Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
GSA seeks input on ID management in the cloud
Monday - 7/30/2012, 5:05pm EDT
"Over the past few months, the Federal Cloud Credential Exchange (FCCX) Tiger Team has worked on the use cases and the functional requirements necessary for the operation of an identity federation capability that can be integrated with a government agency web application to support and consume a full range of digital credentials such as PIV, PIV-I and other third party credentials issued under a Federal Identity, Credential and Access Management (FICAM)-approved trust framework provider," wrote GSA's Deb Gallagher and Naomi Lefkovitz, of the National Institute of Standards and Technology in a blog post Friday. Gallagher and Lefkovitz are the co-chairwomen of the the FCCX Tiger Team.
The White House-sponsored team has been working on the concept of managing identities in the cloud for the last six months. The working group is creating common requirements that all agencies could agree to around federated identity management in the cloud.
This effort aligns closely with the National Strategy for Trusted Identities in Cyberspace (NSTIC) and the work the Information Shared Environment and GSA are doing to improve secure information sharing through a back- end attribute tool.
The industry day is an attempt to take the next step in bringing industry ideas into the mix.
GSA wants input on 13 areas by Aug. 13, including the description of a high level architecture to let agencies use a third-party credential to authenticate users across a shared service in a public or private cloud.
Industry commenters also must tell GSA how they would address cost, privacy and how they would scale the service across multiple agencies.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.