Skip to content

Latest commit

 

History

History
309 lines (247 loc) · 19.4 KB

sec1_2_introduction.md

File metadata and controls

309 lines (247 loc) · 19.4 KB

1. Purpose

This recommendation and its companion documents, SP 800-63A, SP 800-63B, and SP 800-63C, provide technical guidelines to agencies for the implementation of digital authentication.

2. Introduction

Digital authentication is the process of establishing confidence in user identities presented to an information system. Digital authentication presents a technical challenge when this process involves the remote authentication of individual people over a network. This recommendation provides technical guidelines to agencies to allow an individual person to remotely authenticate his/her identity to a Federal Information Technology (IT) system. This recommendation also provides guidelines for credential service providers (CSPs), verifiers, and relying parties (RPs).

Current government systems do not separate the functions of authentication and attribute providers. However, in some applications, these functions are provided by different parties. This document suite describes authenticator assurance and identity assurance as separate metrics, and provides a mapping between these metrics and overall level of assurance. These technical guidelines supplement OMB guidance, E-Authentication Guidance for Federal Agencies [OMB M-04-04] and supersede NIST SP 800-63-1 and SP 800-63-2. OMB M-04-04 defines four levels of assurance, Levels 1 to 4, in terms of the consequences of authentication errors and misuse of credentials. Level 1 is the lowest assurance level and Level 4 is the highest. The guidance defines the required level of identity assurance in terms of the likely consequences of an authentication error. As the consequences of an authentication error become more serious, the required level of assurance increases. The OMB guidance provides agencies with criteria for determining the level of assurance required for specific digital transactions and systems, based on the risks and their likelihood of occurrence.

SP 800-63 is organized as a family of documents as follows:

  • SP 800-63A Enrollment and Identity Proofing - Deals with the processes by which a credential, and authenticator(s) associated with that credential can be bound to a specific individual. This typically happens when that individual is enrolled in an identity system, through the identity proofing process.

  • SP 800-63B Authentication and Lifecycle Management - provides guidance on the selection, use, and management of authenticators (formerly called tokens) to authenticate a remote subscriber to an identity system at specified authenticator assurance levels.

  • SP 800-63C Federation and Assertions - Provides guidance on the use of assertions to convey the results of authentication processes to a relying party.

It is anticipated that SP 800-63A, SP 800-63B, and SP 800-63C will be revised asynchronously with each other and with this document. The latest revision of each should be used for guidance.

OMB guidance outlines a five-step process by which agencies should meet their authentication assurance requirements:

  1. Conduct a risk assessment of the government system – No specific risk assessment methodology is prescribed for this purpose; however, NIST Special Publication (SP) 800-30 [SP 800-30] offers a general process for risk assessment and risk mitigation.

  2. Map identified risks to the appropriate assurance level – Section 2.2 of OMB M-04-04 provides the guidance necessary for agencies to perform this mapping.

  3. Select technology based on digital authentication technical guidance – After the appropriate assurance level has been determined, OMB guidance states that agencies should select technologies that meet the corresponding technical requirements, as specified by this document suite. Some agencies may possess existing digital authentication technology. Agencies should verify that any existing technology meets the requirements specified in this document suite.

  4. Validate that the implemented system has met the required assurance level – As some implementations may create or compound particular risks, agencies should conduct a final validation to confirm that the system achieves the required assurance level for the user-to-agency process. NIST SP 800-53A [SP 800-53A] provides guidelines for the assessment of the implemented system during the validation process. Validation should be performed as part of a security authorization process as described in NIST SP 800-37, Revision 1 [SP 800-37].

  5. Periodically reassess the information system to determine technology refresh requirements – The agency shall periodically reassess the information system to ensure that the identity authentication requirements continue to be satisfied. NIST SP 800-37, Revision 1 [SP 800-37] provides guidelines on the frequency, depth and breadth of periodic reassessments. As with the initial validation process, agencies should follow the assessment guidelines specified in SP 800-53A [SP 800-53A] for conducting the security assessment.

This family of documents provides guidelines for implementing the third step of the above process. In particular, this document maps the four (4) Levels of Assurance defined in OMB M-04-04 into corresponding authenticator assurance and identity assurance levels. Other documents in the family state specific technical requirements for identity assurance and authenticator assurance in the following areas:

  • Identity proofing and registration of applicants (covered in SP 800-63A)

  • Credential lifecycle and management mechanisms (covered in SP 800-63A)

  • Authenticators (typically a cryptographic key or password) for authentication (covered in SP 800-63B)

  • Authenticator lifecycle and management mechanisms (covered in SP 800-63B)

  • Protocols used to support the authentication mechanism between the claimant and the verifier (covered in SP 800-63B)

  • Assertion mechanisms used to communicate the results of a remote authentication if these results are sent to other parties (covered in SP 800-63C).

The overall authentication assurance level is determined by the lowest identity assurance and authenticator assurance level achieved in any of the areas listed above, and then by mapping the result to the corresponding Level of Assurance.

Agencies may adjust the level of assurance using additional risk mitigation measures. Easing credential assurance level requirements may increase the size of the enabled customer pool, but agencies shall ensure that this does not corrupt the system’s choice of the appropriate assurance level. Alternatively, agencies may consider partitioning the functionality of an digital authentication enabled application to allow less sensitive functions to be available at a lower level of authentication and attribute assurance, while more sensitive functions are available only at a higher level of assurance.

These technical guidelines cover remote digital authentication of human users to IT systems over a network. They do not address the authentication of a person who is physically present, for example, for access to buildings, although some credentials and authenticators that are used remotely may also be used for local authentication. These technical guidelines establish requirements that Federal IT systems and service providers participating in authentication protocols be authenticated to subscribers. However, these guidelines do not specifically address machine-to-machine (such as router-to-router) authentication, or establish specific requirements for issuing authentication credentials and authenticators to machines and servers when they are used in authentication protocols with people.

The paradigm of this document suite is that individuals are enrolled, issued an authenticator, and undergo a registration process in which their identity is bound to that authenticator. Thereafter, the individuals are remotely authenticated to systems and applications over a network, using the authenticator in an authentication protocol. The authentication protocol allows an individual to demonstrate to a Verifier that he or she has possession and control of the authenticator, in a manner that protects the authenticator secret from compromise by different kinds of attacks. Higher authenticator assurance levels require use of stronger authenticators, better protection of the authenticator(s) and related secrets from attacks. Higher identity assurance levels require stronger registration procedures.

This document suite focuses on authenticators that are difficult to forge because they contain some type of secret information that is not available to unauthorized parties and that is preferably not used in unrelated contexts. Certain authentication technologies, particularly biometrics and knowledge based authentication, use information that is private rather than secret. While they are discussed to a limited degree, they are largely avoided because their security is often weak or difficult to quantify, especially in the remote situations that are the primary scope of this document suite.

Knowledge based authentication achieves authentication by testing the personal knowledge of the individual against information obtained from public databases. As this information is considered private but not actually secret, confidence in the identity of an individual can be hard to achieve. In addition, the complexity and interdependencies of knowledge based authentication systems are difficult to quantify. However, knowledge based verification techniques are included as part of registration in this document suite.

Biometric characteristics do not constitute secrets suitable for use in the conventional remote authentication protocols addressed in this document suite either. In the local authentication case (which is outside the scope of this document suite), where the claimant is observed by an attendant and uses a capture device controlled by the Verifier, authentication does not require that biometrics be kept secret. This document suite supports the use of biometrics to “unlock” multifactor authentication authenticators, to prevent repudiation of registration, and to verify that the same individual participates in all phases of the registration process.

This document suite identifies minimum technical requirements for remotely authenticating users. Agencies may determine based on their risk analysis that additional measures are appropriate in certain contexts. In particular, privacy requirements and legal risks may lead agencies to determine that additional authentication measures or other process safeguards are appropriate. When developing digital authentication processes and systems, agencies should consult OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002 [OMB M-03-22]. See the Guide to Federal Agencies on Implementing Electronic Processes [DOJ 2000] for additional information on legal risks, especially those that are related to the need to satisfy legal standards of proof and prevent repudiation, as well as Use of Electronic Signatures in Federal Organization Transactions [GSA ESIG].

Additionally, Federal agencies implementing these guidelines should adhere to the requirements of Title III of the E-Government Act, entitled the Federal Information Security Management Act [FISMA], and the related NIST standards and guidelines. FISMA directs Federal agencies to develop, document, and implement agency-wide programs to provide information security for the information and information systems that support the operations and assets of the agency. This includes the security authorization of IT systems that digital authentication. It is recommended that non-Federal entities implementing these guidelines follow equivalent standards of security management, certification and accreditation to ensure the secure operations of their digital systems.

2.1. How to Use this Suite of Special Publications

The business model, marketplace, and the composition of the way identity services are delivered has drastically changed since initial versions of Special Publication 800-63 were released. Notably, CSPs can be componentized and composed of multiple independently operated and owned business entities. In addition, there is a significant benefit to provide strong authenticators even if no identity proofing is required. Therefore, a suite of special publications under the 800-63 moniker has been created to facilitate these new models and make it easy to access the specific requirements for the function an entity may serve under the overall digital authentication model. Each document stands alone. However, it is expected that all CSPs, even componentized, will be required to meet the guidelines in SP 800-63A and SP 800-63B. If the CSP also participates in an identity federation, which is preferred over a standalone CSP, meeting the requirements of SP 800-63C will apply.

2.2. Relationship to Other Standards and Guidelines

This document has been written to satisfy the needs of federal agencies. However, with the expansion of citizen services throughout the world that require identity and authenticaiotn assurance, as well as an increasing number of use cases that promote international identity federation and interoperability, it is intended to achieve alignment to national and international standards that describe levels of identity assurance. This is not meant to imply that there is direct correlation between the IALs and AALs in this document and the levels in those standards, but that it is seen that this document fulfils the criteria as demonstrated in those standards.

SP 800-63 [GPG 45] [RSDOPS] STORK 2.0 29115:2011 ISO 29003 Government of Canada
N/A N/A Level 01 N/A N/A N/A N/A
AAL/IAL 1 Level 1 Level 1 QAA Level 1 LoA 1 LoA 1 IAL/CAL 1
AAL/IAL 1 Level 2 Level 2 QAA Level 2 LoA 2 LoA 2 IAL/CAL 2
AAL/IAL 2 Level 3 Level 3 QAA Level 3 LoA 3 LoA 3 IAL/CAL 3
AAL/IAL 3 Level 4 N/A2 QAA Level 4 LoA 4 LoA 4 IAL/CAL 4

2.2. Change History

2.2.1. SP 800-63-1

NIST SP 800-63-1 updated NIST SP 800-63 to reflect current authenticator (then referred to as token) technologies and restructured to provide a better understanding of the digital authentication architectural model used here. Additional (minimum) technical requirements were specified for the CSP, protocols utilized to transport authentication information, and assertions if implemented within the digital authentication model. Other changes to NIST SP 800-63 included:

  • Recognition of more types of tokens, including pre-registered knowledge token, look-up secret token, out-of-band token, as well as some terminology changes for more conventional token types;

  • Detailed requirements for assertion protocols and Kerberos;

  • A new section on token and credential management;

  • Simplification of guidelines for password entropy and throttling;

  • Emphasis that the document is aimed at Federal IT systems;

  • Recognition of different models, including a broader digital authentication model (in contrast to the simpler model common among Federal IT systems shown in Figure 1) and an additional assertion model, the Proxy Model, presented in Figure 6;

  • Clarification of differences between Levels 3 and 4 in Table 12; and

  • New guidelines that permit leveraging existing credentials to issue derived credentials.

The subsequent sections of NIST SP 800-63-1 presented a series of recommendations for the secure implementation of RAs, CSPs, Verifiers, and RPs. It should be noted that secure implementation of any one of these can only provide the desired level of assurance if the others are also implemented securely. Therefore, the following assumptions were made in NIST SP 800-63-1:

  • RAs, CSPs, and Verifiers are trusted entities. Agencies implementing any of the above trusted entities have some assurance that all other trusted entities with which the agency interacts are also implemented appropriately for the desired security level.

  • The RP is not considered a trusted entity. However, in some authentication systems the Verifier maintains a relationship with the RP to facilitate secure communications and may employ security controls which only attain their full value when the RP acts responsibly. The subscriber also trusts the RP to properly perform the requested service and to follow all relevant privacy policy.

  • It is assumed that there exists a process of certification through which agencies can obtain the above assurance for trusted entities which they do not implement themselves.

  • A trusted entity is considered to be implemented appropriately if it complies with the recommendations in this document and does not behave maliciously.

  • While it is generally assumed that trusted entities will not behave maliciously, this document does contain some recommendations to reduce and isolate any damage done by a malicious or negligent trusted entity.

2.2.2. SP 800-63-2

NIST SP 800-63-2 was a limited update of Special Publication 800-63-1 and substantive changes were made only in section 5. Registration and Issuance Processes. The substantive changes in the revised draft were intended to facilitate the use of professional credentials in the identity proofing process, and to reduce the need to use postal mail to an address of record to issue credentials for level 3 remote registration. Other changes to section 5 were minor explanations and clarifications.

2.2.3. SP 800-63-3

NIST SP 800-63-3 is a substantial update and restructuring of Special Publication 800-63-2. It introduces the concepts of authenticator assurance level and identity assurance level to support the growing need for independent treatment of authentication strength and confidence in the claimant's identity (for example, in strong pseudonymous authentication). It also moves from a single document describing authentication to a family of four documents, of which SP 800-63-3 is the top-level document.

Other areas of update to SP 800-63-2 include:

  • Terminology changes, primarily the use of authenticator in place of token to avoid conflicting use of the word token in assertion technologies
  • Updates to authentication and assertion requirements to reflect advances in both security technology and threats
  • Requirements on the storage of long-term secrets by verifiers
  • Restructured identity proofing model
  • Updated requirements regarding remote identity proofing
  • Clarification on the use of independent channels and devices as “something you have”
  • Removal of pre-registered knowledge tokens (authenticators), with the recognition that they are special cases of (often very weak) passwords.
  • Requirements regarding account recovery in the event of loss or theft of an authenticator
  • Expanded discussion of reauthentication and session management
  • Expanded discussion of identity federation; restructuring of assertions in the context of federation