Implementing
E-Authentication: What an Agency Needs to Know -
This slide presentation has
been developed to walk
Federal agency application
owners through the E-
Authentication implementation
process. It provides a step-
by-step look at how and
when to use the documents
and tools available on the E-
Authentication web site. E-
Authentication starts here! |
E-Authentication Mission:
Public trust in the security of information exchanged
over the Internet plays a vital role in the E-Gov transformation. E-Authentication
makes that trust possible.
E-Authentication is setting the standards for the
identity proofing of individuals and businesses, based on risk of online
services used. The initiative will focus on meeting the authentication
business needs of the E-Gov initiatives, building the necessary infrastructure
to support common, unified processes and systems for government-wide use.
This will help build the trust that must be an inherent part of every
online exchange between citizens and the Government.
Note:
This
page features a new "References" section on the right-hand menu.
The documents in this section have been produced to provide guidelines
for government agencies and private industry organizations wishing to
participate with E-Authentication as well as specific information on how
to do so.
News:
NIST
Releases Updated Electronic Authentication Guidance
In September 2004, NIST released an updated version of Special Publication
800-63, "Electronic
Authentication Guidance". If you are interested in finding out
what changed, please click on the link and scroll to the last page (65)
of the document.
Burton Group Report on the Federal E-Authentication Initiative
The E-Authentication Initiative was the subject of an independent report
issued today by the Burton Group, an IT research and advisory services
firm. The report's key findings focus on E-Authentication's technical
architecture, the initiative's emphasis on interoperability, and its reliance
on a federated approach identity management. Steve Timchak, E-Authentication
Program Executive, was pleased with Burton Group's findings. "What
this report says is that our initiative has taken the right approach to
building a government-wide identity verification system." Click here
to read the report.
Note to Authentication Technology Providers
Click
here to find out how to test your products in the E-Authentication
Interoperability Lab.
Seventh Product Added to Technology Provider List
The E-Authentication Initiative is pleased to announce that IBM's Tivoli
Federated Identity Manager v5.1.1 has been added to the Approved E-Authentication
Technology Provider List. Click
here to view the complete list of Approved E-Authentication Technology
Providers.
E-Authentication Delivers Technical Architecture
Another major element of the Authentication Service Component of the Federal
Enterprise Architecture is now in place. Click
here to read the full story.
|
|
Tools:
-- Trusted
Credential Service Provider List
-- E-RA Tool (Risk
Assessment)
-- E-Authentication
Technical Architecture
-- E-A Credential Assessment Suite
-- Approved
E-A Technology Provider List
References:
-- E-Authentication
Cookbook
-- E-A
Handbook for Federal Agencies
-- E-A
Handbook for CSPs
-- E-A
Interoperability Lab Concept of OPs
Policy:
-- E-A
Guidance for Federal Agencies
-- NIST
Special Publication 800-63
Presentations:
-- E-Authentication
Architecture Preview
-- Getting
to Green with E-Authentication
|