Risk
4/16/2009
08:06 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

RSA: Microsoft Pushes 'Geneva' In War On Passwords

Formerly known as Zermatt, the claims-based access platform is a framework for granting people access to information.

A year after Microsoft chief research and strategy officer Craig Mundie urged the technology industry to come together to create a more trustworthy Internet, the company's vision of End to End Trust is starting to take shape.

At the RSA Conference this year, Scott Charney, Microsoft's corporate VP of Trustworthy Computing, plans to deliver a progress report on his company's campaign to move beyond the password as a means of authentication.

Microsoft's End to End Trust plan calls for hardware, operating system, data, and people to operate as a trusted stack, one that allows easy authentication, without the weaknesses of passwords or the risk of personal information disclosure.

Passwords are secrets that must be shared. And that's not an ideal situation. "The problem with shared secrets is they really aren't secret," explained Brendon Lynch, director of privacy strategy at Microsoft. "If the cybercriminals can get a hold of those, and they're doing so ... they can go and reuse those credentials."

Microsoft's alternative is a technology called CardSpace, introduced in Windows Vista, which allows identity claims to be mediated by digital tokens, a scheme that fosters privacy, even as it enhances security, because it obviates the need to share personal information.

The technology hasn't been widely adopted, in part because the back end has been missing. That changed in November when Microsoft delivered a beta version of Geneva, formerly known as Zermatt.

Microsoft calls Geneva "a claims-based access platform." It is, in other words, a framework for granting people access to information. It provides tools for granting access in conjunction with privacy protections and policy rules.

Geneva encompasses authentication services, federation services, and access policy control.

"It is a platform that simplifies access [to applications] and provides security-enhanced access," said Doug Leland, general manager of Microsoft's identity and security division. "In today's world where increasingly there's a desire for organizations to collaborate and transact with other business partners ... there is a necessity to do that in a secure fashion."

Geneva includes a framework for building .Net applications that weigh digital token "claims" to make access decisions, a server-based digital token service, and Windows CardSpace as a graphic interface that presents access decisions to users.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.