
Trustworthy Authentication and Security Solutions for Decision-Making Process
Explore the considerations and processes involved in implementing derived credentials for authentication and security solutions. Learn about major factors like device types, lifecycle considerations, application access, policy regulations, and practical decision-making strategies. Trust XTec for reliable authentication solutions you can count on.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Authentication and security solutions you can trust. Authentication and security solutions you can trust.TM TM www.xtec.com www.xtec.com sales@xtec.com sales@xtec.com Derived Credential Decision Making Process Federal PIV Derived Credentials Date: October 5, 2015
Major Considerations Devices Devices Lifecycle Lifecycle Applications Applications Policy Policy Derived Credential- SCA XTec Incorporated Confidential 2
Devices Device Considerations Types of Devices Operating system Ability for HSM LOA 4 Multiple Devices, One User Existing MDM GFE, BYO Derived Credential- SCA XTec Incorporated Confidential 3
Lifecycle Lifecycle Considerations Level of Assurance Delivery Existing IDMS, 3rd Party Self Service 3rd Party Application Native Key Store Linking to PIV Termination Derived Credential- SCA XTec Incorporated Confidential 4
Applications Applications Considerations What Applications can be accessed Does the LOA fit Domain Logon Mobile app development environment PACS Derived credential access Derived Credential- SCA XTec Incorporated Confidential 5
Policy Policy Considerations Who gets derived On what devices & in what applications is it allowed PIV card issuer or 3rd Party Derived credential delivery Derived credential storage What happens if device is lost Are there parameters on PIV/Derived linkage Authentication mechanism for unlocking derived Derived Credential- SCA XTec Incorporated Confidential 6
Practical Decision Making Common Themes LOA 3 much more common LOA 4: Device restrictions, added hardware/cost, not self service PIV card issuer and Derived issuer same vendor & CA Always know status of PIV, status of employment Always know reason for revocation of PIV Derived becomes a piece of core digital identity Enterprise monitoring and access control management of single individual Derived an add-on to PIV issuance or extension to PIV Native Key Store vs. 3rd Party App or MDM Email, Contacts access Derived Credential- SCA XTec Incorporated Confidential 7
Questions Contact: Kevin Kozlowski kkozlowski@xtec.com Derived Credential- SCA XTec Incorporated Proprietary Information 8