The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB...

17
© 2014 Constellation Research, Inc. All rights reserved. Public TM The Authentication Family Tree CIS 2014 Modern Identity Revolution, Monterey, California 22 July 2014 Steve Wilson (@steve_lockstep) Principal Analyst, Constellation Research

Transcript of The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB...

Page 1: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

TM

The Authentication Family Tree

CIS 2014 Modern Identity Revolution, Monterey, California

22 July 2014

Steve Wilson (@steve_lockstep)

Principal Analyst, Constellation Research

Page 2: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

Registrar Registrar Registrar

Authenticators

SP SP SP

ID Proofing

TRUSTED THIRD PARTY

Attributes

Database

Authentication

Broker

SAML API

SAML API SAML API SAML API

Redirect

Device

specific

logon pages

Verification

Server Verification

Server

Plenty of solid architectures have been developed for federated identity. But time and time again, federation proves harder than it looks.

Page 3: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

Unknown unknowns

“We’ve never seen anything

like this before”

IdP/RP Counsel

3

Internet Industry Assoc.

IIA 2FA Pilot Blueprint 11 August 2005

The Australian Internet Industry Association went a long way towards building a shared 2FA hub, including well written template agreements between the hub and participating IdPs and RPs. But lawyers for the participants didn’t know how to deal with the contracts. The legal novelty creates a risk management situation that cannot be planned

Page 4: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

• IIA 2FA Scheme

• Trust Centre

• MAMBO

• Sxipper

• CardSpace

4

Harder than it looks

Federated Identity is very appealing and attracts strong support, in the early days of promising projects and start-ups. But the repeated failure demands explanation

Page 5: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public 5

“[Account numbering] is built

into the DNA of the

technology of every bank”

Bob McKinnon, Westpac CIO.

The explanation has been hinted at many times. The MAMBO project (My Account, My Bank Online) tried to create a single bank-independent account number for all Australians. The project was abandoned after some years, because as one bank’s CIO said, the cost of reengineering customer relations proved too high.

Page 6: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

6

The sheer diversity of authenticators suggests a biological explanation.

Page 7: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public 7

THE RECEIVED WISDOM:

A Digital Identity is a set of claims made

about a digital subject.

And Digital Identities are highly contextual.

THE MISSING LINK:

So, Digital Identities have evolved

Page 8: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

“Soft Certs”

Roaming “Soft Certs”

Skype

PDAs

USB crypto keys

Set-top Box

Health Cards

SIMs National ID

Staff Cards

E-Passport

Biometrics PKC

Persistent Transient

Shared Secret

Odour DNA (?)

Fingerprint (Planar)

Fingerprint (Wipe)

Hand vein

Retina

Gait

Typing

Style

Signature

Dynamics

Static

Password

TAN Card

OATH Token

Time Sync Token

Challenge-Response Calc.

Matrix Card

SMS

Face

Iris

Voice

Hand outline

Chip-and-PIN

Smart phones

Embedded

I made an early attempt to map authentication technologies onto a family tree. But this was guesswork, and like the intuitive family trees in pre-genetic biology, the tree had some errors.

Page 9: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public 9

Meme (n): a replicable unit of

cultural transmission.

Basic features are shared between digital identities and are selectively passed down from one generation to the next – such as form factors, algorithms, identification rules, key lengths, and user interfaces. These features represent “memes” in the technical sense of the word.

Page 10: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public 10

The phylogeny of

Little Red Riding Hood

Jamshid Tehrani 2013

Public Library of Science

Memetics has been a controversial pursuit, but is undergoing something of a resurgence. I am applying phylogenetic modelling in an attempt to demonstrate the evolved interrelatedness of digital identities. The tree shown here is of a famous fairy story, and shows the strength of memetics in diverse fields of study.

Page 11: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

Authentication evolves

11

1950 1960 1970 1980 1990 2000 2010

FFIEC MFA

ILV EV AML

KBA

Computer Science

PKI Tech corps

AUS regulated ID proofing

to open bank account

US MFA

“mandate”

Electronic Verification

for some banking

Internet Life

Verification

Name &

Pwd

CVV

OTP SMS OTP fob

CAP calculated OTP

Phone

biometrics

Occasional “Horizontal Meme Transfer

sees ideas move transfer between

different “memomes”. For example, the

username & password of Internet

banking came from computer science.

Technology corporations were using

One time Password fobs before they

were adopted in banking. And going

the other way, the 100 point check of

pre-Internet 1980s fraud prevention

was coopted for no apparent direct

reason in Australian PKI in the 1990s.

FTRA 100 Point Check

“The Authentication Family Tree” CIS 2014 Monterey

Page 12: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

The Authentication Memome

12

Character Values

Token Form Factor Mag card / Prox card / Smartcard / Smart phone

Token activation None / Password / PIN / Biometric / Continuous Auth

ID Proofing FTRA 100 points / AML / HIPAA / PIV / ECD / ISO 29003

Enrolment channel OTC / Remote / Automatic / Refereed

Second Factor None / Time OTP fob / Event OTP fob / OTP SMS / C-R fob / CAP

Biometric None / Fingerprint* / Face* / Voice* / Vascular Hand / ECG

Signature Algorithm RSA / ECDSA

Sig Key Length 2048 / 4096 / 160 / 224 / 256 / 384 / 512

OTHERS WORK IN PROGRESS

“The Authentication Family Tree” CIS 2014 Monterey

Page 13: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

So what? • Explanatory power

The memetic/ecological frame may shed light on why federated identity us harder than it looks

• We’re getting rid of LOAs right? Earlier in the Cloud Identity Summit, the new NSTIC CIO floated the idea of getting rid of Levels of

Assurance. It’s a great idea. To make it work, we need fresh understanding of how authentication

solutions respond to real risks.

• Help drive the Attributes Push Interest in Attributes is gaining strength, with the AXN, and in the strategies espoused by FIDO.

The ecological/memetic frame emphasises attributes and provides a robust intellectual framework.

• Attributes Exchange Network (AXN)

• FIDO Alliance

13

Page 14: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

`

FIDO Identity & Authentication

14

NOK NOK LABS – USED WITH PERMISSION

Physical-to-digital identity

User Management

Authentication

Federation

Single

Sign-On

Passwords Risk-Based Strong

MODERN

AUTHENTICATION

“The Authentication Family Tree” CIS 2014 Monterey

The FIDO Alliance is sticking to its convictions and focusing strictly on the authentication level of the “Digital Identity Stack”. The realisation that identity can (and should) be separated from authentication resonates with my thesis that Digital Identities are evolved ensembles of attributes selected to manage particular risks.

Page 15: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

Federated

Attributes

15

A practical upshot of this new theoretical framework could be schemes that federate concrete attributes instead of abstract identities. The diagram shows how a basket of attributes furnished by one Attribute Provider can be mapped against the needs of different Relying Parties. “Identity” is multi-dimensional, and not one-dimensional as implied by the LOA model.

Page 16: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public

Page 17: The Authentication Family Tree - Locksteplockstep.com.au/library/conference-presentations... · USB crypto keys Set-top Box Health Cards SIMs National ID Staff Cards E-Passport BiometricsOdour

© 2014 Constellation Research, Inc. All rights reserved. Public 17

Thank you

Steve Wilson

+61 (0)414 488 851

[email protected]

Twitter: @steve_lockstep

http://lockstep.com.au/blog

www.ConstellationR.com