[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
RE: [higgins-dev] Re: Selector questions

One other avenue to consider - in the AIR selector, the authentication module has been nicely separated from the rest of the application, so that it can be fairly easily extended to use other kinds of authentication materials. Currently, it uses username + password + 'serialized key', where the serialized key is activated once using an OTP delivered via email, and then stored in the local machine using AIR's ELS, which in turn uses window's DPAPI.
I could envision an alternate scenario for shared workstations or a 'kiosk mode', where instead of authorizing a permanent 'serialized key', use the OTP directly to authorize a single access, and don't store the credentials locally. The OTP could be delivered via email as it is currently done, or other channels (SMS, voice telephony, hw token) could be added. 

From: higgins-dev-bounces@xxxxxxxxxxx [higgins-dev-bounces@xxxxxxxxxxx] On Behalf Of Tsvika Rabkin [tsvika.rabkin@xxxxxxxxx]
Sent: Saturday, July 25, 2009 5:52 PM
To: Paul Trevithick
Cc: Oren Cohen; higgins-dev
Subject: [higgins-dev] Re: Selector questions

Thanks! It looks like this solution might work for us.

On Sat, Jul 25, 2009 at 3:07 PM, Paul Trevithick <ptrevithick@xxxxxxxxx> wrote:

Just so you have the whole of our thinking on this, here’s a bit more detail about where we are headed with Higgins: The user’s selector is “serialized” with a key unique to that selector installation (this is the  “something you have part”), then the selector is secured with a “master” password (this is the “something you know” part). If a person’s computer is stolen, they can use any other device to de-provision that computer so that it no longer works. Azigo has developed this capability and will be contributing it to Higgins very soon. If a specific card requires yet stronger security, the card’s IdP can require yet other factors to also be required. The card IdP could require its own password, a USB token device, etc.

If/when we can tie the serialization key to a local TPM chip or equivalent on mobile device, we can harden this approach even further.


On 7/24/09 4:09 PM, "Tsvika Rabkin" <tsvika.rabkin@xxxxxxxxx> wrote:


Sharing some thoughts on physical device vs. hosted services:

Physical device:
  1. The identity provider creates real world trust by providing cards on a physical device.
  2. There is strong "two factor authentication". Something you have (card/key) and something you know (PIN).
  3. If the device is lost or stolen, the feedback is almost immediate. The security risk can be minimized by quick notification to the IDP that issued the managed card.
  4. Devices cost more than hosted service. However, USB keys are very common and the IDP/user can load the cards to the key he/she already own.
Hosted I-Card service:
  1. Hosted I-Card service is easy to synchronize and backup.
  2. Cost efficient.
  3. Cards are not stored on the selector. Good for shared machines.
  4. The "master" pw is a bit of concern, especially regarding to "leakage" of managed cards stored on the hosted service. Maybe there's a hybrid solution. A possible scenario:
    • The user stores the cards (self issued and managed) on the hosted service.
    • Suppose that the user has at least one managed card (issued by the same IDP that issued one of the cards stored on the hosted service), stored on his/hers personal machine or an external device.
    • This card can be used to login to the I-Card hosted service. In this case the cards are backed up and synchronized regularly, but no un/pw is involved.
    • In this scenario, usage of shared machines still demands an external device.

On Fri, Jul 24, 2009 at 9:37 PM, Paul Trevithick <ptrevithick@xxxxxxxxx> wrote:

I’m trying to understand your requirements. You wrote to me privately:

  • Most of the clients in this [your] project are windows XP based, and the login is done via browsers using un/pw. The computers are shared workstations with common windows account for all the students, making card portability a necessary demand
  • In order to avoid the usage of un/pw for card provisioning, it seems that the preferred solution will be to carry the cards on a physical device such as usb key or smart card. For security reasons the cards should not stay on the selector, but vanish when the external device (usb/smartcard) is plugged out.  

For Higgins 1.1 we are working on an Adobe AIR selector that uses a hosted I-Card Service. No cards are stored locally, so there is nothing to delete. Cards are stored on the server and fed to any selector that wants/needs them. Could that work?

Now it IS true that for this to work we require a “master” username/password to authenticate the user to the hosted service. Is this what you are trying to avoid in your second bullet above? It seems to me that an external device will cost more than running a hosted I-Card Service and some people think that the external devices themselves should be protected by a PIN etc. to prevent others from using them directly. And in this case both solutions require a password/PIN—so they are equally bad/good in that regard.