Welcome!

Microservices Expo Authors: Stackify Blog, Automic Blog, Simon Hill, Pat Romanski, Liz McMillan

News Feed Item

OATH Releases First Reference Architecture for Open Authentication at Digital ID World

Initiative for Open AuTHentication (OATH) Meets Key Deliverable for New Industry Endorsed Reference Architecture for Open Authen

SAN FRANCISCO, May 10 /PRNewswire/ -- OATH, the initiative for Open AuTHentication, today announced that the organization has met one of its initial milestones with the release of version 1.0 of the OATH Reference Architecture. Availability of the Reference Architecture document, which provides the technical framework for open authentication as originally envisioned by OATH member companies, was announced by the organization at Digital ID World today in San Francisco.

The Reference Architecture provides a roadmap for OATH member companies and their authentication customers towards a comprehensive industry-endorsed solution. The architecture document covers four main areas: client framework, validation framework, client provisioning, and a common data model.

The key guiding principles behind the Reference Architecture include: -- Open and royalty-free specifications for strong authentication -- Device innovation and embedded specified technology building blocks for strong authentication -- Native platform support -- Interoperable modules that enable best-of-breed hardware and software solutions through a framework of interoperable components.

"The delivery of this new reference architecture document was on time and on target, said Bob Blakley, OATH Joint Coordination Committee (JCC) Chair and Chief Scientist (Security and Privacy), IBM. "This represents the first step towards our collective goal for developing strong authentication products and technologies based on open standards. This document also reflects the ability of OATH member companies to work together to promote the development of new industry-accepted standards for trusted security and authentication technologies. Our intent is to create an open reference architecture that will serve as a powerful mechanism to foster competition and innovation among key solution providers in identity management, security service providers, and application developers -- all towards a goal of universal strong authentication."

The Financial Services Technology Consortium (FSTC) welcomed the release of the first version of the OATH architecture.

"FSTC commends OATH on their efforts to drive open, interoperable, accessible, and secure authentication solutions into the marketplace said Zachary Tumin, Executive Director of FSTC. "The OATH initiative compliments our efforts to define industry-level business and operational requirements for stronger mutual authentication solutions in financial services and supports our primary mission to foster interoperability in the financial services industry."

"Authentication standards are one of the many technology security issues FSTC's members have been studying," said Jim Salters, Director of Technology Initiatives and Project Development at FSTC. "It's great to have another top- tier industry group like OATH supporting our collaborative efforts by focusing on one issue and taking it to the next level."

The Reference Architecture document's client framework section addresses topics of authentication methods, innovation in authentication tokens for multifunction purposes or mobile devices, token interfaces for one-time password tokens, and authentication protocols. The validation framework covers interfaces for protocol and validation handlers, and protocols used by applications to authenticate a user's credentials. OATH will develop a framework to let vendors develop standards-based provisioning protocols and evaluate the need to standardize on one or more provisioning protocols to target specific credential types. OATH will encourage the definition of standard user store extensions and OTP token meta-data to support open authentication.

The Reference Architecture document is free and available to interested organizations at http://www.openauthentication.org/reg.asp. Registration is required to access the document.

About the Initiative for Open AuTHentication

The Initiative for Open AuTHentication (OATH) is a collaboration of leading device, platform and application companies. OATH participants hope to foster use of strong authentication across networks, devices and applications. OATH participants work collectively to facilitate standards work and build a reference architecture for open authentication while evangelizing the benefits of strong interoperable authentication in a networked world. OATH is actively seeking all participants who share a common vision of open authentication.

OATH is dedicated to helping customers reduce the cost and complexity of deploying strong authentication within enterprises, and across the Internet. Since its formation, OATH's membership includes security industry leaders from token manufacturers, platform vendors, smartcard providers, and security services companies. End user companies are joining OATH to add their voice and ideas towards the goal of open authentication.

Some current OATH members include: ActivCard, Inc.; Aladdin Knowledge Systems; ARM; Assa Abloy ITG; AudioSmartCard; Authenex, Inc.; Aventail Corporation; Axalto, Inc.; BEA Systems; BMC Software; Checkpoint Software Technologies; Digital Persona; Diversinet Corp.; Entrust Technologies, Inc.; Forum Systems, Inc.; Gemplus Corp; IBM; IMCentric, Inc.; iovation; Juniper Networks, Inc.; K.K. Athena Smartcard Solutions; Livo Technologies SA; Passlogix, Inc.; Phoenix Technologies Ltd.; Protocom Development Systems, RedCannon Security, Inc.; SafeNet, Inc.; Signify; Smart Card Alliance; TriCipher, Inc.; VASCO Data Security; and VeriSign, Inc.

To learn how to participate, e-mail [email protected] or visit http://www.openauthentication.org/.

All company and product names are trademarks of their respective holders.

OATH

CONTACT: Dan Chmielewski, +1-949-231-2965 or
[email protected], or Joann Killeen, +1-310-476-6491 or
[email protected], both of Madison Alexander PR, Inc., for OATH

Web site: http://www.openauthentication.org/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@MicroservicesExpo Stories
DevOps teams have more on their plate than ever. As infrastructure needs grow, so does the time required to ensure that everything's running smoothly. This makes automation crucial - especially in the server and network monitoring world. Server monitoring tools can save teams time by automating server management and providing real-time performance updates. As budgets reset for the New Year, there is no better time to implement a new server monitoring tool (or re-evaluate your current solution)....
The benefits of automation are well documented; it increases productivity, cuts cost and minimizes errors. It eliminates repetitive manual tasks, freeing us up to be more innovative. By that logic, surely, we should automate everything possible, right? So, is attempting to automate everything a sensible - even feasible - goal? In a word: no. Consider this your short guide as to what to automate and what not to automate.
Cavirin Systems has just announced C2, a SaaS offering designed to bring continuous security assessment and remediation to hybrid environments, containers, and data centers. Cavirin C2 is deployed within Amazon Web Services (AWS) and features a flexible licensing model for easy scalability and clear pay-as-you-go pricing. Although native to AWS, it also supports assessment and remediation of virtual or container instances within Microsoft Azure, Google Cloud Platform (GCP), or on-premise. By dr...
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, discussed how by using ne...
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
The cloud revolution in enterprises has very clearly crossed the phase of proof-of-concepts into a truly mainstream adoption. One of most popular enterprise-wide initiatives currently going on are “cloud migration” programs of some kind or another. Finding business value for these programs is not hard to fathom – they include hyperelasticity in infrastructure consumption, subscription based models, and agility derived from rapid speed of deployment of applications. These factors will continue to...
While we understand Agile as a means to accelerate innovation, manage uncertainty and cope with ambiguity, many are inclined to think that it conflicts with the objectives of traditional engineering projects, such as building a highway, skyscraper or power plant. These are plan-driven and predictive projects that seek to avoid any uncertainty. This type of thinking, however, is short-sighted. Agile approaches are valuable in controlling uncertainty because they constrain the complexity that ste...
Digital transformation has changed the way users interact with the world, and the traditional healthcare experience no longer meets rising consumer expectations. Enterprise Health Clouds (EHCs) are designed to easily and securely deliver the smart and engaging digital health experience that patients expect today, while ensuring the compliance and data integration that care providers require. Jikku Venkat
identify the sources of event storms and performance anomalies will require automated, real-time root-cause analysis. I think Enterprise Management Associates said it well: “The data and metrics collected at instrumentation points across the application ecosystem are essential to performance monitoring and root cause analysis. However, analytics capable of transforming data and metrics into an application-focused report or dashboards are what separates actual application monitoring from relat...
"This all sounds great. But it's just not realistic." This is what a group of five senior IT executives told me during a workshop I held not long ago. We were working through an exercise on the organizational characteristics necessary to successfully execute a digital transformation, and the group was doing their ‘readout.' The executives loved everything we discussed and agreed that if such an environment existed, it would make transformation much easier. They just didn't believe it was reali...
"Codigm is based on the cloud and we are here to explore marketing opportunities in America. Our mission is to make an ecosystem of the SW environment that anyone can understand, learn, teach, and develop the SW on the cloud," explained Sung Tae Ryu, CEO of Codigm, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We're developing a software that is based on the cloud environment and we are providing those services to corporations and the general public," explained Seungmin Kim, CEO/CTO of SM Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Many enterprise and government IT organizations are realizing the benefits of cloud computing by extending IT delivery and management processes across private and public cloud services. But they are often challenged with balancing the need for centralized cloud governance without stifling user-driven innovation. This strategy requires an approach that fundamentally reshapes how IT is delivered today, shifting the focus from infrastructure to services aggregation, and mixing and matching the bes...
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketing and Strategy at CA Technologies, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps promotes continuous improvement through a culture of collaboration. But in real terms, how do you: Integrate activities across diverse teams and services? Make objective decisions with system-wide visibility? Use feedback loops to enable learning and improvement? With technology insights and real-world examples, in his general session at @DevOpsSummit, at 21st Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, explored how leading organizations use data-driven DevOps to close th...
We just came off of a review of a product that handles both containers and virtual machines in the same interface. Under the covers, implementation of containers defaults to LXC, though recently Docker support was added. When reading online, or searching for information, increasingly we see “Container Management” products listed as competitors to Docker, when in reality things like Rocket, LXC/LXD, and Virtualization are Dockers competitors. After doing some looking around, we have decided tha...
The nature of test environments is inherently temporary—you set up an environment, run through an automated test suite, and then tear down the environment. If you can reduce the cycle time for this process down to hours or minutes, then you may be able to cut your test environment budgets considerably. The impact of cloud adoption on test environments is a valuable advancement in both cost savings and agility. The on-demand model takes advantage of public cloud APIs requiring only payment for t...
"We are an integrator of carrier ethernet and bandwidth to get people to connect to the cloud, to the SaaS providers, and the IaaS providers all on ethernet," explained Paul Mako, CEO & CTO of Massive Networks, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
From our perspective as consumers, perhaps the best thing about digital transformation is how consumerization is making technology so much easier to use. Sure, our television remote controls still have too many buttons, and I have yet to figure out the digital display in my Honda, but all in all, tech is getting easier for everybody. Within companies – even very large ones – the consumerization of technology is gradually taking hold as well. There are now simple mobile apps for a wide range of ...