OATH Reference Architecture, Release 2.0 Initiative for Open Authentication (OATH)

OATH Reference Architecture, Release 2.0 Initiative for Open Authentication (OATH)

OATH Reference Architecture, Release 2.0 Initiative for Open AuTHentication (OATH) The Initiative for Open AuTHentication (OATH) welcomes input, suggestions, and other feedback on this work from as broad a range of industry participants as possible, in order to improve its quality. Feedback should be sent to [email protected]. If you are interested in getting more information about OATH or joining OATH, please contact [email protected] or visit http://www.openauthentication.org. Copyright(c) 2004-2007, Initiative for Open AuTHentication. All Rights Reserved. OATH Reference Architecture, Release 2.0 1 OATH Reference Architecture, Release 2.0 2 CONTENTS 1. Executive Summary................................................................................................................ 5 2. Abbreviations.......................................................................................................................... 6 3. OATH Vision and Goals......................................................................................................... 8 4. Usage Scenarios.................................................................................................................... 10 4.1. Remote Access.............................................................................................................. 10 4.2. Online Banking ............................................................................................................. 10 4.3. Telecommuting ............................................................................................................. 10 4.4. Client and Business Partner Extranet............................................................................ 11 4.5. eGovernment................................................................................................................. 11 4.6. 24x7 IT Infrastructure Support ..................................................................................... 11 4.7. Wireless Roaming......................................................................................................... 11 4.8. Desktop Logon.............................................................................................................. 11 4.9. Closed network ............................................................................................................. 12 5. Authentication Framework ................................................................................................... 13 5.1. Client Framework ......................................................................................................... 13 5.2. Provisioning and Management Framework.................................................................. 13 5.3. Validation Framework .................................................................................................. 14 5.4. Applications .................................................................................................................. 14 5.5. Authorization ................................................................................................................ 14 5.6. User Store...................................................................................................................... 14 5.7. Policy Store................................................................................................................... 14 5.8. Audit Store.................................................................................................................... 14 5.9. Authentication and Identity Sharing ............................................................................. 14 5.10. Risk evaluation and sharing...................................................................................... 15 6. OATH Reference Architecture ............................................................................................. 16 6.1. Client Framework ......................................................................................................... 16 6.1.1. High-Level Architecture ....................................................................................... 16 6.1.2. Salient Features..................................................................................................... 17 6.1.3. Authentication Methods........................................................................................ 18 6.1.4. Authentication Tokens.......................................................................................... 19 6.1.5. Token Interface ..................................................................................................... 20 6.1.6. Authentication Protocols....................................................................................... 21 6.2. Validation Framework .................................................................................................. 22 6.2.1. High-Level Architecture ....................................................................................... 22 6.2.2. Salient Features..................................................................................................... 24 6.2.3. Existing Standards and Technologies ................................................................... 25 6.2.4. OATH Focus Areas............................................................................................... 26 6.3. Risk evaluation and sharing framework ....................................................................... 26 6.3.1. High-level architecture.......................................................................................... 26 6.3.2. Salient features...................................................................................................... 27 6.3.3. Existing Standards and Technologies ................................................................... 28 6.3.4. OATH Focus Areas............................................................................................... 28 6.4. Provisioning and Management Framework.................................................................. 28 6.4.1. High-Level Architecture ....................................................................................... 29 OATH Reference Architecture, Release 2.0 3 6.4.2. Salient Features..................................................................................................... 30 6.4.3. Existing Standards and Technologies ................................................................... 31 6.4.4. OATH Focus Areas............................................................................................... 32 6.5. Common Data Model.................................................................................................... 33 6.5.1. Existing Standards and Technologies ................................................................... 33 6.5.2. OATH Focus Areas............................................................................................... 34 6.6. Authentication and Identity Sharing ............................................................................. 34 6.6.1. Authentication Sharing ......................................................................................... 35 6.6.2. Identity Sharing..................................................................................................... 38 6.6.3. Traditional Federated Identity............................................................................... 38 6.6.4. User-centric Identity Sharing................................................................................ 39 6.6.5. OATH Focus Areas............................................................................................... 40 7. Example Deployment Scenario............................................................................................. 41 8. Summary of OATH Focus Areas.......................................................................................... 44 9. References............................................................................................................................. 46 10. Contributing members ...................................................................................................... 49 OATH Reference Architecture, Release 2.0 4 1. Executive Summary This document specifies version 2.0 of the reference architecture for the Initiative for Open AuTHentication (OATH). The OATH Reference Architecture document describes a high-level technical framework for open authentication, as envisioned by the OATH member companies. The reference architecture is intended to explain OATH’s vision for authentication, as well as to provide a high-level technical roadmap for its work. The intended audience includes decision makers and technical architects from OATH member and nonmember companies, IT managers and architects from organizations that are considering deploying strong authentication solutions, and other standards organizations that share all, or part, of the OATH vision. The work has been driven by the following guiding principles: • Open and royalty-free specification - OATH intends to establish an open and royalty-free specification for strong authentication by leveraging existing open standards, where possible, and leading standardization efforts in well-established technical standards bodies where existing standards are not available. • Device innovation and embedding - OATH intends to specify components for low-cost, multi- function authentication devices (e.g.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    50 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us