High Assurance AZ Token: Difference between revisions
Jump to navigation
Jump to search
Line 25: | Line 25: | ||
==References== | ==References== | ||
*[https://www.hl7.org/fhir/http.html#capabilities MetaData] or capabilities from FHIR - might not survive till next versions. | |||
*The [https://nhisac.org/ H-ISAC] Healthcare Information Sharing and Analysis Center provides a forum for coordinating, collaborating and sharing vital Physical and Cyber Threat Intelligence and best practices with each other. | |||
*[http://www.ihe.net/uploadedFiles/Documents/ITI/IHE_ITI_TF_Vol2a.pdf#nameddest=3_19_Authenticate_Node__ITI_19_ Authenticate Node] section 19 of (2018-07-24) IHE IT Infrastructure Technical Framework primarily relies on mutual authentication with no specific trust anchor other than X.509 certificate chains. | |||
*[https://wiki.idesg.org/wiki/index.php/Category:Health IDEF health wiki pages.] | |||
[[Category:Authentication]] | [[Category:Authentication]] | ||
[[Category:Assurance]] | [[Category:Assurance]] |
Revision as of 15:41, 5 March 2020
Full Title
Ensure the security of a stand-alone Token to provide high assurance of (1) Identity, (2) Authentication and (3) Federation in high volume, universally accessed web services.
Context
- The page is directed to the problem of providing high assurance identifier tokens that can be used for high volume use cases, such as health services.
- Existing standards for identifier tokens are based on the assurance of the trust of the Relying Party (aka client) in the tokens produced by the Identifier provider, typically on of the well-known social sites.
- To get high assurance identifiers, the web site that wants the higher level of assurance (whether RP or IDP) will perform additional validation of the user with protocols like FIDO Universal 2nd Factor (U2F) 1.x or Web Authentication (aka Fido 2.0).
- Pew charitable trust and MITRE have recommended the use of the Smart Phone as a source of patient identifiers in healthcare.
Problems
- The IdP needs to be trusted by the RP. That can be difficult to achieve when the RP has the high value resource that the user wants to access.
- The users are accustomed to using the "free" social media sites as an IDP that will be trusted by the RP.
- The liability associated with high assurance IDPs is not likely to be available on "free" social media sites.
- The assurance associated with out-of-band assurance, like web authentication has not been successful with the large number people that are expected to be using high assurance sites, like health services.
- While standards exist for cryptographic operations in software (FIPS 140 and common criteria) there is not similar controls on assuring the identity of users of software, especially on apps running on smart phones.
Problems with existing second factors
Proposed Solution
- Create a structure of a json identifier token that is:
- not dependant on the underlying transport media for any integrity.
- able to contain parts that come from different attestation authorities (i.e. that are signed by different keys).
- Enable users to create their own high assurance identifier tokens. (aka self-issued, or self-sovereign identifiers.)
- Enable federations to create their own specific measures of what factors are needed to meet their environment. They may choose whether to implement centralized, decentralized or distributed means for attesting to the assurance levels that they have specified.
- Create an infrastructure that can be implemented by federation authorities to certify that users have the ability to meet the high assurance requirements of NIST 800-63-3,
References
- MetaData or capabilities from FHIR - might not survive till next versions.
- The H-ISAC Healthcare Information Sharing and Analysis Center provides a forum for coordinating, collaborating and sharing vital Physical and Cyber Threat Intelligence and best practices with each other.
- Authenticate Node section 19 of (2018-07-24) IHE IT Infrastructure Technical Framework primarily relies on mutual authentication with no specific trust anchor other than X.509 certificate chains.
- IDEF health wiki pages.