to doors,
           buildings and restricted areas.
         – Military-grade security with Mandatory and Discretionary access control
           using Solaris Trusted Extensions.
         – Match biometric samples to PIV Smart cards.

  • Biometric Scanners
     > Crossmatch Verifier (Ethernet Interface)
     > SecuGen Hamster Plus (USB Interface)
Logical Architecture
PIV Credential Authentication for Sun Rays




                                                                             Windows
                                                                             Connector




         ●
             PKI credential status verified against FBCA PKI (via OCSP or CRLs)
         ●
             Biometric credentials matched to PIV Card or an Biometric authentication provider
Logical Deployment
PIV Credential authentication – Virtual/Remote Desktop/Application environment
    PC & Thin Client users can                  Access layer                   The access tier     Each user desktop      Native protocols
    securely access their remote                controls the user              supports standard   environment runs       are used to access
    desktops & applications from                access and                     Authentication      on a virtual machine   apps.
    any location using PIV Cards.               application profiles.          mechanisms:         located in the
                                                                                                   corporate data         No modification of
                                                It maintains audit             LDAPv3                                     the OS or apps
                                                logs of user and                                   center.
    Once PIV authenticated, the                                                Active Directory                           required.
                                                app usage.                                         All desktop and
    access tier establishes a                                                  NIS
    display connection to the user              It provides the                                    application
    device and a protocol                       display engine to the          MS Windows          communication
    connection to the back-end                  user desktop.                  Domain              remains in the
              desktop OS and                                                                       data center.
                applications.




                                                                               Combine existing    Windows XP / 2003
                                                 Secure remote                                     Desktop
                                                 access from any               authentication      Virtualization
                                     Firewall




                                                                    Firewall




                                                 location                      and authorization
                                                                               mechanisms          using Sun Rays
                                                                               using Sun IDMS      and Sun VDI
              PIV
    Credential Authentication                    Sun Access Tier                Identity/Auth.     ESX Virtualization       Applications


        Sun Rays                                                                   Data Center
Data and Application stay Central
Mandatory Access Control and
Security Labels (Solaris TX)
Sun CMT Servers: Wire-speed Security
Sun UltraSPARC T2 offers On-chip Cryptographic Acceleration for PIV

                   • Sun UltraSPARC T2 offers industry-leading
                     cryptography performance for PIV
                     environments.
                       > On-chip Crypto threads virtually eliminates large workloads with
                         PKI & Cryptography.
                       > Out-performs competition on SSL and Public-key crypto
                         opertaions
                           > Over 30x greater RSA1024 performance than 2-socket IBM p510
                           > 15.6x better AES128 performance than off-chip crypto accelerator.

                   • Support common used ciphers for Public-key
                     encryption and secure hashing functions
                       > Public-key cryptography (RSA, DSA, Diffie-Hellman, ECC)
                       > Bulk encryption (RC4, DES, 3DES, AES)
                       > Secure hash (MD5, SHA-1, SHA-256)
Q&A




Ramesh Nagappan
Sun Microsystems
ramesh.nagappan@sun.com

Weitere ähnliche Inhalte

Was ist angesagt?

Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1aalwayson
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Canada
 
Smart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetSmart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetWattson Alexander Ramírez Rodas
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)Jeff Green
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Canada
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signifypjpallen
 
iSecurity Data Sheet March 2016
iSecurity Data Sheet March 2016iSecurity Data Sheet March 2016
iSecurity Data Sheet March 2016Raz-Lee Security
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
Msk security non linear authenticaiton
Msk security   non linear authenticaitonMsk security   non linear authenticaiton
Msk security non linear authenticaitonmsksecurity
 

Was ist angesagt? (17)

Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
Smart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetSmart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheet
 
19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
 
Rsa Secur Id From Signify
Rsa Secur Id From SignifyRsa Secur Id From Signify
Rsa Secur Id From Signify
 
iSecurity Data Sheet March 2016
iSecurity Data Sheet March 2016iSecurity Data Sheet March 2016
iSecurity Data Sheet March 2016
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
Msk security non linear authenticaiton
Msk security   non linear authenticaitonMsk security   non linear authenticaiton
Msk security non linear authenticaiton
 
Contextual Authentication
Contextual AuthenticationContextual Authentication
Contextual Authentication
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 

Ähnlich wie PIV Card based Identity Assurance in Sun Ray and IDM environment

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDDevOps.com
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustInformation Security Services SA
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDigicomp Academy AG
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCloudIDSummit
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 

Ähnlich wie PIV Card based Identity Assurance in Sun Ray and IDM environment (20)

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
QualysGuard InfoDay 2012 - QualysGuard Suite 7.0
 
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de EntrustISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los escenarios para IdentityGuard de Entrust
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
status
statusstatus
status
 
status
statusstatus
status
 
ffv
ffvffv
ffv
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 

Mehr von Ramesh Nagappan

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Ramesh Nagappan
 
Interoperable Provisioning in a distributed world
Interoperable Provisioning in a distributed worldInteroperable Provisioning in a distributed world
Interoperable Provisioning in a distributed worldRamesh Nagappan
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterRamesh Nagappan
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Ramesh Nagappan
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...Ramesh Nagappan
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyRamesh Nagappan
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
ICAM - Demo Architecture review
ICAM - Demo Architecture reviewICAM - Demo Architecture review
ICAM - Demo Architecture reviewRamesh Nagappan
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformRamesh Nagappan
 
Java Platform Security Architecture
Java Platform Security ArchitectureJava Platform Security Architecture
Java Platform Security ArchitectureRamesh Nagappan
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSORamesh Nagappan
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityRamesh Nagappan
 

Mehr von Ramesh Nagappan (15)

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005
 
Interoperable Provisioning in a distributed world
Interoperable Provisioning in a distributed worldInteroperable Provisioning in a distributed world
Interoperable Provisioning in a distributed world
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperCluster
 
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
Secure Multi-tenancy on Private Cloud Environment (Oracle SuperCluster)
 
High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...High Performance Security and Virtualization for Oracle Database and Cloud-En...
High Performance Security and Virtualization for Oracle Database and Cloud-En...
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted Cryptography
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
ICAM - Demo Architecture review
ICAM - Demo Architecture reviewICAM - Demo Architecture review
ICAM - Demo Architecture review
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card Platform
 
Java Platform Security Architecture
Java Platform Security ArchitectureJava Platform Security Architecture
Java Platform Security Architecture
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE SecurityWire-speed Cryptographic Acceleration for SOA and Java EE Security
Wire-speed Cryptographic Acceleration for SOA and Java EE Security
 

Kürzlich hochgeladen

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 

Kürzlich hochgeladen (20)

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 

PIV Card based Identity Assurance in Sun Ray and IDM environment

  • 1. PIV Card based Identity Assurance in Sun Ray & IDM Environment Ramesh Nagappan Sun Microsystems ramesh.nagappan@sun.com
  • 2. PIV Credentials – What is in your PIV card ? FIPS-201 Mandatory and Optional On-Card Credentials Mandatory Credentials PIN (Personal Identification Number) Cardholder Unique Identifier (CHUID) PIV Authentication Data (asymmetric key pair and corresponding PKI certificate) Two biometric fingerprints (CBEFF) Optional Credentials An asymmetric key pair and corresponding certificate Source: GSA USAccess for digital signatures An asymmetric key pair and corresponding certificate for key management Asymmetric or symmetric card authentication keys for supporting additional physical access applications Symmetric key(s) associated with the card management system
  • 3. Sun Rays In a PIV Environment Security Manageability Reliability Mobility Value Sun Ray supports the use of PIV Cards
  • 4. Rationale PIV card based Identity Assurance in Sun Ray Environment • Mobility with Security > In accordance with HSPD-12/FIPS-201 Logical access control requirements. > Use PIV card credentials for Desktop authentication and single sign-on (SSO) of IT systems and applications. > PIV card based Hot-desking and secure LAN/WAN access • PIV credentials based Multi-factor authentication as equivalent to face-to-face verification of a person. > Combining Smart card based PIN and PKI Certificates for authentication against FBCA or Agency's PKI authority. > Combining Match-to- PIV card Biometric authentication with traditional authentication schemes such as username/passwords. > Stronger authentication using random challenges with biometric fingerprints. • Mission-critical availability with high degree of Identity assurance.
  • 5. PIV based Logical Access Control Sun Confidential: Sun Employees and Immersion Week 2008 Partner Attendees Only. 5
  • 6. Sun Technologies for PIV Integration with PIV Smart card / Biometric authentication middleware • Sun Ray Desktops > Verified integration with PIV Smartcard based PKI/Biometric authentication providers. > Verified integration with USB based Biometric scanners > Desktop authentication for Solaris/Solaris Trusted Extensions and Linux (using PAM) and Microsoft environment (using GINA). > Multi-factor authentication support combining Biometrics with Smartcard PIN + PKI certificates. > Use Sun Ray Server and Sun VDI environment (on Sun VirtualBox or VMWare ESX) • Sun OpenSSO / Sun Java System Access Manager > Multi-factor credential (PKI and Biometrics) based Single sign-on authentication to Enterprise applications. • Sun Java System Identity Manager > Provisioning and De-provisioning of PIV credentials across applications. > Convergence of Physical and Logical Access control systems > Digitally Signed approvals and authorization workflows.
  • 7. Smartcard/PKI Technology Providers Integration with Sun Rays and Sun Identity Management Suite • Daon Credential Connect > Integrates Physical access control systems (PACS) – Integrates with Sun IDM to support provisioning of credentials/roles to PACS. • Smartcard Client Middleware > ActivClient 6.x (ActivIdentity), OpenSC (OpenSC.org) – Enables PKI authentication for Sun Ray based Desktop environments – Integrates Sun OpenSSO for PKI authentication enabling SSO. – Supports Sun Ray Windows connector and VDI environment. – Supports Windows Desktop SSO on Sun Rays. – Tested to work with FBCA PKI and DoD PKI – Supports Unix, Linux and Windows VDI environments • PKI Provider > Entrust, Verisign, Verizon Cybertrust > OCSP, CRLs
  • 8. Biometric Technology Providers Integration with Sun Rays and Sun Identity Management Suite • Biometric Middleware > BioBex (Advanced Biometric Controls) and BioSP (Aware Inc.) – Biometric authentication middleware using samples such as Fingerprints, Iris, Facial and Hand geometry. – Biometric authentication for Sun Ray based Desktop environments – Provisioning and De-provisioning of Biometric credentials – Biometric authentication based Single sign-on for applications. – Biometrics based physical access control to restrict person access to doors, buildings and restricted areas. – Military-grade security with Mandatory and Discretionary access control using Solaris Trusted Extensions. – Match biometric samples to PIV Smart cards. • Biometric Scanners > Crossmatch Verifier (Ethernet Interface) > SecuGen Hamster Plus (USB Interface)
  • 9. Logical Architecture PIV Credential Authentication for Sun Rays Windows Connector ● PKI credential status verified against FBCA PKI (via OCSP or CRLs) ● Biometric credentials matched to PIV Card or an Biometric authentication provider
  • 10. Logical Deployment PIV Credential authentication – Virtual/Remote Desktop/Application environment PC & Thin Client users can Access layer The access tier Each user desktop Native protocols securely access their remote controls the user supports standard environment runs are used to access desktops & applications from access and Authentication on a virtual machine apps. any location using PIV Cards. application profiles. mechanisms: located in the corporate data No modification of It maintains audit LDAPv3 the OS or apps logs of user and center. Once PIV authenticated, the Active Directory required. app usage. All desktop and access tier establishes a NIS display connection to the user It provides the application device and a protocol display engine to the MS Windows communication connection to the back-end user desktop. Domain remains in the desktop OS and data center. applications. Combine existing Windows XP / 2003 Secure remote Desktop access from any authentication Virtualization Firewall Firewall location and authorization mechanisms using Sun Rays using Sun IDMS and Sun VDI PIV Credential Authentication Sun Access Tier Identity/Auth. ESX Virtualization Applications Sun Rays Data Center
  • 11. Data and Application stay Central
  • 12. Mandatory Access Control and Security Labels (Solaris TX)
  • 13. Sun CMT Servers: Wire-speed Security Sun UltraSPARC T2 offers On-chip Cryptographic Acceleration for PIV • Sun UltraSPARC T2 offers industry-leading cryptography performance for PIV environments. > On-chip Crypto threads virtually eliminates large workloads with PKI & Cryptography. > Out-performs competition on SSL and Public-key crypto opertaions > Over 30x greater RSA1024 performance than 2-socket IBM p510 > 15.6x better AES128 performance than off-chip crypto accelerator. • Support common used ciphers for Public-key encryption and secure hashing functions > Public-key cryptography (RSA, DSA, Diffie-Hellman, ECC) > Bulk encryption (RC4, DES, 3DES, AES) > Secure hash (MD5, SHA-1, SHA-256)