Digital Edition

SYS-CON.TV
OATH Takes Authentication Reference Architecture Public
Version 1.0 Availability Announced at Digital ID World

The OATH Reference Architecture provides a roadmap for OATH member companies and their authentication customers towards a comprehensive industry-endorsed solution.  The architecture document covers four main areas: client framework, validation framework, client provisioning, and a common data model.

The key guiding principles behind the Reference Architecture include:

-          Open and royalty-free specifications for strong authentication

-          Device innovation and embedded specified technology building blocks for strong authentication

-          Native platform support

-          Interoperable modules that enable best-of-breed hardware and software solutions through a framework of interoperable components.

“The delivery of this new reference architecture document was on time and on target, said Bob Blakley, OATH Joint Coordination Committee (JCC) Chair and Chief Scientist (Security and Privacy), IBM. “This represents the first step towards our collective goal for developing strong authentication products and technologies based on open standards. This document also reflects the ability of OATH member companies to work together to promote the development of new industry-accepted standards for trusted security and authentication technologies. Our intent is to create an open reference architecture that will serve as a powerful mechanism to foster competition and innovation among key solution providers in identity management, security service providers, and application developers – all towards a goal of universal strong authentication.”

The Financial Services Technology Consortium (FSTC) welcomed the release of the first version of the OATH architecture.  “FSTC commends OATH on their efforts to drive open, interoperable, accessible, and secure authentication solutions into the marketplace said Zachary Tumin, Executive Director of FSTC.  “The OATH initiative compliments our efforts to define industry-level business and operational requirements for stronger mutual authentication solutions in financial services and supports our primary mission to foster interoperability in the financial services industry.”

 “Authentication standards are one of the many technology security issues FSTC’s members have been studying,” said Jim Salters, Director of Technology Initiatives and Project Development at FSTC. “It’s great to have another top-tier industry group like OATH supporting our collaborative efforts by focusing on one issue and taking it to the next level.”

The Reference Architecture document’s client framework section addresses topics of authentication methods, innovation in authentication tokens for multifunction purposes or mobile devices, token interfaces for one-time password tokens, and authentication protocols.  The validation framework covers interfaces for protocol and validation handlers, and protocols used by applications to authenticate a user’s credentials.  OATH will develop a framework to let vendors develop standards-based provisioning protocols and evaluate the need to standardize on one or more provisioning protocols to target specific credential types.  OATH will encourage the definition of standard user store extensions and OTP token meta-data to support open authentication.

Current OATH members include: ActivCard, Inc.; Aladdin Knowledge Systems; ARM; Assa Abloy ITG; AudioSmartCard; Authenex, Inc.; Aventail Corporation; Axalto, Inc.; BEA Systems; BMC Software; Checkpoint Software Technologies; Digital Persona; Diversinet Corp.; Entrust Technologies, Inc.; Forum Systems, Inc.; Gemplus Corp; IBM; IMCentric, Inc.; iovation; Juniper Networks, Inc.; K.K. Athena Smartcard Solutions; Livo Technologies SA; Passlogix, Inc.; Phoenix Technologies Ltd.; Protocom Development Systems, RedCannon Security, Inc.; SafeNet, Inc.; Signify; Smart Card Alliance; TriCipher, Inc.; VASCO Data Security; and VeriSign, Inc.

About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

Now is the time for a truly global DX event, to bring together the leading minds from the technology...
On-premise or off, you have powerful tools available to maximize the value of your infrastructure an...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures....
Artifex Software began 25-years ago with Ghostscript, a page description language (PDL) interpreter ...
In an age of borderless networks, security for the cloud and security for the corporate network can ...
In today's always-on world, customer expectations have changed. Competitive differentiation is deliv...
As the digitization of business accelerates the move of critical applications and content to the clo...
Blockchain has shifted from hype to reality across many industries including Financial Services, Sup...
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technol...
Cloud Storage 2.0 has brought many innovations, including the availability of cloud storage services...
In very short order, the term "Blockchain" has lost an incredible amount of meaning. With too many j...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web...
For enterprises to maintain business competitiveness in the digital economy, IT modernization is req...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS...
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cl...
Moving to Azure is the path to digital transformation, but not every journey is effective. Organizat...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmi...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with exp...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the c...