Mobile Menu Icon
 

Identity Management

Identity Management

Contents

  1. Introduction
  2. Issues Faced
  3. Key Points for Identity Management
  4. How to Get Started
  5. Secure Identity Platform
  6. Issuance of ID Credentials
  7. Contactless Card Technology
  8. Benefits
  9. Considerations
  10. Identification Systems Group

1. Introduction
In security related publications you will hear about the importance of:

  • Convergence of Physical & Logical Security
  • Identity & Access Management (IAM)
  • Enterprise ID
  • Physical Security Information Management (PSIM)
  • Logical Access Management Systems (LACS)

We all recognize that in today's world, there is a growing need for increased security. Current trends in identification security include Contactless and Contact Smart Cards, biometrics, vulnerability of information, government and industry group mandates and recommendations, and the convergence of physical and logical security. You need to make the right decisions, but operate within a finite budget.

Most industry experts are saying similar things. A lack of effective identity and access management poses significant risks not only to compliance but also an organizations overall security. These risks include:
Privilege creep. Privileges are granted as needed when an employee duties increase, but the access level escalation is not revoked when no longer needed.
 Credential overflow. Cards not deactivated when an employee leaves.

Why Integrate Physical & Logical Security, a whitepaper by Cisco, John Carney, 2011
This paper describes the importance of integrating physical and logical security under a single governing body or department. A lack of integration creates the following challenges:

  • No single system to identify a person's identity because each functional security department controls its own identity database
  • Increased potential for theft
  • Lack of IT management and application of best practices applied to physical security device, or a lack of best practices applied consistently across departments
  • Lack of physical monitoring of logical security devices that can detect tampering; that is, unauthorized access to a logical security device console
Some benefits of integration:
  • Provides information on who entered the building
  • Eliminates tailgating since the network cannot be accessed without the person swiping his/her badge
  • Allows for a more productive work environment by making it easier for the employee to authenticate by using an integrated solution

"In an open, trusting and tech savvy environment, the best access control system may be predicated upon a line to system access. If you failed to badge into the building, you don't get access to the systems. The collateral benefits abound: building management systems, incident awareness, and who is in the affected building."
Edward Erickson, Senior Director of Safety & Security, Cisco

The Value of Converged Access Control, a whitepaper from HID Global, 2014
Truly converged access control consists of one security policy, one credential and one audit log. This approach enables enterprises to:

  • Deliver Convenience - Replaces on-time passwords tokens and key fobs, negating the need for users to carry multiple devices.
  • Improve Security - Enables strong authentication throughout the IT infrastructure and at the door.
  • Reduce Costs - Eliminates the need to invest in multiple access solutions.

The Case for Convergence, a whitepaper from Identiv, 2014
Similarities between PACS and LACS, both systems are based on similar concepts and theories of operation.

  1. A high confidence credential. Where authenticating to the door or a desktop, organizations want confidence in the credential being used.
  2. Unique identification of individuals. The back-end systems authenticating the users must associate the user credential with the correct user account.
  3. Limit access to authorized only individuals. Organizations don't want unauthorized persons wandering around their buildings (PACS) and they don't want them wandering around their network and files either (LACS).
  4. Auditing of system activity. The PACS system creates logs in its database, whereas the LACS system does so in the network logs and/or Security Information & Event Management (SIEM) systems.

2. Issues Faced
Many organizations have a variety of ID and security technologies reside on one credential. Examples are barcode, magnetic stripe, Proximity, and Contactless. They also have a variety of applications that require ID information, including Access Control, Time & Attendance, Parking, Cafeteria, Housing and Active Directory, among others. This can raise many questions and red flags, like:

  • Can you issue a credential in one step?
  • Will the credential be active in all systems that require identification data? If not, how do you accomplish this?
  • How is information shared among security applications?
  • Can you coordinate getting information to the various systems and issue the various card technologies like Proximity, Magnetic Stripe and Contactless?
  • How do you transition to different card technologies over time without complete card and reader replacement?
  • When someone loses their ID credential and needs a replacement, how do you deactivate the old ID and issue a new one, all in one step? The replacement card may have a new Proximity card number, or ID number + Lost Card Code.
  • How do you store a photo in your ERP/HR system? Most of these systems have a field for photo; however, it is rarely populated.
  • How do you get database information into security applications like Visitor Manager and avoid the hassle of manual data entry? An example is the list of employees to be seen by visitors.
  • Where do you store identity information that is not suited for ERP system, such as Visitors, Guests & Recruits?
  • How do you prevent card numbers and serial numbers from being duplicated in your access control system?

3. Key Points for Identity Management
The key features of Secure Identity Management are:

  • A single point of enrollment and ID issuance
  • Ability to add data needed for applications to the ID card at time of issuance
  • Ability to send data needed for applications to the various systems, such as HR, Network Directory, Door Access Control, Time/Attendance, Parking, Housing, Cafeteria, etc.
  • Automatic deactivation of ID in all security systems when it is lost or stolen
  • Good communication between various departments, such as HR, Security and IT.

4. How to Get Started
Creating a plan is not impossible, you just need a team effort.

  • Create a list of ID applications you currently have, and those you want to add in the future.
  • Create a list of data each application needs.
  • Gain buy-in from other departments.
  • Speak to various vendors involved.

Below is an example of a list of applications and possible data elements.

Application databases Data that may be needed for any app
 Human Resources/Student Information  Name
 ID Badging  Photo
 Network Directory  ID Number
 Door Access Control  Door Access Control card number
 Time & Attendance  Bar-code number
 Parking  Magnetic stripe number
 Housing  Lost card code number
 Cafeteria & other Payment  Department, Title, Building, Room
   Date of Birth
   Active/De-active Flag

 

 

 

 

 

 

 

 

 

 

 

5. Secure Identity Platform 
Unlike other expensive and complex identity management solutions, the BadgePass™ Secure Identity Platform from Identification Systems Group is reasonably priced and easy to understand. Identity management data is stored in a powerful SQL database. The provided synchronization tools and powerful event notification service allow for real-time or scheduled messaging and cross-platform communication, creating a world where one identity works with many applications. The Active Directory Plug-In provides the ability to synchronize BadgePass™ entities with your exiting Active Directory™ Users.

6. Issuance of ID Credentials
We all understand the importance of recognizing members of the team and identifying visitors and guests. To take ID security to the next level, credentials must be ready to use when issued. That means the various card technologies must be read (e.g. Proximity or Contactless Number) and written (bar-code, magnetic stripe, contactless) during the issuance process. The resulting data is sent to the needed databases.

Card issuance systems from Identification Systems Group automate the credential issuance process and will revolutionize the way you think of secure identity.

7. Contactless Card Technology
The world is moving to Contactless Card technology, and for good reason. However, there are a wide variety of card products to choose, and some can be very expensive. What is best for you?

One good choice is the MOCA™ Card (Multi-application Open Card Architecture) from Identification Systems Group. Based on world leading Mifare technology, MOCA Cards are more secure, yet more flexible and open. You have further freedom to choose applications that you want to add. And, in many cases, the price of MOCA cards are less than traditional Proximity cards.

8. Benefits
The benefits of enacting a solid game plan are strong, yet simple.

  • Greatly improved security
  • Increased efficiency
  • Affordability

9. Considerations
Some of the topics of discussion when considering a system include:

  • Cost. Does the cost justify the benefit?
  • Card Technology. What card do you want and need?
  • Card Durability. If you invest in a technology card, you want it to stand the test of time. What features and options should you consider to ensure it lasts?
  • Security of system, data and supplies.
  • Use of Biometrics. Adding a second factor, such as biometrics, to certain high security areas (IT, Research Lab, etc) can greatly increase your organization's security.
  • Logical Access. Do you want to use your credential to log-on to workstations?
  • Public Key Infrastructure (PKI). When considering PKI, storing the digital certificate on a Contact Smart Card is usually recommended, as it provides for portability.

10. Identification Systems Group
A good source for your solution is a local dealer that is part of the Identification Systems Group (ISG). The ISG included 32 members that cover the USA and Canada. They are your local experts for identification technology. Strong local sales and technical support is provided by all dealers, and they share common products, knowledge and practices.

ISG members are very unique in the industry. They provide local support, vast expertise and cost effective solutions.
Your local ISG member can assist you in determining the best and most cost effective solutions to meet your needs.
They are available for on-site presentations and consultation.

To find your local ISG member, go to www.IdentificationSystemsGroup.com and enter your zip code in the Dealer Locator.

About the author:
Tom Stiles is the Executive Director of Identifications Group. He has 37 years of experience in the identification industry, including extensive work with the education market.

Tom Stiles
Identification Systems Group
tstiles@IdentificationSystemsGroup.com