SlideShare a Scribd company logo
Development of Digital
Identity Systems
Presenter: Maganathin Marcus Veeraragaloo
Date: 6th July 2017
• Context – Digital Transformation / Industry 4.0
• Cyber Security evolution to Digital Security
• Identity in a Digital World
• Development of Digital Identity Standards
• Authentication Protocols
• Authentication Technologies
• Conclusion
Agenda
• Context – Digital Transformation / Industry 4.0
• Cyber Security evolution to Digital Security
• Identity in a Digital World
• Development of Digital Identity Standards
• Authentication Protocols
• Authentication Technologies
• Conclusion
Agenda
Context – Digital Transformation / Industry 4.0
Context – Digital Transformation / Industry 4.0
Context – Digital Transformation / Industry 4.0
• Context – Digital Transformation / Industry 4.0
• Cyber Security evolution to Digital Security
• Identity in a Digital World
• Development of Digital Identity Standards
• Authentication Protocols
• Authentication Technologies
• Conclusion
Cyber Security is evolving into Digital Security
Cyber Security evolution to Digital Security
Digital Security
Cyber Security
Information Security
IT Security
Physical Security
IoT Security
OT Security
Smart Grid Security
Network Perimeter
Disappearing
Digital Security is the evolution of Cyber Security or
The scope of Cyber Security is evolving into Digital Security
• Context – Digital Transformation / Industry 4.0
• Cyber Security is evolving into Digital Security
• Identity in a Digital World
• Development of Digital Identity Standards
• Authentication Protocols
• Authentication Technologies
• Conclusion
Agenda
Identity in a Digital World
Identity
• Context – Digital Transformation / Industry 4.0
• Cyber Security evolution to Digital Security
• Identity in a Digital World
• Development of Digital Identity Standards
• Authentication Protocols
• Authentication Technologies
• Conclusion
Agenda
Development of Digital Identity Standards
NIST Special
Publications
800-63 Suite
SP-800-63-3
Digital Identity
Guidelines
SP-800-63-3A
Enrollment &
Identity
Proofing
SP-800-63-3B
Authentication
& Life Cycle
Management
SP-800-63-3C
Federation and
Assertions
Identity Assurance Level (IAL): the identity proofing process and the binding between one or
more authenticators and the records pertaining to a specific subscriber
Authenticator Assurance Level (AAL): the authentication process, including how additional
factors and authentication mechanisms can impact risk mitigation
Federation Assurance Level (FAL): the assertion used in a federated environment to
communicate authentication and attribute information to a relying party (RP)
• It provides an overview of general identity frameworks; using
authenticators, credentials, and assertions together in a digital
system;
• Organizations can perform a risk assessment, answer a set of
functional questions, and, based on their responses, be guided to
the most appropriate xAL for their system and users.
• Agencies need to look for requirements and ensures that the
assessment of risks and the available processes and technologies
mitigate that risk and are well aligned.
• Align with commercial markets, promote international
interoperability, and focus on outcomes (where possible) to
promote innovation and deployment flexibility.
Development of Digital Identity Standards
NIST-800-63-3
Development of Digital Identity Standards
Digital Identity Model – NIST 800-63-3
( Digital Identity Guidelines)
• Arguably the most difficult part of digital identity: strengthening identity
proofing while expanding options for remote and in-person proofing.
• Guidelines clarify methods for resolving an identity to a single person and
enables RPs to evaluate and determine the strength of identity evidence.
• The proofing guidance moves away from a static list of acceptable
documents and instead describes “characteristics” for the evidence
necessary to achieve each IAL.
• Agencies can now pick the evidence that works best for their stakeholders:
what matters is the process behind the presentation.
• This opens the door for a diverse array of proofing options, including
virtual in-person (aka “supervised remote”) and trusted referees (e.g.,
notaries, Certificate Authorities), and offers clearer guidelines on
document checking and address confirmation.
Development of Digital Identity Standards
Identity Proofing (SP-800-63A)
• The new guidelines also enable server-side biometric matching and
include a comprehensive set of biometric performance and security
requirements.
• Biometric sensors are common in the devices that so many users carry
daily
• Provide guidelines that can prevent unreliable or weak biometric
approaches from sneaking their way into digital services.
• More options (to include more usable ones) at higher assurance levels.
• Changes Too
• email as a place to send one-time-passwords (OTPs)
• plain old SMS to send OTPs, although SMS is allowable with some risk-based and
security measures
• “token” talk – it’s now “authenticator”
Development of Digital Identity Standards
Authentication (SP-800-63B)
• Federation is when the RP and IdP are not a single entity or
not under common administration.
• Federation enables an IdP to proof and authenticate an
individual and provide identity assertions that RPs can accept
and trust.
• Provides greater detail on how assertions should be used, and
includes a host of privacy-enhancing requirements that can
make federation appealing to users.
Development of Digital Identity Standards
Federation (SP-800-63C)
• Context – Digital Transformation / Industry 4.0
• Cyber Security evolution to Digital Security
• Identity in a Digital World
• Development of Digital Identity Standards
• Authentication Protocols
• Conclusion
Agenda
• OAuth 2.0 enables applications to access resources on behalf of a specific user.
This is why the OAuth protocol has a resource server — a policy enforcement
point that is likely either an API gateway or a reverse-proxy Web access
management (WAM) system.
• The OAuth access and resource servers work in concert to provide access to
resources via a scope (see the Scopes section) entitlement request by the
application.
Authentication Protocols
• Security Assertion Markup Language 2.0 (SAML 2.0) is a version of the SAML
standard for exchanging authentication and authorization data between security
domains.
• SAML 2.0 is an XML-based protocol that uses security tokens containing
assertions to pass information about a principal (usually an end user) between a
SAML authority, named an Identity Provider, and a SAML consumer, named a
Service Provider.
• SAML 2.0 enables web-based authentication and authorization scenarios
including cross-domain single sign-on (SSO), which helps reduce the
administrative overhead of distributing multiple authentication tokens to the
• Connect is about authentication — providing an ID Token for interoperable access
to cross-domain relying.
• The Connect protocol leaves the policy enforcement to the relying party — just
like SAML does.
Authentication Protocols
• Is a means of expressing specific entities in a system by URL path elements.
• REST is not an architecture but it is an architectural style to build services on top
of the Web.
• REST allows interaction with a web-based system via simplified URLs rather than
complex request body or POST parameters to request specific items from the
system.
• REST stands for Representational State Transfer. It relies on a stateless, client-
server, cacheable communications. In most cases it is used with the HTTP
protocol.
• JavaScript Object Notation or JSON (/ˈdʒeɪsən/ JAY-sən), is an open-standard file
format that uses human-readable text to transmit data objects consisting of
attribute–value pairs and array data types (or any other serializable value). ...
JSON is a language-independent data format.
Authentication Protocols
Source: https://fidoalliance.org
Authentication Protocols
Source: https://fidoalliance.org
• Context – Digital Transformation / Industry 4.0
• Cyber Security evolution to Digital Security
• Identity in a Digital World
• Development of Digital Identity Standards
• Authentication Protocols
• Authentication Technologies
• Conclusion
Agenda
Authentication Technologies
Blockchain and Digital Signatures
• Usually a digital signature is made using the private key of the owner.
Whoever wants to verify the signature can do so using the corresponding
public key.
• Suppose a company wants to accept Bitcoins for its trades. Now, because of
security reasons, the company would not want that only a single employee will
have access to the company's Bitcoin wallet's password. Any transaction
should need approval from more than one employees of the company. A multi-
signature address is created for that purpose.
Authentication Technologies
Blockchain and Digital Signatures…continued
• A multi-signature address is an address associated with more than one Elliptic Curve
Digital Signature Algorithm (ECDSA) private keys. So, in an m-of-n address, when a
Bitcoin address is generated, it is associated with n private keys. And, at least m private
keys will be required to make a transaction possible.
• This concept can be used in making digital signatures. One can create a multi-signature
m-of-n address using n private keys and use that to record digital signature of
documents in a blockchain. Anyone can verify the digital signature using public keys, but
to make the digital signature one would need at least m private keys, out f n private
keys associated with the multi-signature address.
Authentication Technologies
Public Key Infrastructure - Digital Signatures
• When two hosts want to transfer sensitive data between them, they use an encrypted communication. Both the
hosts first connect to each other, authenticate themselves and after that an encrypted connection is established,
using which sensitive data are transferred.
• If a host wants to authenticate itself to the other host, it needs to prove its identity. Normally, public key
cryptography is used for that purpose. Each host possesses a private-public key pair. And, to establish an
encrypted connection, they share their public keys to each other.
• But, one has to confirm that the shared public key indeed belongs to the sender. Public Key
Infrastructure or PKI is an arrangement which is used for that purpose. It binds public keys with corresponding
identities through registration and issuance of certificates and using centralized authority called Certificate
Authority or CA. PKI consists of set of roles, policies and procedures to create, manage, distribute or revoke
digital certificates.
Authentication Technologies
Public Key Infrastructure - Digital Signatures
• Certificate Authority - A Certificate Authority issues a digital certificate to an entity. The issued digital certificate
is signed with the private key of the CA, so that it is not tampered with. When a host gets a digital certificate of
another host, it checks with the corresponding CA to make sure it is an authentic one.
• Registration Authority - When an entity requests for a digital certificate, the Registration Authority verifies the
identity of the entity to make sure the digital certificate is not mis-issued.
• Central Directory - A Central Directory is a central location where public keys are stored and indexed, so that they
can be retrieved at the time of verification of digital certificates.
• Certificate Management System - A Certificate Management System manages access to stored certificates and
the delivery of the certificates to be issued.
• Certificate Policy - It consists of policies of digital certificates.
Authentication Technologies
Block Chain
Authentication Technologies
Block Chain
• Context – Digital Transformation / Industry 4.0
• Cyber Security evolution to Digital Security
• Identity in a Digital World
• Development of Digital Identity Standards
• Authentication Protocols
• Authentication Technologies
• Conclusion
Agenda
Conclusion
Trusted Digital
Identity
Source: https://securityintelligence.com/
Conclusion
Thank-You

More Related Content

PPTX
Board secretaries and general counsels
PPTX
Digital IQ in managing risk and cyber threats
PPTX
Cloud computing risk assesment presentation
PPTX
Cloud computing risks
PDF
Mergers and Acquisition Security - Areas of Interest
PDF
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
PDF
Fadi Mutlak - Information security governance
Board secretaries and general counsels
Digital IQ in managing risk and cyber threats
Cloud computing risk assesment presentation
Cloud computing risks
Mergers and Acquisition Security - Areas of Interest
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Fadi Mutlak - Information security governance

What's hot (20)

PPTX
CISSP - Chapter 3 - System security architecture
PDF
Information Security Benchmarking 2015
PPTX
Security architecture frameworks
PDF
AFAC session 2 - September 8, 2014
PPT
GSA's Presentation on Improving Cyber Security Through Acquisition
PDF
M&A security - E-crime Congress 2017
PPTX
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
PDF
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
PPTX
Cybersecurity Framework - Introduction
PPTX
Cloud security - Auditing and Compliance
PDF
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
PPTX
Cloud Compliance Auditing - Closer 2011
PPTX
Cloud Audit and Compliance
PPTX
Chapter 1 Law & Ethics
PPTX
QSA Shares PCI 3.0 Advice & Checklist
PDF
The Security Policy Management Maturity Model: How to Move Up the Curve
PPTX
Robert Nichols: Cybersecurity for Government Contractors
PDF
Enterprise policy-management
PDF
Cyber security maturity model- IT/ITES
CISSP - Chapter 3 - System security architecture
Information Security Benchmarking 2015
Security architecture frameworks
AFAC session 2 - September 8, 2014
GSA's Presentation on Improving Cyber Security Through Acquisition
M&A security - E-crime Congress 2017
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
#MFSummit2016 Secure: How Security and Identity Analytics can Drive Adaptive ...
Cybersecurity Framework - Introduction
Cloud security - Auditing and Compliance
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Cloud Compliance Auditing - Closer 2011
Cloud Audit and Compliance
Chapter 1 Law & Ethics
QSA Shares PCI 3.0 Advice & Checklist
The Security Policy Management Maturity Model: How to Move Up the Curve
Robert Nichols: Cybersecurity for Government Contractors
Enterprise policy-management
Cyber security maturity model- IT/ITES
Ad

Similar to Development of Digital Identity Systems (20)

PPTX
Public Digital Identity as a Service
PDF
Carrie Peter
PDF
Digital certificate management v1 (Draft)
PPT
Cartes Asia Dem 2010 V2
PPT
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
PPTX
Kerberos-PKI-Federated identity
PPT
Trust in E- and M-Business - Advances Through IT-Security
PPTX
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
PDF
Enterprise Blockchain: Top Considerations Before You Deploy
PPTX
Cryptography
PPTX
Blockchain
PPTX
PDF
Cybersecurity Slides
PDF
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
PDF
Blockchain Bootcamp - Leadership Edition
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PPTX
Impact of digital certificate in network security
PPTX
Impact of digital certificate in network security
PPTX
E-KYC- The revolutionirse of digital verification
PPTX
Chapter 2 Overview of Commercial Issues.pptx
Public Digital Identity as a Service
Carrie Peter
Digital certificate management v1 (Draft)
Cartes Asia Dem 2010 V2
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
Kerberos-PKI-Federated identity
Trust in E- and M-Business - Advances Through IT-Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
Enterprise Blockchain: Top Considerations Before You Deploy
Cryptography
Blockchain
Cybersecurity Slides
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Blockchain Bootcamp - Leadership Edition
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Impact of digital certificate in network security
Impact of digital certificate in network security
E-KYC- The revolutionirse of digital verification
Chapter 2 Overview of Commercial Issues.pptx
Ad

More from Maganathin Veeraragaloo (20)

PPTX
MULTI-CLOUD ARCHITECTURE
PPTX
Cloud security (domain11 14)
PPTX
Cloud security (domain6 10)
PPTX
Cloud Security (Domain1- 5)
PPTX
BTABOK / ITABOK
PPTX
PPTX
Foresight 4 Cybersecurity
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PPTX
CLOUD NATIVE SECURITY
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
ISO 27005 - Digital Trust Framework
PPTX
ITIL4 - DIGITAL TRUST FRAMEWORK
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
PPTX
COBIT 2019 - DIGITAL TRUST FRAMEWORK
PPTX
Open Digital Framework from TMFORUM
PPTX
Enterprise security architecture approach
PPTX
Cloud and Data Privacy
PPTX
PPTX
Multi cloud security architecture
PPTX
Multi Cloud Architecture Approach
MULTI-CLOUD ARCHITECTURE
Cloud security (domain11 14)
Cloud security (domain6 10)
Cloud Security (Domain1- 5)
BTABOK / ITABOK
Foresight 4 Cybersecurity
Cybersecurity Capability Maturity Model (C2M2)
CLOUD NATIVE SECURITY
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ISO 27005 - Digital Trust Framework
ITIL4 - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
Open Digital Framework from TMFORUM
Enterprise security architecture approach
Cloud and Data Privacy
Multi cloud security architecture
Multi Cloud Architecture Approach

Recently uploaded (20)

PDF
Courtesy Meeting NIPA and MBS Australia.
PPTX
怎么办休斯敦大学维多利亚分校毕业证电子版成绩单办理|UHV在读证明信
PPTX
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
DOCX
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
PPTX
Introduction_to_the_Study_of_Globalization.pptx
PPTX
Proposed Odisha State Highways Authority OSHA Act 2025 Draft
PPT
generalgeologygroundwaterchapt11-181117073208.ppt
PDF
ISO-9001-2015-gap-analysis-checklist-sample.pdf
PDF
Population Estimates 2025 Regional Snapshot 08.11.25
PDF
ISO-9001-2015-internal-audit-checklist2-sample.pdf
PPTX
GSA Q+A Follow-Up To EO's, Requirements & Timelines
PPTX
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
PDF
It Helpdesk Solutions - ArcLight Group
PPTX
Inferenceahaiajaoaakakakakakakakakakakakakaka
PDF
Storytelling youth indigenous from Bolivia 2025.pdf
PDF
Environmental Management Basics 2025 for BDOs WBCS by Samanjit Sen Gupta.pdf
PDF
सुशासन सप्ताह भारत रत्न श्री अटल बिहारी बाजपेयी जी जन्मदिवस समारोह 19-24 दिसं...
PPTX
GOVERNMENT-ACCOUNTING1. bsa 4 government accounting
PPT
Adolescent Health Orientation and Health care
PPTX
PCCR-ROTC-UNIT-ORGANIZATIONAL-STRUCTURE-pptx-Copy (1).pptx
Courtesy Meeting NIPA and MBS Australia.
怎么办休斯敦大学维多利亚分校毕业证电子版成绩单办理|UHV在读证明信
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Alexistogel: Solusi Tepat untuk Anda yang Cari Bandar Toto Macau Resmi
Introduction_to_the_Study_of_Globalization.pptx
Proposed Odisha State Highways Authority OSHA Act 2025 Draft
generalgeologygroundwaterchapt11-181117073208.ppt
ISO-9001-2015-gap-analysis-checklist-sample.pdf
Population Estimates 2025 Regional Snapshot 08.11.25
ISO-9001-2015-internal-audit-checklist2-sample.pdf
GSA Q+A Follow-Up To EO's, Requirements & Timelines
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
It Helpdesk Solutions - ArcLight Group
Inferenceahaiajaoaakakakakakakakakakakakakaka
Storytelling youth indigenous from Bolivia 2025.pdf
Environmental Management Basics 2025 for BDOs WBCS by Samanjit Sen Gupta.pdf
सुशासन सप्ताह भारत रत्न श्री अटल बिहारी बाजपेयी जी जन्मदिवस समारोह 19-24 दिसं...
GOVERNMENT-ACCOUNTING1. bsa 4 government accounting
Adolescent Health Orientation and Health care
PCCR-ROTC-UNIT-ORGANIZATIONAL-STRUCTURE-pptx-Copy (1).pptx

Development of Digital Identity Systems

  • 1. Development of Digital Identity Systems Presenter: Maganathin Marcus Veeraragaloo Date: 6th July 2017
  • 2. • Context – Digital Transformation / Industry 4.0 • Cyber Security evolution to Digital Security • Identity in a Digital World • Development of Digital Identity Standards • Authentication Protocols • Authentication Technologies • Conclusion Agenda
  • 3. • Context – Digital Transformation / Industry 4.0 • Cyber Security evolution to Digital Security • Identity in a Digital World • Development of Digital Identity Standards • Authentication Protocols • Authentication Technologies • Conclusion Agenda
  • 4. Context – Digital Transformation / Industry 4.0
  • 5. Context – Digital Transformation / Industry 4.0
  • 6. Context – Digital Transformation / Industry 4.0
  • 7. • Context – Digital Transformation / Industry 4.0 • Cyber Security evolution to Digital Security • Identity in a Digital World • Development of Digital Identity Standards • Authentication Protocols • Authentication Technologies • Conclusion Cyber Security is evolving into Digital Security
  • 8. Cyber Security evolution to Digital Security Digital Security Cyber Security Information Security IT Security Physical Security IoT Security OT Security Smart Grid Security Network Perimeter Disappearing Digital Security is the evolution of Cyber Security or The scope of Cyber Security is evolving into Digital Security
  • 9. • Context – Digital Transformation / Industry 4.0 • Cyber Security is evolving into Digital Security • Identity in a Digital World • Development of Digital Identity Standards • Authentication Protocols • Authentication Technologies • Conclusion Agenda
  • 10. Identity in a Digital World Identity
  • 11. • Context – Digital Transformation / Industry 4.0 • Cyber Security evolution to Digital Security • Identity in a Digital World • Development of Digital Identity Standards • Authentication Protocols • Authentication Technologies • Conclusion Agenda
  • 12. Development of Digital Identity Standards NIST Special Publications 800-63 Suite SP-800-63-3 Digital Identity Guidelines SP-800-63-3A Enrollment & Identity Proofing SP-800-63-3B Authentication & Life Cycle Management SP-800-63-3C Federation and Assertions Identity Assurance Level (IAL): the identity proofing process and the binding between one or more authenticators and the records pertaining to a specific subscriber Authenticator Assurance Level (AAL): the authentication process, including how additional factors and authentication mechanisms can impact risk mitigation Federation Assurance Level (FAL): the assertion used in a federated environment to communicate authentication and attribute information to a relying party (RP)
  • 13. • It provides an overview of general identity frameworks; using authenticators, credentials, and assertions together in a digital system; • Organizations can perform a risk assessment, answer a set of functional questions, and, based on their responses, be guided to the most appropriate xAL for their system and users. • Agencies need to look for requirements and ensures that the assessment of risks and the available processes and technologies mitigate that risk and are well aligned. • Align with commercial markets, promote international interoperability, and focus on outcomes (where possible) to promote innovation and deployment flexibility. Development of Digital Identity Standards NIST-800-63-3
  • 14. Development of Digital Identity Standards Digital Identity Model – NIST 800-63-3 ( Digital Identity Guidelines)
  • 15. • Arguably the most difficult part of digital identity: strengthening identity proofing while expanding options for remote and in-person proofing. • Guidelines clarify methods for resolving an identity to a single person and enables RPs to evaluate and determine the strength of identity evidence. • The proofing guidance moves away from a static list of acceptable documents and instead describes “characteristics” for the evidence necessary to achieve each IAL. • Agencies can now pick the evidence that works best for their stakeholders: what matters is the process behind the presentation. • This opens the door for a diverse array of proofing options, including virtual in-person (aka “supervised remote”) and trusted referees (e.g., notaries, Certificate Authorities), and offers clearer guidelines on document checking and address confirmation. Development of Digital Identity Standards Identity Proofing (SP-800-63A)
  • 16. • The new guidelines also enable server-side biometric matching and include a comprehensive set of biometric performance and security requirements. • Biometric sensors are common in the devices that so many users carry daily • Provide guidelines that can prevent unreliable or weak biometric approaches from sneaking their way into digital services. • More options (to include more usable ones) at higher assurance levels. • Changes Too • email as a place to send one-time-passwords (OTPs) • plain old SMS to send OTPs, although SMS is allowable with some risk-based and security measures • “token” talk – it’s now “authenticator” Development of Digital Identity Standards Authentication (SP-800-63B)
  • 17. • Federation is when the RP and IdP are not a single entity or not under common administration. • Federation enables an IdP to proof and authenticate an individual and provide identity assertions that RPs can accept and trust. • Provides greater detail on how assertions should be used, and includes a host of privacy-enhancing requirements that can make federation appealing to users. Development of Digital Identity Standards Federation (SP-800-63C)
  • 18. • Context – Digital Transformation / Industry 4.0 • Cyber Security evolution to Digital Security • Identity in a Digital World • Development of Digital Identity Standards • Authentication Protocols • Conclusion Agenda
  • 19. • OAuth 2.0 enables applications to access resources on behalf of a specific user. This is why the OAuth protocol has a resource server — a policy enforcement point that is likely either an API gateway or a reverse-proxy Web access management (WAM) system. • The OAuth access and resource servers work in concert to provide access to resources via a scope (see the Scopes section) entitlement request by the application. Authentication Protocols • Security Assertion Markup Language 2.0 (SAML 2.0) is a version of the SAML standard for exchanging authentication and authorization data between security domains. • SAML 2.0 is an XML-based protocol that uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, named an Identity Provider, and a SAML consumer, named a Service Provider. • SAML 2.0 enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO), which helps reduce the administrative overhead of distributing multiple authentication tokens to the • Connect is about authentication — providing an ID Token for interoperable access to cross-domain relying. • The Connect protocol leaves the policy enforcement to the relying party — just like SAML does.
  • 20. Authentication Protocols • Is a means of expressing specific entities in a system by URL path elements. • REST is not an architecture but it is an architectural style to build services on top of the Web. • REST allows interaction with a web-based system via simplified URLs rather than complex request body or POST parameters to request specific items from the system. • REST stands for Representational State Transfer. It relies on a stateless, client- server, cacheable communications. In most cases it is used with the HTTP protocol. • JavaScript Object Notation or JSON (/ˈdʒeɪsən/ JAY-sən), is an open-standard file format that uses human-readable text to transmit data objects consisting of attribute–value pairs and array data types (or any other serializable value). ... JSON is a language-independent data format.
  • 23. • Context – Digital Transformation / Industry 4.0 • Cyber Security evolution to Digital Security • Identity in a Digital World • Development of Digital Identity Standards • Authentication Protocols • Authentication Technologies • Conclusion Agenda
  • 24. Authentication Technologies Blockchain and Digital Signatures • Usually a digital signature is made using the private key of the owner. Whoever wants to verify the signature can do so using the corresponding public key. • Suppose a company wants to accept Bitcoins for its trades. Now, because of security reasons, the company would not want that only a single employee will have access to the company's Bitcoin wallet's password. Any transaction should need approval from more than one employees of the company. A multi- signature address is created for that purpose.
  • 25. Authentication Technologies Blockchain and Digital Signatures…continued • A multi-signature address is an address associated with more than one Elliptic Curve Digital Signature Algorithm (ECDSA) private keys. So, in an m-of-n address, when a Bitcoin address is generated, it is associated with n private keys. And, at least m private keys will be required to make a transaction possible. • This concept can be used in making digital signatures. One can create a multi-signature m-of-n address using n private keys and use that to record digital signature of documents in a blockchain. Anyone can verify the digital signature using public keys, but to make the digital signature one would need at least m private keys, out f n private keys associated with the multi-signature address.
  • 26. Authentication Technologies Public Key Infrastructure - Digital Signatures • When two hosts want to transfer sensitive data between them, they use an encrypted communication. Both the hosts first connect to each other, authenticate themselves and after that an encrypted connection is established, using which sensitive data are transferred. • If a host wants to authenticate itself to the other host, it needs to prove its identity. Normally, public key cryptography is used for that purpose. Each host possesses a private-public key pair. And, to establish an encrypted connection, they share their public keys to each other. • But, one has to confirm that the shared public key indeed belongs to the sender. Public Key Infrastructure or PKI is an arrangement which is used for that purpose. It binds public keys with corresponding identities through registration and issuance of certificates and using centralized authority called Certificate Authority or CA. PKI consists of set of roles, policies and procedures to create, manage, distribute or revoke digital certificates.
  • 27. Authentication Technologies Public Key Infrastructure - Digital Signatures • Certificate Authority - A Certificate Authority issues a digital certificate to an entity. The issued digital certificate is signed with the private key of the CA, so that it is not tampered with. When a host gets a digital certificate of another host, it checks with the corresponding CA to make sure it is an authentic one. • Registration Authority - When an entity requests for a digital certificate, the Registration Authority verifies the identity of the entity to make sure the digital certificate is not mis-issued. • Central Directory - A Central Directory is a central location where public keys are stored and indexed, so that they can be retrieved at the time of verification of digital certificates. • Certificate Management System - A Certificate Management System manages access to stored certificates and the delivery of the certificates to be issued. • Certificate Policy - It consists of policies of digital certificates.
  • 30. • Context – Digital Transformation / Industry 4.0 • Cyber Security evolution to Digital Security • Identity in a Digital World • Development of Digital Identity Standards • Authentication Protocols • Authentication Technologies • Conclusion Agenda