smartcard forum 2009 - opentrust scm

22
Integrated Lifecycle Management of Smart Cards, USB Tokens & User Credentials

Upload: oksystem

Post on 24-May-2015

724 views

Category:

Technology


5 download

TRANSCRIPT

Page 1: SmartCard Forum 2009 - OpenTrust SCM

Integrated Lifecycle Management of Smart Cards, USB Tokens

& User Credentials

Page 2: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 2

Agenda

• Introduction

– IT Security: Too many challenges…

– A strong need for “Trusted Identities”

– “Trusted Users” Key Benefits

– A strong need for Integrated Badge & Credential Management (CMS)

• OpenTrust SCM Overview

– OpenTrust SCM Key Benefits

– A Simple and Full Featured Enterprise CMS

– Making “Trusted Users” a reality

– OpenTrust SCM Architecture and Ecosystem

– Worldwide References & related business cases

• Use Cases: eBanking, IAM Integation

Badge & Credential Management

Page 3: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 3

IT Security: too many challenges …

How to allow IS access to roaming users,

third parties and remote application services

without compromising IT security ?How to secure access control to business

applications, while authentication schemes

rely (mostly) on shareable/spoofable logins

and passwords ?

How to (safely) provide enough

IS flexibility to adapt to :

► Evolving business workflow requirements ?

► Organization and regulations changes ?

► Heterogeneous connection means and devices ?

How to warrant Enterprise data privacy and

integrity in order to protect mission critical

assets, with respect to existing regulations

(SOX, PCI, Bale II, SAFE, etc.) ?How to take advantage of electronic

transactions to leverage business

processes and to increase global

productivity ?How to get better protected against

internal threats & frauds ?

etc…

Page 4: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 4

Electronic Trust… a global answer

The widespread use of Digital Identities securely granted to any user and IS component establishes the basis of new and powerful security policy enforcement paradigms :

► “Trusted Networks”

► “Trusted Users”

► “Trusted Transactions”

At OpenTrust, we believe that implementing a

global Trust Infrastructure is the only foundation

to address upcoming IT security challenges

all in one, with respect to :

- Security standards

- Ease of use

- Productivity requirements (TCO, ROI)

OK

KOKO

IAN / IBNS

Business

Application

Portal

Authorized

Employee

Customer

Archiving

System

OTP

Server

Certificate

Provider (PKI)

SSO

Server

Corporate

User

External

User

Page 5: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 5

Key benefits of “Trusted Users” (1/2)

Prevent user security credentials disclosure using a single, safe and personal cryptographic support

► Enabling IS-wide “two factor” strong authentication, regardless of

connection means and user types

► Confining multiple user “secrets” (OTP, SSO, Key pairs…) in a single support that can be fully managed locally and remotely at any time

► Providing a suitable mean of convergence for logical (certificate, key pairs…) and physical (contactless, biometrics…) access control credentials… one step toward unified Corporate Badging

Allow a simple, cost effective and deep integration of asymmetric cryptography standards in the IT environment

► Already supported by most of the IT (infrastructure: routers, switches… & software components: web servers, email clients, SSO, Windows Logon…)

► Enabling easy user (or server) based data encryption and regulation compliant digital signature

Page 6: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 6

Key benefits of “Trusted Users” (2/2)

Establish a user friendly “state of the art” security model

► No more passwords (goal : not even a few)

► Simple and secure handling of personal authentication means

► Enhanced user capabilities and asset protection (encryption, digital signature)

► Empowered user productivity (focus on core business rather than getting lost with multiple access control schemes)

Provide secure and integrated credential lifecycle management to existing X.509 Certificate (PKI), SSO, OTP & IAM solutions

► Allowing them to rely on secure digital identities that can be trusted

far beyond logins and passwords… and that belong to a global, consistent and business effective security policy

► Lowering TCO : multiple (i.e. per solution) credential management tasks are automated and handled from a focal point :

the Card Management System (CMS)

Page 7: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 7

Requirements for an Enterprise CMS

Widespread use of Digital Identities stored

on personal cryptographic supports is a

very attractive approach of user security

Multiple HoldersEmployees,

Externals,

Partners,

Customers (B2B, B2C),

Etc…

Multiple Lifecycle

OperationsDistribution & Enrollement

Revocation

Credential renewal

Badge recycling

Self care (unlocking,

PIN change, replacement, etc.)

Multiple SupportsMulti vendors

Smart Cards & Tokens

(and related drivers,

middlewares…)

But it requires strong and complete

management capabilities to become

a reality across the Enterprise

Page 8: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 8

is a comprehensive answer that provides enterprise

wide “Trusted Users” management capabilities, while remaining :

► Highly secure (communications,

access control, operations, auditing…)

► Simple and user friendly (easy endorsement,

enhanced productivity)

► Open to third party solutions (SSO, OTP, IAM…)

and trough standard interfaces (Web Services,

LDAP, PKCS#7...)

► Flexible and complete (multiple smart card & token support,

many operator and user profiles, heterogeneous

issuance and lifecycle operations…)

► Cost effective: providing an outstanding security level,

while lowering user credential management costs

(automation, centralization, homogeneity)

OpenTrust SCM Key Benefits

Page 9: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 9

OpenTrust SCM a simple and full featured CMS

• Modeling tools: datasources & profiles (users, cards, certificates…)

• Integrated Enrolment & Issuance processes

– “Self Enrolment” by the badge holder (end user)

– Issuance through the “Badge Office”

– Badge “Pre Personalization” process

• Card & Token Lifecycle Management processes

– Issuance of replacement/temporary badges

– Badge loss/theft statement

– Replacement and renewal of cryptographic contents

– Badge recycling

– Card & Token remote unlocking

• Badge holder Self Care operations

– Certificate renewal

– Auto recovery of old encryption certificates

– PIN Code change

– Badge unlocking (on line, off line)

• Common Platform Services

– Logging, notification, publication, auditing…

– Strong Authentication and Access Control

– Dynamic application skinning and multi lingual support

– Platform clustering and HA management

Page 10: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 10

Help Desk

Operator

Enterprise AD / LDAP

User Directory

Security

Officer

PKI

Server

OTP

Server

SSO

Server

Hardware

Security

Module

Existing

IT Infrastructure

Making “Trusted Users” a reality…

Card HolderEmployee,

External,

Partner,

etc.

User

Authentication

OK

Enrolled SupportEmpty Support

User Automated Card

Initialization process

Auto

Discovery

of User’s Card

Profile

Credential

Generation

Requests

(SOAP)

Page 11: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 11

OpenTrust SCM Architecture

OpenTrust SCM ServerSmartcard & Cedentials

Lifecycle Management

Card profile

Authentication

Card profile

Signature

Card profile

encryption

Third-party

Applications

(IAM)

WS/SOAP

Smartcard

Initialization &

Selfcare Operations

OpenTrust

PKI

OpenTrust

OTP

WS/SOAP WS/SOAP

Third-party

Applications

HSM

Page 12: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 12

A large and complete Ecosystem

Card & Token

Manufacturers

SSO & IAM

Providers

One Time Password

OTP

Solutions

Certificate

Providers

PKIMicrosoft

PKI HSM

Vendors

Page 13: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 13

2

THALES

Migration from a Baltimore PKI and

From a legacy CMS system to OpenTrust

PKI & SCM Platform, with full recycling

of 30 000 existing badges

Usage: Physical access control (Mifare),

Strong authentication and

Data encryption

2

DASSAULT Aviation

Global OpenTrust Platform implementation,

including: PKI, Smart Card Management, One Time

Password, Digital Signature Web Services and

secure document exchange platform

Usage: Strong Authentication, Data Encryption,

Digital Signature & Proof Management,

Secure document sendings

2

CARREFOUR

Global OpenTrust PKI, SCM and OTP

Implementation deployed to 40.000 users,

targeting 150. 000 holders worldwide (integration

with SSO from PassLogix and IAM from IBM “TIM”)

Usage: Physical access control (HID, Mifare),

OpenTrust OTP (on Gemalto Cyberflex cards),

Strong authentication, encryption and qualified

digital signature (via Xiring Secure

PIN Entry readers)

2

BNP PARIBAS

OpenTrust SCM Corporate Badging project for

both physical and logical access control (integration

with SSO from ActivIdentity on Gemalto Cyberflex

Cards), 70.000 branch office users targeted

Usage: Physical access control (Mifare)

Strong Authentication and

Logical access control

2

RENAULT-NISSAN

Strong Authentication project targeting the

group’s Worldwide Dealing Network. Each dealer is

delivered with a self enrolling USB security token to

get extranet access to core business applications

(parts, stoks, orders, etc.), 150.000 enrolled tokens

Usage: Strong Authentication

to business applications

2

SWISS

Minister of Defense

OpenTrust SCM Card Management project

(Gemalto Cyberflex cards) for both physical (Mifare)

and logical access control, targeting 20.000

internal users from the Minister

Usage: Physical Access Control, X.509

Strong Authentication, Data Encryption,

Digital Signature

2

MICHELIN

OpenTrust PKI & SCM Card Management

Project (Gemalto Cards), running in production

since 2003 with already 30.000 users worldwide

Usage: Strong Authentication,

Data Encryption & Digital Signature

2

French Custom Office

OpenTrust PKI & SCM Card Management

Project (OCSCards), running in production since

2007 for 20.000 Custom Officers Worldwide

Usage: Strong Authentication (Wifi, VPN,

Windows) and logical Access Control (via a legacy

SSO System), Data Encryption

& Digital Signature

2

TOTAL

Worldwide deployment of a multiservice

Smart Card for both physical and logical access

control – 100.000 enrolled badges since 2004, more

than 30.000 daily users

Usage: Physical & logical access control

Strong authentication (WIFI, VPN, Windows),

Data encryption and Digital Signature

2

ALSTOM Transport

Multiservice Smart Card security project

for both physical and logical access control

(integration with SSO from Evidian and with IAM

from Sun Microsystems) - 6 weeks deployment,

30.000 enrolled supports

Usage: Physical (HQ) & logical access control

Strong authentication (WIFI, VPN, Windows),

Data encryption

Smart Card & Credentials Management Worlwide References

Page 14: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 14

Auto

Discovery

“Self Enrolment” by the Badge Holder

a

b

c

Enterprise AD/LDAP

User Directory

Auth.

Scheme

Central

Security Officer

Registered

User

Card

Shipping

Process

Card Serial

Numbers

Registration

User‘s Card

Profile

Server

d

Page 15: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 15

Badge Enrollement throughthe « Badge Office »

Server

Badge

Operator

Enrolling

User

User‘s Card

Profileb

« PIN

Code »

Badge

Office

Enrolled SupportEmpty Support

a

Enterprise AD/LDAP

User Directory

c

+ « PIN »

Enrolled

User

OK

OK

Personal Q&A for

Off Line

Identification

Formal

Authentication

Page 16: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 16

Badge “Pre Personalization” process Recording, Shipping and Assignment

Enrolling

User

Enterprise AD/LDAP

User Directory

Server

a

Card Serial

Numbers

(CSV file)

Card Delivery

Operator

Card Activation Code

& Instructions

b

c

d

Central

Security Officer

e

Card Shipping

Process

Page 17: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 17

“Pre Perso” ProcessStage 2 – Final Badge Activation by the Holder

Server

Enrolled

User

a « Activation

Code »

Enterprise AD/LDAP

User Directory

b

« PIN

Code »

Page 18: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 18

“Pre Perso” ProcessStage 1 – Badge recording & “face to face” Issuance

Server

a

Badge

Bureau

Enterprise AD/LDAP

User Directory

Badge

Operator

Enrolling

User

b

c

Page 19: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 19

Server

Use Case : “Trusted Users” in eBanking

Security

Officer

Personal

Token Activation Code

Secure Auth

Secure Transactions

Token

Shipping

Process

Token’s

Central

Enrolment Production

Environment

Token Serial

Numbers

Registration

B2C eBanking

Infrastructure

Customer

Mailing

Process

Activation

Codes

Page 20: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 20

Server

Use Case: Tight Coopling with the IAM

Enterprise

AD / LDAP

User Directory

Enterprise

Portal / IAM

PKI

Server

OTP

Server

Secure

LDAP / SOAP

Infrastructure

SSO

Server

Card HolderEmployee,

External,

Partner,

etc.

Security

Credentials

Authentication : WIFI, VPN, SSO, Windows…

Encryption : Certificates & Private Keys

Digital Signature : Signing Certificates

for Business Applications

Help Desk

Operator

« User Properties & Identities »

Page 21: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 21

OpenTrust SCM Sample Card Profile

CardProfile

Access Control

Workflows& Options

Security Profile

Operators

Smart Cards

(Gemalto, Obertur, Aladdin)

X.509

CertificateProfiles

SSO App.

Page 22: SmartCard Forum 2009 - OpenTrust SCM

Confidential - OPENTRUST - Page 22

OpenTrust Project Méthodology

Project LaunchTraining & Skills

Transfert

Solution’s Architecture &

Parameters specification

Qualification Platform

Setup & Config.Phase

Server infrastructureInstallation & Configuration

Qualification Platform’s

Acceptance Testing

Production PlatformSetup & Config.

Phase

Formal Reception & Sign Off

Roll out & Operations

Maintenance & support from

OpenTrust