1 / 6

Understanding the Importance of Digital IDs in PKI-Enabled Applications

This presentation explores the significance of Digital IDs, particularly in the context of PKI-Enabled Applications at UTHSC-H. It addresses critical challenges solved by strong authentication methods, including secure email for sensitive data sharing, regulatory compliance with FDA CFR 21 Part 11, and ensuring document integrity and accountability. The session outlines successful application strategies, reasons for user acceptance, and testimonials from users. Key applications discussed include user and group administration, VPN access, and hybrid authentication methods for enhanced security and management.

oshin
Télécharger la présentation

Understanding the Importance of Digital IDs in PKI-Enabled Applications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Why do I need a Digital ID? Mark B. JonesNet@Edu PKI Deployment ForumMadison, WIApril 16th, 2008

  2. PKI-Enabled Application Acceptance at UTHSC-H • Problems solved • Applications • Reasons for Acceptance • What do our users say?

  3. Problems Solved • Strong authentication • Enables use of email for: • Sharing sensitive data (encryption) • Official correspondence (data integrity & accountability) • FDA CFR 21 part 11 Regulatory compliance • Document integrity • Non repudiation

  4. Applications • PKI Authenticated • User Administration • Group Administration (privilege management) • Firewall Database • Student Grades • Hybrid authentication • Password Change Form • Graduate Medical Education Information System • Guest Management System • VPN • Other • Adobe PDF • Email

  5. Reasons for Acceptance • Start with important applications with few users • Implement hybrid authentication for large applications • Apply the technology to several problems • Use tokens for key portability

  6. What do our users say? • Why isn’t application X certificate authenticated?

More Related