Title: Trusted Identity
1- Trusted Identity Access Management
- The Next Critical Step
2RSA Market Presence
Application Integration
Identity Provisioning
Access Management
Digital Signatures
Authentication
Encryption
Management
Information and Transactions
People and Devices
3RSA Authentication SolutionsHigh-Level
Differentiation
4Two-Factor User Authentication
PIN
5Building the Authentic User
- Authentication binds people to their digital
identities
- Authorization enables a digital identity access
to services according to policy
- Certificates bind digital identities to
transactions and provide data integrity
- Enablement of applications to securely process
real-world business rules is achieved via
Cryptography
6Time-based Token Authentication
2468
234836
PIN
TOKENCODE
7RSA SecurID Two-factor User Authentication
- Proven pervasive
- 12 million users in 8,000 companies
- 220 RSA SecurID-ready products from 100
partners - SecurID Express deployment service
- Scalable to 3000,000s of users
- Broad range of authenticators
- RSA SecurID and hybrid PKI
- RSA SecurID, Web Agent and SSLprovide secure
communication with no special client SW
8Tokens do a Simpler Job...
- Identification Authentication
- No client software required
- Very simple to use and deploy
9How Customers Use RSA SecurID
10RSA Smart Badging
CAC Approved
11Windows-based Application SSO 1st Time Access
12Introducing RSA Mobile
- Upon receiving a valid username and PIN, RSA
Mobile sends a one-time access code to the user's
portable device. - Two-factor authentication
- Leverages a device the user already has
- Zero-deployment, zero-footprint
- Intuitive, easy to use and highly portable
13How RSA Mobile works
Web Server
Agent
Start here
RSA Mobile Authentication Server
e-Mail Server or Gateway Server
Telco Network
Text Message
14User Authentication (IV)
15 Certificate Management
Solutions
- RSA Keon Web Server SSL
- Enabling cost-effective trusted server
authentication - RSA Secure e-Forms Signing
- Enables trusted transactions for streamlined
business processes - RSA Secure e-Mail
- Enables trusted messaging for streamlined
business processes - RSA Smart Badging
- Combining physical and logical access for an
enhanced ROI
16RSA Keon Web Server SSLSolution
- Solution components include
- RSA Keon CA
- RSA Keon Root Signing
- RSA Professional Services
- Functions
- Enables organizations to issue manage SSL
certificates - Alternative to service-based SSL model
- Business Benefits
- Improved total cost of ownership
- Rapid return on investment
- Accelerated deployment and ease of use
- Trusted foundation for deployment of secure
e-business
17RSA Secure e-Forms Signing Solution
- Solution components include
- RSA Keon CA
- RSA e-Sign Downloadable, zero-footprint applet
- RSA Keon Web Passport optional
- Functions
- Demonstrates intent
- Authenticates the signer
- Assures the integrity of signed data
- Supports non-repudiation
- Benefits
- Prevents breakage in e-business processes
- Enhanced e-based revenue opportunities
- Support for legislative compliance
18RSA Secure e-Mail Architecture
e-Mail Client
RSA Keon CA with OneStep
e-Mail configuration script publishes certificate
information into Microsoft Global Address List
G.A.L.
19Agenda
- Identity Management
- Define the term
- Explore the value
- The evolution
- RSA Securitys role in Identity Management
- Trusted Identity and Access Management
- The Liberty Alliance project
- Summary
20Lets Define the Term
- Identity management is a process, rather than a
function, inclusive of provisioning new users,
executing the work flows needed to grant access,
and managing application use. - identity management needs to focus on the
users entire security lifecycle.
AMR Research June 2002
To succeed, it must also infuse TRUST.
21Trusted IdentitiesCoupling Identity and Access
Management
- An un-trusted identity wont be of use to anyone
- How do you establish a trusted identity?
- Authentication
- Identity and access privileges are tightly
coupled - Who I am and what I can do
- Separate but related
- The line between authentication, proof of
identity, and access management begins to blur
22Wheres the Real Value?
Interoperability Applications, Networks
Establishing Trust in Identity
Enforcing Business Policy
Automating Account Creation Termination
Storage Retrieval
23Trusted Identity Access ManagementRSA
Securitys View
- What it is
- Intelligent use of identity
- Ability to securely manage the full lifecycle of
an on-line or digital identity - What it is not
- Its not simply the ability to store or provision
digital identities
24Trusted Identity Access Management Benefits
- Enables cross-domain relationships
- Improved user experience
- Enables interoperability
- Reduced management costs
- Better policy enforcement / improved security
25Putting the Value into PerspectiveAn Analogy
An ERP installation requires the SAP software
and an underlying database engine like Oracle.
Both are required.Which one provides the most
business value to the organization?
26Trusted Identity Access Management The
Evolution
Outward-facing e-Commerce
Value Delivered
Partner Community
Within the Enterprise
Adoption Timeline
27Liberty Alliance Membership Partial List
www.projectliberty.org
28RSA Security and Standards for Identity
Management
- Liberty Alliance
- SAML
- .Net (Microsoft)
- Web Services
RSA Security will bridge Identity Management
platforms by providing higher level security and
integration across multiple, heterogeneous
environments.
29Summary
- Identity management is a process
- Value is in establishing trust in identity and
enforcing business policy - Trusted Identity Access Management is the
intelligent use of identity and the ability to
securely manage the full lifecycle of an on-line
or digital identity - RSA Security is uniquely positioned to provide
Trusted Identity and Access Management solutions - RSA Security will bridge all Identity Management
platforms by providing higher level security and
integration across multiple, heterogeneous
environments
30The Most Trusted Name in e-Security
Christopher May A Technology Solutions,
Inc. Phone 877-797-6197, ext. 2238
www.rsasecurity.com