assurance - RE: [Assurance] silver, 2-factor, password requirements
Subject: Assurance
List archive
- From: "Jones, Mark B" <>
- To: "" <>
- Subject: RE: [Assurance] silver, 2-factor, password requirements
- Date: Fri, 30 Nov 2012 11:43:00 -0600
- Accept-language: en-US
- Acceptlanguage: en-US
I feel that the issue is that the technical authentication mechanism is getting all of the attention while the procedure associated with the issuance of the credential is getting marginalized. There seems to be a lot of push back to the registration and credential issuance controls that are outlined in NIST 800-63. The risk assessment done for the Federation Manager seems to suggest that LoA 3 is called for yet there seems to be reluctance to state that. Based on Tom Barton’s comments I think there may be a way to argue that member organizations are delegated the responsibility for identity proofing. But instead of trying build an argument for how current practice might satisfy NIST LoA 3 there is an effort to define a profile that does not align with any of the NIST assurance levels. I find it confusing to go through the risk analysis which would appear to have an end goal of identifying an OMB assurance level that is appropriate, and then try to define an assurance profile that does not resemble any of the defined levels. If the goal is to justify the chosen assurance level by means of the risk assessment doesn’t the level chosen have to map to one of the defined levels? From: [mailto:] On Behalf Of Dennis Skovsted I have been listening to the discussion and I am wondering if the challenge being encountered, related to fact that leadership has not yet provided clear enough definition on the goals for silver related to identity proofing and identity authenication in the context of a 4 level federation model (i.e, Bronze to Platinum). It sounds to me like the question for leadership may be, if one is using a two factor solution and one has very good controls for the token factor and marginal controls of the password factor, is that acceptable for Silver? Or another way of stating the question, does one only need good contol of both factors when one gets to Gold or Platinum? Dennis Skovsted On Wed, Nov 28, 2012 at 10:16 PM, Jones, Mark B <> wrote: I don't think that the LoA of an authentication credential implies anything beyond the credential provider's confidence that the owner of the credential is the entity that is controlling and presenting the credential. The reliability of attributes is utterly separate. Just because a credential provider knows who they have credentialed does not mean that they are obligated to release the identity data collected when registering the user. |
- RE: [Assurance] silver, 2-factor, password requirements, (continued)
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/29/2012
- Re: [Assurance] silver, 2-factor, password requirements, Michael R. Gettes, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Farmer, Jacob, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Tom Barton, 11/30/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Cantor, Scott, 11/30/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Dennis Skovsted, 11/30/2012
- RE: [Assurance] silver, 2-factor, password requirements, Jones, Mark B, 11/30/2012
- Re: [Assurance] silver, 2-factor, password requirements, Tom Scavo, 11/29/2012
- RE: [Assurance] silver, 2-factor, password requirements, Dunker, Mary, 11/30/2012
Archive powered by MHonArc 2.6.16.