E-Authentication Header with US FlagLink to PartnersLink to NewsGo to Links of InterestLink to LibraryLink to FAQLink to Key PersonnelLink to EventsLink to Home page

       Search                                                Contact Us

Statue of Liberty, and a Finger Pressing the Enter Key

Implementing
E-Authentication: What an Agency Needs to Know -


This slide presentation has
been developed to walk
Federal agency application
owners through the E-
Authentication implementation
process. It provides a step-
by-step look at how and
when to use the documents
and tools available on the E-
Authentication web site. E-
Authentication starts here!

E-Authentication Mission:
Public trust in the security of information exchanged over the Internet plays a vital role in the E-Gov transformation. E-Authentication makes that trust possible.

E-Authentication is setting the standards for the identity proofing of individuals and businesses, based on risk of online services used. The initiative will focus on meeting the authentication business needs of the E-Gov initiatives, building the necessary infrastructure to support common, unified processes and systems for government-wide use. This will help build the trust that must be an inherent part of every online exchange between citizens and the Government.

Note:
This page features a new "References" section on the right-hand menu. The documents in this section have been produced to provide guidelines for government agencies and private industry organizations wishing to participate with E-Authentication as well as specific information on how to do so.

News:
NIST Releases Updated Electronic Authentication Guidance
In September 2004, NIST released an updated version of Special Publication 800-63, "Electronic Authentication Guidance". If you are interested in finding out what changed, please click on the link and scroll to the last page (65) of the document.

Burton Group Report on the Federal E-Authentication Initiative

The E-Authentication Initiative was the subject of an independent report issued today by the Burton Group, an IT research and advisory services firm. The report's key findings focus on E-Authentication's technical architecture, the initiative's emphasis on interoperability, and its reliance on a federated approach identity management. Steve Timchak, E-Authentication Program Executive, was pleased with Burton Group's findings. "What this report says is that our initiative has taken the right approach to building a government-wide identity verification system." Click here to read the report.

Note to Authentication Technology Providers
Click here to find out how to test your products in the E-Authentication Interoperability Lab.

Seventh Product Added to Technology Provider List
The E-Authentication Initiative is pleased to announce that IBM's Tivoli Federated Identity Manager v5.1.1 has been added to the Approved E-Authentication Technology Provider List. Click here to view the complete list of Approved E-Authentication Technology Providers.

E-Authentication Delivers Technical Architecture
Another major element of the Authentication Service Component of the Federal Enterprise Architecture is now in place. Click here to read the full story.

Tools:
--  Trusted Credential Service Provider List
--  E-RA Tool (Risk Assessment)
--  E-Authentication Technical Architecture
--  E-A Credential Assessment Suite
--  Approved E-A Technology Provider List

References:
--  E-Authentication Cookbook
--  E-A Handbook for Federal Agencies
--  E-A Handbook for CSPs
--  E-A Interoperability Lab Concept of OPs

Policy:
--  E-A Guidance for Federal Agencies
--  NIST Special Publication 800-63

Presentations:
--  E-Authentication Architecture Preview
--  Getting to Green with E-Authentication

 E-Gov website   FIRSTGOV website