Скачать презентацию GPO PKI Getting Started U S Government Скачать презентацию GPO PKI Getting Started U S Government

756b4718ec97232b8242b055be9fc86f.ppt

  • Количество слайдов: 14

GPO PKI – Getting Started U. S. Government Publishing Office April 21, 2017 GPO PKI – Getting Started U. S. Government Publishing Office April 21, 2017

Agenda § About GPO PKI – Using GPO PKI for OFR e. DOCS § Agenda § About GPO PKI – Using GPO PKI for OFR e. DOCS § GPO PKI Services

About GPO PKI § Shared Service Provider (SSP) certification – July 2007 § Cross-Certified About GPO PKI § Shared Service Provider (SSP) certification – July 2007 § Cross-Certified with Federal Bridge Certification Authority since December 2005 § Meets all Federal PKI requirements § In operation at GPO since 2004

GPO PKI Services § End User Certificates – Medium Assurance Level (federal PKI) – GPO PKI Services § End User Certificates – Medium Assurance Level (federal PKI) – Requires in-person identity proofing for Users • End user must present themselves in person to the RA or LRA – Two options: • At GPO Main Office • Agency Local Registration Authority (LRA) – Agency LRA personnel require a hardware token • LRA personnel (agency) must be identity proofed at GPO • Hardware token required due to sensitive nature of enrollment function performed • LRA enrolls other agency personnel at agency– record keeping requirements – Agency users must present themselves in person to LRA at agency

GPO PKI Services § Help Desk — GPO provides technical assistance to users • GPO PKI Services § Help Desk — GPO provides technical assistance to users • Email notification by users to GPO — Automatically routed to GPO PKI support — Phone number provided for emergencies — Agency IT Help Desk • Most agency end users to coordinate IT problem reporting and resolution through the agency IT Help Desk • GPO will work with agencies and PKI end users — GPO will always provide technical assistance to resolve end user PKI problems — May involve IT problems at the agency and agency will need to resolve those

Certificate Uses § File signing — e. DOCS, for example § File encryption § Certificate Uses § File signing — e. DOCS, for example § File encryption § Email encryption and signing (S/MIME) — For Outlook email § Other uses are possible, in consultation with GPO PKI

OFR e. DOCS PKI § Background – OFR e. DOCS application • Hosted by OFR e. DOCS PKI § Background – OFR e. DOCS application • Hosted by GPO on behalf of OFR • Allows digital submission of digitally signed files – Saves time and money – Requires official agency submitter to have PKI certificate • Required Medium Assurance PKI certificate – Requires In-Person Identity Proofing – GPO PKI services for the OFR e. DOCS application • In Operation since September 16, 2006 – OFR e. DOCS originally used NFC PKI (pre Sept. 2006)

e. DOCS Document Submission Process Step 1 End user logs into GPO PKI end e. DOCS Document Submission Process Step 1 End user logs into GPO PKI end user software (COTS client software meeting FIPS 140 -2 and Federal PKI standards from Entrust, configured by GPO to interface to the FBCA cross-certified GPO PKI). User enters appropriate password (from certificate issuance process, for initial password). Step 2 End user locates the file to be signed using Windows operating system process. Step 3 End user RIGHT CLICKS on the file to be signed. Step 4 End User selects Digitally Sign File…. Step 5 End User completes prompts to complete signing process. Step 6 GPO PKI software signs the file. Step 7 End user uploads the signed document to the OFR Web Portal. User uploads file selected and signed. Step 8 Process COMPLETE.

GPO PKI Services – Cost Structure § Cost Structure – End User Certificates • GPO PKI Services – Cost Structure § Cost Structure – End User Certificates • $150. 00 per user per year – NOTE: Software certificate (does not apply to smartcard certificate) – LRA Users • $350. 00 per LRA per year (includes hardware token) • LRA’s perform enrollment of agency users for GPO PKI – Costs documented in GPO Circular Letter 943 • URL: https: //beta. gpo. gov/docs/default-source/circular-letters-pdffiles/2015/cir 943. pdf § Business Enablement – SF-1 Form executed for GPO • Printing Officers at each federal agency – liaison to GPO – Memorandum of Agreement • Spells out roles and responsibilities

GPO PKI Services – Getting Started Step 1: Execute a Standard Form 1 (SF-1) GPO PKI Services – Getting Started Step 1: Execute a Standard Form 1 (SF-1) and send to GPO § § Send to: Bobbie Mc. Koy at GPO (contact information on last slide) Sample SF-1 shown on a later slide Identify the Number of End Users that will have Certificates Decide if Agency will use Local Registration Authority (LRA) function Step 2: Execute Memorandum of Agreement and send to GPO § § Spells out Roles and Responsibilities Send to: John Hannan at GPO at jhannon@gpo. gov Step 3: Ensure Agency IT Support staff know about: § A: Entrust Software installation on end user computers • Agencies normally review and certify software for use on Agency computers § B: Firewall Settings Required (see next slide) § C: Help Desk Notification for End User Problems • • • Firewall changes may be needed at some Agencies (depends on Agency controls) Decide how Agency End Users will request Help Desk support for PKI problems Most common model: End Users notify Agency Help Desk (using standard agency procedures) – Agency Help Desk notifies GPO PKI Help Desk, if needed Step 4: Install Entrust software on end user computers at Agency § § Entrust software provided by GPO as part of fee per user Available for download at URL: https: //beta. gpo. gov/how-to-work-with-us/agency/services-foragencies/public-key-infrastructure Step 5: Arrange a date and time for End Users to come to GPO for in-person Identity Proofing (federal PKI requirement) § Contact John Hannan at GPO at jhannon@gpo. gov.

Example SF-1 Form Example SF-1 Form

Example SF-1 Form Example SF-1 Form

Agency Firewall Settings Required Agency Firewall Settings Required

Contact Information Technical John Hannan, CISSP Chief Information Security Officer U. S. Government Publishing Contact Information Technical John Hannan, CISSP Chief Information Security Officer U. S. Government Publishing Office 202. 512. 1021 jhannan@gpo. gov Business Official Journals of Government Office U. S. Government Publishing Office 202. 512. 2100