SlideShare a Scribd company logo
1 of 10
Download to read offline
Identity Credential & Access
Management (ICAM) Standards
Adam Lewis, Motorola Solutions
Badge Credentials (The Real World)
UX
Secure
Difficult to forge. No such thing a scalable attack
that can leak all badges.
Usable
Just present it wherever you want to prove your
credentials. No Friction.
Interoperable
One badge. It can be used to prove your
identity anywhere.
2
If the Badge Were Like a Password
UX
Insecure
Badge can be copied by almost anyone and
used to impersonate you. 81% of all crimes
would be traced back to a compromised badge.
Unusable
Enter F0g3Ej*Ry$k$kIJ6 each time you want
to present it. Go get a new badge every 30
days. Make the badge look different than the
last 10 badges.
Non-Interoperable
Register for a new badge everywhere you go.
3
If Digital Credentials were Like a Badge
UX
Secure
Resistant to Compromise. It cannot be
phished or keystroke logged or brute forced.
There is no central repository to be attacked.
Usable
Digital credential used to authenticate to your home
agency using frictionless biometrics. No complex
passwords or 30-day rotations.
Interoperable
A single digital credentials can be used to
authenticate you to all digital services: home
agency, public safety cloud, FirstNet, other
agencies. 4
Delegation
Authorization
OAuth2
OpenID Connect
AppAuth
FIDO2
Laying the Foundation for an Identity Ecosystem
Open ICAM Standards
Web SSO
Open source
client library
Modern MFA
5
 
 
 
 
 
 
 
 
 
SECURE CREDENTIALS
6
Standard Protocols to Look at:
• Fast ID Online (FIDO)
• Standardized by the FIDO Alliance and W3C
• Over 300 certified FIDO-compliant products
• Supported by Android, the Major Browsers and
Windows Hello
Leverages Innovations at the Edge:
• Commoditization of secure hardware (TEE/SE)
• Biometric Sensors
Secure:
• No storage of centralized credentials for attacker to
compromise. Biometrics never leave the device.
Eliminates attacks at scale. Meets requirements for CJIS
and HIPAA.
USABLE CREDENTIALS
7
Standard Protocols to Look at:
• Fast ID Online (FIDO)
• OAuth 2.0 - standardized by the IETF. Adoption pretty
much everywhere.
• AppAuth (open source library) - recommended by the
IETF as a Best Current Practice
Usability
• FIDO made UX a first-class citizen (biometrics)
• OAuth enables SSO across native mobile apps when
implemented per IETF RFC 8252
PSFR need
• Enables open API access to PS resources, allowing
ecosystem of mobile apps to emerge
INTEROPERABLE CREDENTIALS
8
Standard Protocols to Look at:
• OpenID Connect, Security Association Markup Language
(SAML)
Interoperability
• Authenticate Once using your strong FIDO credentials
• Access home agency network, FirstNet, Public Safety
SAAS apps, NIEF, etc.
PSFR:
• Enable Inter-agency Information sharing
• Transitioning to Mobile Apps and Cloud Architectures -
now is time to get the plumbing right.
TYING IT ALL
TOGETHER
9
Contact Me
10
@lewiada
adam.lewis@motorolasolutions.com

More Related Content

What's hot

What's hot (20)

Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
Android security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh OjhaAndroid security and penetration testing | DIVA | Yogesh Ojha
Android security and penetration testing | DIVA | Yogesh Ojha
 
IoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangaloreIoT security zigbee -- Null Meet bangalore
IoT security zigbee -- Null Meet bangalore
 
FIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2FFIDO Specifications Overview: UAF & U2F
FIDO Specifications Overview: UAF & U2F
 
Hacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh MishraHacking & Securing of iOS Apps by Saurabh Mishra
Hacking & Securing of iOS Apps by Saurabh Mishra
 
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
 
Stealing sensitive data from android phones the hacker way
Stealing sensitive data from android phones   the hacker wayStealing sensitive data from android phones   the hacker way
Stealing sensitive data from android phones the hacker way
 
Web Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationWeb Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to Authentication
 
Android Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android ApplicationsAndroid Security Overview and Safe Practices for Web-Based Android Applications
Android Security Overview and Safe Practices for Web-Based Android Applications
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
Enterprise Authenticator Solution
Enterprise Authenticator SolutionEnterprise Authenticator Solution
Enterprise Authenticator Solution
 
Android Security Development
Android Security DevelopmentAndroid Security Development
Android Security Development
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
Fido Overview: Status and Future
Fido Overview: Status and FutureFido Overview: Status and Future
Fido Overview: Status and Future
 
FIDO2 and Microsoft
FIDO2 and MicrosoftFIDO2 and Microsoft
FIDO2 and Microsoft
 
Hacking android apps by srini0x00
Hacking android apps by srini0x00Hacking android apps by srini0x00
Hacking android apps by srini0x00
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development
 
PKNSP Objetos Conectados
PKNSP Objetos ConectadosPKNSP Objetos Conectados
PKNSP Objetos Conectados
 
Android Security
Android SecurityAndroid Security
Android Security
 
IoT smart parking space
IoT smart parking space IoT smart parking space
IoT smart parking space
 

Similar to PSCR 2019 - ICAM Standards

Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
Monika Keerthi
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
CTIN
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
HITCON GIRLS
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Brian Knopf
 
Io t slides_iotvillage
Io t slides_iotvillageIo t slides_iotvillage
Io t slides_iotvillage
agmoneyy
 

Similar to PSCR 2019 - ICAM Standards (20)

How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
Security Keys Presentation.pptx
Security Keys Presentation.pptxSecurity Keys Presentation.pptx
Security Keys Presentation.pptx
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Digital authentication
Digital authenticationDigital authentication
Digital authentication
 
We Know Your Type
We Know Your TypeWe Know Your Type
We Know Your Type
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud JumeletFIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
 
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdfRole of Biometrics in IoT - Bahaa Abdul Hadi.pdf
Role of Biometrics in IoT - Bahaa Abdul Hadi.pdf
 
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft AzureUno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
Uno, nessuno o 10.000, la gestione dell'identità ai tempi di Microsoft Azure
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Io t slides_iotvillage
Io t slides_iotvillageIo t slides_iotvillage
Io t slides_iotvillage
 
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 

More from Adam Lewis (6)

CIS2016 - MCPTT Connect
CIS2016 - MCPTT ConnectCIS2016 - MCPTT Connect
CIS2016 - MCPTT Connect
 
CIS2015-NAPPS-FirstResponders
CIS2015-NAPPS-FirstRespondersCIS2015-NAPPS-FirstResponders
CIS2015-NAPPS-FirstResponders
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0
 
FirstNet ICAM
FirstNet ICAMFirstNet ICAM
FirstNet ICAM
 
Identity as a Matter of Public Safety
Identity as a Matter of Public SafetyIdentity as a Matter of Public Safety
Identity as a Matter of Public Safety
 
The Road to Identity 2.0
The Road to Identity 2.0The Road to Identity 2.0
The Road to Identity 2.0
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

PSCR 2019 - ICAM Standards

  • 1. Identity Credential & Access Management (ICAM) Standards Adam Lewis, Motorola Solutions
  • 2. Badge Credentials (The Real World) UX Secure Difficult to forge. No such thing a scalable attack that can leak all badges. Usable Just present it wherever you want to prove your credentials. No Friction. Interoperable One badge. It can be used to prove your identity anywhere. 2
  • 3. If the Badge Were Like a Password UX Insecure Badge can be copied by almost anyone and used to impersonate you. 81% of all crimes would be traced back to a compromised badge. Unusable Enter F0g3Ej*Ry$k$kIJ6 each time you want to present it. Go get a new badge every 30 days. Make the badge look different than the last 10 badges. Non-Interoperable Register for a new badge everywhere you go. 3
  • 4. If Digital Credentials were Like a Badge UX Secure Resistant to Compromise. It cannot be phished or keystroke logged or brute forced. There is no central repository to be attacked. Usable Digital credential used to authenticate to your home agency using frictionless biometrics. No complex passwords or 30-day rotations. Interoperable A single digital credentials can be used to authenticate you to all digital services: home agency, public safety cloud, FirstNet, other agencies. 4
  • 5. Delegation Authorization OAuth2 OpenID Connect AppAuth FIDO2 Laying the Foundation for an Identity Ecosystem Open ICAM Standards Web SSO Open source client library Modern MFA 5                  
  • 6. SECURE CREDENTIALS 6 Standard Protocols to Look at: • Fast ID Online (FIDO) • Standardized by the FIDO Alliance and W3C • Over 300 certified FIDO-compliant products • Supported by Android, the Major Browsers and Windows Hello Leverages Innovations at the Edge: • Commoditization of secure hardware (TEE/SE) • Biometric Sensors Secure: • No storage of centralized credentials for attacker to compromise. Biometrics never leave the device. Eliminates attacks at scale. Meets requirements for CJIS and HIPAA.
  • 7. USABLE CREDENTIALS 7 Standard Protocols to Look at: • Fast ID Online (FIDO) • OAuth 2.0 - standardized by the IETF. Adoption pretty much everywhere. • AppAuth (open source library) - recommended by the IETF as a Best Current Practice Usability • FIDO made UX a first-class citizen (biometrics) • OAuth enables SSO across native mobile apps when implemented per IETF RFC 8252 PSFR need • Enables open API access to PS resources, allowing ecosystem of mobile apps to emerge
  • 8. INTEROPERABLE CREDENTIALS 8 Standard Protocols to Look at: • OpenID Connect, Security Association Markup Language (SAML) Interoperability • Authenticate Once using your strong FIDO credentials • Access home agency network, FirstNet, Public Safety SAAS apps, NIEF, etc. PSFR: • Enable Inter-agency Information sharing • Transitioning to Mobile Apps and Cloud Architectures - now is time to get the plumbing right.