Trusted Identity - PowerPoint PPT Presentation

1 / 30
About This Presentation
Title:

Trusted Identity

Description:

RAS. Intranet. Internet. Intranet. Mainframe ... RAS. RSA Agent. Remote Access. RSA ACE/Server. Internet. RSA Agent. Internet Access. VPN or Firewall ... – PowerPoint PPT presentation

Number of Views:128
Avg rating:3.0/5.0
Slides: 31
Provided by: dereke5
Category:
Tags: identity | ras | trusted

less

Transcript and Presenter's Notes

Title: Trusted Identity


1
  • Trusted Identity Access Management
  • The Next Critical Step

2
RSA Market Presence
Application Integration
Identity Provisioning
Access Management
Digital Signatures
Authentication
Encryption
Management
Information and Transactions
People and Devices
3
RSA Authentication SolutionsHigh-Level
Differentiation
4
Two-Factor User Authentication
PIN
5
Building the Authentic User
  • Authentication binds people to their digital
    identities
  • Authorization enables a digital identity access
    to services according to policy
  • Certificates bind digital identities to
    transactions and provide data integrity
  • Enablement of applications to securely process
    real-world business rules is achieved via
    Cryptography

6
Time-based Token Authentication
2468
234836
PIN
TOKENCODE
7
RSA SecurID Two-factor User Authentication
  • Proven pervasive
  • 12 million users in 8,000 companies
  • 220 RSA SecurID-ready products from 100
    partners
  • SecurID Express deployment service
  • Scalable to 3000,000s of users
  • Broad range of authenticators
  • RSA SecurID and hybrid PKI
  • RSA SecurID, Web Agent and SSLprovide secure
    communication with no special client SW

8
Tokens do a Simpler Job...
  • Identification Authentication
  • No client software required
  • Very simple to use and deploy

9
How Customers Use RSA SecurID
10
RSA Smart Badging
CAC Approved
11
Windows-based Application SSO 1st Time Access
12
Introducing RSA Mobile
  • Upon receiving a valid username and PIN, RSA
    Mobile sends a one-time access code to the user's
    portable device.
  • Two-factor authentication
  • Leverages a device the user already has
  • Zero-deployment, zero-footprint
  • Intuitive, easy to use and highly portable

13
How RSA Mobile works
Web Server
Agent
Start here
RSA Mobile Authentication Server
e-Mail Server or Gateway Server
Telco Network
Text Message
14
User Authentication (IV)
15
Certificate Management
Solutions
  • RSA Keon Web Server SSL
  • Enabling cost-effective trusted server
    authentication
  • RSA Secure e-Forms Signing
  • Enables trusted transactions for streamlined
    business processes
  • RSA Secure e-Mail
  • Enables trusted messaging for streamlined
    business processes
  • RSA Smart Badging
  • Combining physical and logical access for an
    enhanced ROI

16
RSA Keon Web Server SSLSolution
  • Solution components include
  • RSA Keon CA
  • RSA Keon Root Signing
  • RSA Professional Services
  • Functions
  • Enables organizations to issue manage SSL
    certificates
  • Alternative to service-based SSL model
  • Business Benefits
  • Improved total cost of ownership
  • Rapid return on investment
  • Accelerated deployment and ease of use
  • Trusted foundation for deployment of secure
    e-business

17
RSA Secure e-Forms Signing Solution
  • Solution components include
  • RSA Keon CA
  • RSA e-Sign Downloadable, zero-footprint applet
  • RSA Keon Web Passport optional
  • Functions
  • Demonstrates intent
  • Authenticates the signer
  • Assures the integrity of signed data
  • Supports non-repudiation
  • Benefits
  • Prevents breakage in e-business processes
  • Enhanced e-based revenue opportunities
  • Support for legislative compliance

18
RSA Secure e-Mail Architecture
e-Mail Client
RSA Keon CA with OneStep
e-Mail configuration script publishes certificate
information into Microsoft Global Address List
G.A.L.
19
Agenda
  • Identity Management
  • Define the term
  • Explore the value
  • The evolution
  • RSA Securitys role in Identity Management
  • Trusted Identity and Access Management
  • The Liberty Alliance project
  • Summary

20
Lets Define the Term
  • Identity management is a process, rather than a
    function, inclusive of provisioning new users,
    executing the work flows needed to grant access,
    and managing application use.
  • identity management needs to focus on the
    users entire security lifecycle.

AMR Research June 2002
To succeed, it must also infuse TRUST.
21
Trusted IdentitiesCoupling Identity and Access
Management
  • An un-trusted identity wont be of use to anyone
  • How do you establish a trusted identity?
  • Authentication
  • Identity and access privileges are tightly
    coupled
  • Who I am and what I can do
  • Separate but related
  • The line between authentication, proof of
    identity, and access management begins to blur

22
Wheres the Real Value?
Interoperability Applications, Networks
Establishing Trust in Identity
Enforcing Business Policy
Automating Account Creation Termination
Storage Retrieval
23
Trusted Identity Access ManagementRSA
Securitys View
  • What it is
  • Intelligent use of identity
  • Ability to securely manage the full lifecycle of
    an on-line or digital identity
  • What it is not
  • Its not simply the ability to store or provision
    digital identities

24
Trusted Identity Access Management Benefits
  • Enables cross-domain relationships
  • Improved user experience
  • Enables interoperability
  • Reduced management costs
  • Better policy enforcement / improved security

25
Putting the Value into PerspectiveAn Analogy
An ERP installation requires the SAP software
and an underlying database engine like Oracle.
Both are required.Which one provides the most
business value to the organization?
26
Trusted Identity Access Management The
Evolution
Outward-facing e-Commerce
Value Delivered
Partner Community
Within the Enterprise
Adoption Timeline
27
Liberty Alliance Membership Partial List
www.projectliberty.org
28
RSA Security and Standards for Identity
Management
  • Liberty Alliance
  • SAML
  • .Net (Microsoft)
  • Web Services

RSA Security will bridge Identity Management
platforms by providing higher level security and
integration across multiple, heterogeneous
environments.
29
Summary
  • Identity management is a process
  • Value is in establishing trust in identity and
    enforcing business policy
  • Trusted Identity Access Management is the
    intelligent use of identity and the ability to
    securely manage the full lifecycle of an on-line
    or digital identity
  • RSA Security is uniquely positioned to provide
    Trusted Identity and Access Management solutions
  • RSA Security will bridge all Identity Management
    platforms by providing higher level security and
    integration across multiple, heterogeneous
    environments

30
The Most Trusted Name in e-Security
Christopher May A Technology Solutions,
Inc. Phone 877-797-6197, ext. 2238
www.rsasecurity.com
Write a Comment
User Comments (0)
About PowerShow.com