FB pixel

ID federation and continuous authentication schemes have their fans and challenges

ID federation and continuous authentication schemes have their fans and challenges
 

A panel discussion aimed at U.S. federal agencies regarding digital ID and authentication management this week took looks at federation and continuous authentication. Both options are liked but both have challenges.

One Advanced Technology Research Center panelist, Matt Topper, president of ID and access-management vendor Uberether, reportedly was exciting about the prospect that the National Institute of Standards and Technology will publish guidance on federation itself.

A fan of how federated schemes can provide security, Topper said, standards will enable authentication among agencies as well as between bureaucrats, contractors and citizens, according to reporting by trade publication Nextgov.

The challenge will be sorting out all the credentials that long-term contractors gather.

Like barnacles on ships, businesses who win multiple contracts – and do so on projects over the years – end up with a lot of access rights. Barnacles, however, will not render a ship dead in the water, prey for bad actors or bad weather.

A growing hodgepodge of IAM certifications that are not examined at the end of a project presents a very real threat. The Nextgov article points out that the infamous SolarWinds attack was able to move horizontally through organizations, a tactic that could be made less dangerous through a federated identity approach.

And a thorough understanding of who has what security certification and knowing who owns that certification.

The National Institute of Standards and Technology is planning to publish updated guidance on identity and access management that addresses federation, and the Cybersecurity and Infrastructure Security Agency has guidance coming soon.

Another view on the same event, from trade publication GovCIO, quotes a government IT officials saying continuous authentication as a category is evolving well. Gerald Caron is the chief information officer within the federal Health and Human Service Department’s office of inspector general.

The problem is that it is difficult to deliver continuous authentication, particularly in hybrid workplaces. It is typically carried out with behavioral or physical biometrics.

Caron says derived credentials attached to a mobile device, for instance, are only as good as the schedule on which they are interrogated. The longer a device sits not directly monitored, the more likely that it will be used as a tool to access apps and data it sought by the cybercriminal at the device.

Hardware and software changes can make it so common access or personal ID verification cards can re-authenticate users, but that is going to be a hard sell in constrained budgets and even moreso if it means changing personal equipment.

Article Topics

 |   |   |   |   |   |   |   | 

Latest Biometrics News

 

Canada regulator backs privacy-preserving age assurance

The Office of the Privacy Commissioner of Canada (OPC) has published a policy note and guidance documents pertaining to age…

 

FCC seeks comment on KYC revision for commercial phone calls

The U.S. Federal Communications Commission (FCC) has proposed stronger KYC requirements for voice service providers to prevent scams and illegal…

 

Deepfake detection upgrade for Sumsub highlights continuous self-improvement

Sumsub has launched an upgrade to its deepfake detection product with instant online self-learning updates to address rapidly evolving fraud…

 

Metalenz debuts under-display camera for payment-grade face authentication

Unlocking a smartphone with your face used to require a camera placed in a notch or a punch hole in…

 

UK regulators pan patchwork policy for law enforcement facial recognition

The UK’s two Biometrics Commissioners shared cautionary observations about the use of facial recognition in law enforcement over the weekend…

 

IDV spending to hit $29B by 2030 as DPI projects scale: Juniper Research

Spending on digital identity verification (IDV) technology is projected to reach a 55 percent growth rate between now and 2030,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events