Difference between revisions of "Authentication Providers"
From MgmtWiki
(→Providers) |
(→Providers) |
||
(28 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
==Full Title or Meme== | ==Full Title or Meme== | ||
+ | A list of the enterprises and standards providers of [[Identifier]] [[Authentication]]. | ||
==Context== | ==Context== | ||
Line 31: | Line 32: | ||
|Dell (RSA) || ||[https://en.wikipedia.org/wiki/RSA_SecurID SecurID] || Patented original time-based [[One-Time Password Authenticator]], only they could provide [[Authentication]] server or code while on patent | |Dell (RSA) || ||[https://en.wikipedia.org/wiki/RSA_SecurID SecurID] || Patented original time-based [[One-Time Password Authenticator]], only they could provide [[Authentication]] server or code while on patent | ||
|- | |- | ||
− | |Digicert|| ||CA ||IDEF registered | + | |Digicert|| Utah ||CA ||IDEF registered |
|- | |- | ||
− | |DigiMe || || || KI demo | + | |DigiMe || || || KI [[Consent Receipt]] demo |
|- | |- | ||
|ENTRUST|| || ||used by First tech CU and others | |ENTRUST|| || ||used by First tech CU and others | ||
Line 42: | Line 43: | ||
|- | |- | ||
|Google|| ||OpenID||Certified OpenID FIDO WebAuthN https://myaccount.google.com/ | |Google|| ||OpenID||Certified OpenID FIDO WebAuthN https://myaccount.google.com/ | ||
+ | |- | ||
+ | |[https://www.globalid.net/ Global ID] || SF || DIDs || [https://www.americanbanker.com/news/neither-mad-max-nor-orwell-id-startup-walks-a-fine-line VC funded] | ||
|- | |- | ||
|Gluu|| || || Certified OpenID | |Gluu|| || || Certified OpenID | ||
Line 53: | Line 56: | ||
|IDEMAI.COM|| || ||merger of Oberthur Technologies (OT) and Safran Identity & Security (Morpho) Augmented Identity is about using the biometric characteristics of each person as a unique signature of individual identity | |IDEMAI.COM|| || ||merger of Oberthur Technologies (OT) and Safran Identity & Security (Morpho) Augmented Identity is about using the biometric characteristics of each person as a unique signature of individual identity | ||
|- | |- | ||
− | |Janrain|| || ||Certified OpenID but only for RP | + | |[https://www.iwelcome.com/ iWelcome] || Europe|| || focus on [[User Consent]] and [[Privacy]] |
+ | |- | ||
+ | |Janrain|| || ||Certified OpenID but only for RP = purchased by Akamai 2019-01 | ||
|- | |- | ||
|Mastercard || || || [https://medium.com/@oxfordsbs/digital-identity-the-system-restore-of-trust-803120d7d67 Digital Identity: The System Restore of Trust] | |Mastercard || || || [https://medium.com/@oxfordsbs/digital-identity-the-system-restore-of-trust-803120d7d67 Digital Identity: The System Restore of Trust] | ||
Line 86: | Line 91: | ||
|- | |- | ||
|[https://www.raidiam.com/ Raidiam]||UK|| || | |[https://www.raidiam.com/ Raidiam]||UK|| || | ||
+ | |- | ||
+ | |[https://safenet.gemalto.com/ Safenet] || France|| MFA, cloud || Part of Gemalto and now Thales, in lots of security markets, including smart cards, absorbed Rainbow and Aladdin ID tokens | ||
|- | |- | ||
|SailPoint || || || | |SailPoint || || || | ||
Line 105: | Line 112: | ||
|Twitter|| ||OpenID|| | |Twitter|| ||OpenID|| | ||
|- | |- | ||
− | |UbiSecure || || || KI demo | + | |[https://www.ubisecure.com/ UbiSecure] ||Europe || oauth or SAML|| KI demo - authorization |
|- | |- | ||
|VASCO DataSecurity|| || ||IDEF registered as MYDIGIPASS | |VASCO DataSecurity|| || ||IDEF registered as MYDIGIPASS | ||
+ | |- | ||
+ | |[https://veres.io/contact/ Veres] || || Verif Claims || From [https://digitalbazaar.com Digital Bazaar] Creates, resolves, validates [https://www.w3.org/TR/verifiable-claims-data-model/ verifiable claims] | ||
|- | |- | ||
|Verizon || ||VZConnect || Certified OpenID, perhaps only for federation | |Verizon || ||VZConnect || Certified OpenID, perhaps only for federation | ||
|- | |- | ||
− | |Yahoo Verizon || || OpenID || | + | |Yahoo Verizon || || OpenID || Provider based on email account |
|} | |} | ||
Line 120: | Line 129: | ||
| Name || Type || Category|| Notes | | Name || Type || Category|| Notes | ||
|- | |- | ||
− | |[https://www.aamva.org/ AAMVA] ||Attribute ||driver's license || just | + | |[https://www.aamva.org/ AAMVA] ||Attribute ||driver's license || just verifies information at state Identity providers |
|- | |- | ||
| [https://www.betteridentity.org/ Better ID Coalition] || || || Large US financial companies issued a [https://static1.squarespace.com/static/5a7b7a8490bade8a77c07789/t/5b4fe83b1ae6cfa99e58a05d/1531963453495/Better_Identity_Coalition+Blueprint+-+July+2018.pdf Report] | | [https://www.betteridentity.org/ Better ID Coalition] || || || Large US financial companies issued a [https://static1.squarespace.com/static/5a7b7a8490bade8a77c07789/t/5b4fe83b1ae6cfa99e58a05d/1531963453495/Better_Identity_Coalition+Blueprint+-+July+2018.pdf Report] | ||
Line 126: | Line 135: | ||
|[https://centerforcybersecuritypolicy.org/initiatives/ Center for Cybersecurity Policy] || || || | |[https://centerforcybersecuritypolicy.org/initiatives/ Center for Cybersecurity Policy] || || || | ||
|- | |- | ||
− | |Distributed ID || || || | + | |Distributed ID || || || One hundred point of identity |
|- | |- | ||
|[https://fidoalliance.org/ FIDO Alliance]|| || [https://fidoalliance.org/download/ UAF U2F]|| Fast ID Online 1.2 specs dtd 2017 | |[https://fidoalliance.org/ FIDO Alliance]|| || [https://fidoalliance.org/download/ UAF U2F]|| Fast ID Online 1.2 specs dtd 2017 | ||
Line 136: | Line 145: | ||
|[https://openid.net OpenID Foundation] ||AuthN+AuthZ ||OpenID Connect || OpenID Foundation | |[https://openid.net OpenID Foundation] ||AuthN+AuthZ ||OpenID Connect || OpenID Foundation | ||
|- | |- | ||
− | |[[SAML 2.0]]||AuthN ||SAML2||OASIS-open.org | + | |[[SAML 2.0]]||AuthN ||SAML2||OASIS-open.org original single sign on standard |
|- | |- | ||
− | |W3C Credential Community || | + | |[http://www.tscp.org/about-tscp/ TSCP]|| || ||Transglobal Secure Collaboration Participation is a collaborative forum of worldwide stakeholders in the defense industry to address security issues |
+ | |- | ||
+ | |W3C Credential Community Group ||Decentralized||eg Public Ledger || [https://w3c-ccg.github.io/did-spec/ DID], [https://www.w3.org/TR/verifiable-claims-data-model/ verifiable claims] sponsored by blockchain providers | ||
|- | |- | ||
|Web AuthN ||IAP or RP ||aka FID02 ||released under W3C | |Web AuthN ||IAP or RP ||aka FID02 ||released under W3C | ||
|- | |- | ||
− | |Univ. of MD|| ||Closed ||IDEF registered | + | |Univ. of MD|| ||Closed ||IDEF registered, supports Internet2 SAML federation |
|} | |} | ||
==References== | ==References== | ||
*Selection criteria for an AuthN provider: https://medium.freecodecamp.org/evaluating-authentication-as-a-service-providers-6903895a8450 | *Selection criteria for an AuthN provider: https://medium.freecodecamp.org/evaluating-authentication-as-a-service-providers-6903895a8450 | ||
+ | |||
+ | [[Category:Profile]] | ||
+ | [[Category:Authentication]] |
Revision as of 10:57, 7 May 2019
Full Title or Meme
A list of the enterprises and standards providers of Identifier Authentication.
Context
On the Identity Management page different roles are defined for Entities.
Providers
The following table is the known authentication providers and some of their characteristics. Updates and corroboration are encouraged.
- Category is "User" where user has complete control, "OpenID" for providers that require user permission to release information. The rest are closed in the sense that users have limited control over the release of their information. Some provide OpenID as an option when an alternate is shown.
- Some sites are not authenticators, like CA (certificate authorities) or OAuth (authorization).
- Many more sites exist, some are listed on the OpenID certification page. Auth0 may offload all their AuthN to Google.
Company | Location | Cat | Recent News |
AT&T | Cloud | First Responders | |
Airside | Canada | Cloud | mobile passport for entering US from Canada |
Alert Enterprise | |||
Auth0 | Bellevue, WA | Certified OpenID Auth0 raises $55M to fuel the identity management company’s international expansion 2018-05-15 | |
Authen2cate | IDEF registered | ||
Amazon | Seattle | Closed | Mostly for ecommerce sites |
CA Technologies | Closed and OpenID | SiteMinder (SSO and API gateway is Certified OpenID) part of Broadcom | |
Consentua | KI demo | ||
Dell (RSA) | SecurID | Patented original time-based One-Time Password Authenticator, only they could provide Authentication server or code while on patent | |
Digicert | Utah | CA | IDEF registered |
DigiMe | KI Consent Receipt demo | ||
ENTRUST | used by First tech CU and others | ||
OpenID | |||
Forge Rock | OpenID | Certified OpenID | |
OpenID | Certified OpenID FIDO WebAuthN https://myaccount.google.com/ | ||
Global ID | SF | DIDs | VC funded |
Gluu | Certified OpenID | ||
IBM | Premise | IBM Cognos Series 7 | |
Identity Server 4 | DE | OpenID or OAuth | Certified OpenID also available as OSS |
ID.me | Affinity | IDEF registered | |
IDEMAI.COM | merger of Oberthur Technologies (OT) and Safran Identity & Security (Morpho) Augmented Identity is about using the biometric characteristics of each person as a unique signature of individual identity | ||
iWelcome | Europe | focus on User Consent and Privacy | |
Janrain | Certified OpenID but only for RP = purchased by Akamai 2019-01 | ||
Mastercard | Digital Identity: The System Restore of Trust | ||
Microfocus(NetIQ) | |||
Microsoft AD | Cloud and Premise | Certified OpenID Also ADFS federation service | |
Microsoft Passport | MSFT or Office | Closed or OpenID | Started with Hotmail now covers most MSFT products - Confusing naming in part because of two separate authorities created with release of Office360 |
MojeID | CZ | OpenID | Certified OpenID Will accept clients from anywhere in world |
MorphoTrust eID | IDEF registered - now part of IDEMIA | ||
Okta | Okta shares rise as sales top estimates in first report since IPO 2017-07-07 | ||
Omada | |||
One Identity | |||
One Logon | SV | Premise Cloud | https://www.onelogin.com/status |
Open Consent | NY + UK | Sal + Mark | KI demo |
Oracle | Premise Cloud | Certified OpenID for federation services | |
Ping Identity | SV | Premise OpenID | Certified OpenID for federation services |
Privo | IDEF registered | ||
Radiant Logic | Premise | also federated ID & CRM | |
Raidiam | UK | ||
Safenet | France | MFA, cloud | Part of Gemalto and now Thales, in lots of security markets, including smart cards, absorbed Rainbow and Aladdin ID tokens |
SailPoint | |||
Salesforce | Certified OpenID, perhaps only for federation | ||
Savint | |||
Spec-Ops | Password management | ||
spring.io | cloud | java same? https://www.baeldung.com/spring-security-authentication-provider | |
Symantec VIP | various | IDEF registered - used by Fidelity, Ebay, PayPal and others | |
Tozny, LLC | IDEF registered | ||
Trunomi | KI demo | ||
OpenID | |||
UbiSecure | Europe | oauth or SAML | KI demo - authorization |
VASCO DataSecurity | IDEF registered as MYDIGIPASS | ||
Veres | Verif Claims | From Digital Bazaar Creates, resolves, validates verifiable claims | |
Verizon | VZConnect | Certified OpenID, perhaps only for federation | |
Yahoo Verizon | OpenID | Provider based on email account |
Non-profits
Note that some of these organizations are just associations of large Enterprises.
Name | Type | Category | Notes |
AAMVA | Attribute | driver's license | just verifies information at state Identity providers |
Better ID Coalition | Large US financial companies issued a Report | ||
Center for Cybersecurity Policy | |||
Distributed ID | One hundred point of identity | ||
FIDO Alliance | UAF U2F | Fast ID Online 1.2 specs dtd 2017 | |
Kantata Initiative | Federations | UMA | also Consent Receipt and IDEF |
OAuth | AuthZ | Release under IETF | |
OpenID Foundation | AuthN+AuthZ | OpenID Connect | OpenID Foundation |
SAML 2.0 | AuthN | SAML2 | OASIS-open.org original single sign on standard |
TSCP | Transglobal Secure Collaboration Participation is a collaborative forum of worldwide stakeholders in the defense industry to address security issues | ||
W3C Credential Community Group | Decentralized | eg Public Ledger | DID, verifiable claims sponsored by blockchain providers |
Web AuthN | IAP or RP | aka FID02 | released under W3C |
Univ. of MD | Closed | IDEF registered, supports Internet2 SAML federation |
References
- Selection criteria for an AuthN provider: https://medium.freecodecamp.org/evaluating-authentication-as-a-service-providers-6903895a8450