iam excellence. authentication on mobile devices for business application fabian zoller &...

25
IAM EXCELLENCE

Upload: leo-baldwin

Post on 28-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

IAM EXCELLENCE

Page 2: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Authentication on Mobile

Devices for Business Application

Fabian Zoller & Martina Müller

Page 3: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Reason Why

Image source: [http://goo.gl/VYMFN5]

Page 4: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Bring Your Own Device

Image source: [M.Müller]

Page 5: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Bring Your Own Device

Image source: [M.Müller]

Page 6: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

AuthenticationMethods

1. Biometric

Image source: [http://goo.gl/zyjhAl]

Page 7: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

AuthenticationMethods

1. Biometric

2. Location

www.blog.mobileroudie.comImage source: [http://goo.gl/yPRdEO]

Page 8: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

AuthenticationMethods

1. Biometric

2. Location

3. Knowledge

www.thebayentrepreneu.comImage source: [http://goo.gl/Pzd5Pn]

Page 9: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

AuthenticationMethods

1. Biometric

2. Location

3. Knowledge

4. Possession

www.flickr.com/photos/code_material

Image source: [http://goo.gl/6QE7fw]

Page 10: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Requirements

Usability & Funtionality

AccessTime

Acceptability

Security

Distinctiveness

Resistance to Attacks

Accuracy

False Accept Rate

False Rejection Rate

Expenditure

Purchase

Administration

Implementation Effort

Software

Hardware

Page 11: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Rating Matrix - Results

Credentials Graphical Password

Software Token WLAN NFC Certificates

Page 12: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Prototypes

Page 13: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Showrooms

1.

2.

3.

4.

Image sources: [F. Zoller] [http://goo.gl/VqFSQ] [http://goqr.me] [http://goo.gl/bVT8l] [http://goo.gl/Vv2E] [http://goo.gl/wj8Hw]

Page 14: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

System Components

Client Device

Untrusted Site

RequestResource

ResponseResource / Deny

Trusted Site (Company)

Web- / App Server &

Agent

Yes / No / Data(Response Decision [Data])

Authentic?(Request Decision [Data])

DirectoryServer

Make Decision / Prepare Data

Image sources: [http://goo.gl/gXoeT] [http://goo.gl/Vv2E]

Page 15: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

MobileDesk Authentication Flow

Select Certificate

Validate Certificate

Enter Graphical Password

Validate Graphical Password

Store Token in Directory

Start Web Application with Token

Image sources: [F. Zoller]

Page 16: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

MobileKey Authentication Flow

Touch Device with Identity Chip

Validate Identity Chip

Enter Credentials

Validate Credentials

Store Token in Directory

Start Web Application with Token

Image sources: [F. Zoller]

Page 17: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

TwoChannel Authentication Flow

Enter Username

Generate QR-Code

Scan QR-Code

Enter Password

Validate Credentials

Start Web Application

On

Mob

ile D

evic

e

Image sources: [F. Zoller]

Page 18: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

LocationBased Authentication Flow

Active WLAN

Validate Access Point

Enter PIN

Generate OTP

Enter OTP and PIN

Validate OTP and PIN

Start Web Application

On

Mob

ile D

evic

e

Image sources: [F. Zoller]

Page 19: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Usability Testing - Interrogations

Is there a significant difference between the arithmetic average authentication time?

1. iPhone + QR-Code (30 sec)

2. Android + Mobile Key (37 sec)

3. Android/iPhone + Location Based (39 sec)

Page 20: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Usability Testing - Interrogations

Is there a significant difference between the authentication time within the showrooms?

1. Mobile Key (37 sec)

2. Location Based (39 sec)

3. QR-Code (40 sec)

Page 21: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Usability Testing - Interrogations

Is there a significant difference between the different operating systems focussing on the success quotient?

92%

8%

iPhone

successful authenticationfailed authentication

86%

14%

Android

successful authenticationfailes authentication

Page 22: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Advisable Results

Mobile Desk

QR-Code

Mobile Key

Credentials Graphical Password

Software Token WLAN NFC Certificates

Page 23: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Questions?

Page 24: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

Thank you for your attention!

Page 25: IAM EXCELLENCE. Authentication on Mobile Devices for Business Application Fabian Zoller & Martina Müller

IAM EXCELLENCE

www.ic-consult.comiC Consult GmbH | Keltenring 14 | 82041 Oberhaching | T +49 89 6604970 | [email protected]