Welcome!

Microservices Expo Authors: Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan, Yeshim Deniz

News Feed Item

OATH Releases First Reference Architecture for Open Authentication at Digital ID World

Initiative for Open AuTHentication (OATH) Meets Key Deliverable for New Industry Endorsed Reference Architecture for Open Authen

SAN FRANCISCO, May 10 /PRNewswire/ -- OATH, the initiative for Open AuTHentication, today announced that the organization has met one of its initial milestones with the release of version 1.0 of the OATH Reference Architecture. Availability of the Reference Architecture document, which provides the technical framework for open authentication as originally envisioned by OATH member companies, was announced by the organization at Digital ID World today in San Francisco.

The Reference Architecture provides a roadmap for OATH member companies and their authentication customers towards a comprehensive industry-endorsed solution. The architecture document covers four main areas: client framework, validation framework, client provisioning, and a common data model.

The key guiding principles behind the Reference Architecture include: -- Open and royalty-free specifications for strong authentication -- Device innovation and embedded specified technology building blocks for strong authentication -- Native platform support -- Interoperable modules that enable best-of-breed hardware and software solutions through a framework of interoperable components.

"The delivery of this new reference architecture document was on time and on target, said Bob Blakley, OATH Joint Coordination Committee (JCC) Chair and Chief Scientist (Security and Privacy), IBM. "This represents the first step towards our collective goal for developing strong authentication products and technologies based on open standards. This document also reflects the ability of OATH member companies to work together to promote the development of new industry-accepted standards for trusted security and authentication technologies. Our intent is to create an open reference architecture that will serve as a powerful mechanism to foster competition and innovation among key solution providers in identity management, security service providers, and application developers -- all towards a goal of universal strong authentication."

The Financial Services Technology Consortium (FSTC) welcomed the release of the first version of the OATH architecture.

"FSTC commends OATH on their efforts to drive open, interoperable, accessible, and secure authentication solutions into the marketplace said Zachary Tumin, Executive Director of FSTC. "The OATH initiative compliments our efforts to define industry-level business and operational requirements for stronger mutual authentication solutions in financial services and supports our primary mission to foster interoperability in the financial services industry."

"Authentication standards are one of the many technology security issues FSTC's members have been studying," said Jim Salters, Director of Technology Initiatives and Project Development at FSTC. "It's great to have another top- tier industry group like OATH supporting our collaborative efforts by focusing on one issue and taking it to the next level."

The Reference Architecture document's client framework section addresses topics of authentication methods, innovation in authentication tokens for multifunction purposes or mobile devices, token interfaces for one-time password tokens, and authentication protocols. The validation framework covers interfaces for protocol and validation handlers, and protocols used by applications to authenticate a user's credentials. OATH will develop a framework to let vendors develop standards-based provisioning protocols and evaluate the need to standardize on one or more provisioning protocols to target specific credential types. OATH will encourage the definition of standard user store extensions and OTP token meta-data to support open authentication.

The Reference Architecture document is free and available to interested organizations at http://www.openauthentication.org/reg.asp. Registration is required to access the document.

About the Initiative for Open AuTHentication

The Initiative for Open AuTHentication (OATH) is a collaboration of leading device, platform and application companies. OATH participants hope to foster use of strong authentication across networks, devices and applications. OATH participants work collectively to facilitate standards work and build a reference architecture for open authentication while evangelizing the benefits of strong interoperable authentication in a networked world. OATH is actively seeking all participants who share a common vision of open authentication.

OATH is dedicated to helping customers reduce the cost and complexity of deploying strong authentication within enterprises, and across the Internet. Since its formation, OATH's membership includes security industry leaders from token manufacturers, platform vendors, smartcard providers, and security services companies. End user companies are joining OATH to add their voice and ideas towards the goal of open authentication.

Some current OATH members include: ActivCard, Inc.; Aladdin Knowledge Systems; ARM; Assa Abloy ITG; AudioSmartCard; Authenex, Inc.; Aventail Corporation; Axalto, Inc.; BEA Systems; BMC Software; Checkpoint Software Technologies; Digital Persona; Diversinet Corp.; Entrust Technologies, Inc.; Forum Systems, Inc.; Gemplus Corp; IBM; IMCentric, Inc.; iovation; Juniper Networks, Inc.; K.K. Athena Smartcard Solutions; Livo Technologies SA; Passlogix, Inc.; Phoenix Technologies Ltd.; Protocom Development Systems, RedCannon Security, Inc.; SafeNet, Inc.; Signify; Smart Card Alliance; TriCipher, Inc.; VASCO Data Security; and VeriSign, Inc.

To learn how to participate, e-mail [email protected] or visit http://www.openauthentication.org/.

All company and product names are trademarks of their respective holders.

OATH

CONTACT: Dan Chmielewski, +1-949-231-2965 or
[email protected], or Joann Killeen, +1-310-476-6491 or
[email protected], both of Madison Alexander PR, Inc., for OATH

Web site: http://www.openauthentication.org/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Microservices Articles
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...