Credential service provider
This article needs additional citations for verification. (February 2009) (Learn how and when to remove this template message)
A Credential Service Provider (CSP) is a trusted entity that issues security tokens or electronic credentials to subscribers. A CSP forms part of an authentication system, most typically identified as a separate entity in a Federated authentication system. A CSP may be an independent third party, or may issue credentials for its own use. The term CSP is used frequently in the context of the US government's eGov and e-authentication initiatives. An example of a CSP would be an online site whose primary purpose may be, for example, internet banking - but whose users may be subsequently authenticated to other sites, applications or services without further action on their part.
- 1 History
- 2 CSP Process
- 3 Importance
- 4 CSP and the US Government
- 5 FedFed Membership requirements for levels 1 & 2
- 6 FedFed Membership requirements for levels 3 & 4
- 7 Service Provider Requirements to Join Federal Federation Directly
- 8 Providers
- 9 Costs
- 10 The Kantara Initiative
- 11 Windows
- 12 References
In any authentication system, some entity is required to authenticate the user on behalf of the target application or service. For many years there was poor understanding of the impact of security and the multiplicity of services and applications that would ultimately require authentication. The result of this is that not only are users burdened with many credentials that they must remember or carry around with them, but also applications and services must perform some level of registration and then some level of authentication of those users. As a result, Credential Service Providers were created. A CSP separates those functions from the application or service and typically provides trust to that application or service over a network (such as the Internet).
The CSP establishes a mechanism to uniquely identify each subscriber and the associated tokens and credentials issued to that subscriber. The CSP registers or gives the subscriber a token to be used in an authentication protocol and issues credentials as needed to bind that token to the identity, or to bind the identity to some other useful verified attribute. The subscriber may be given electronic credentials to go with the token at the time of registration, or credentials may be generated later as needed. Subscribers have a duty to maintain control of their tokens and comply with the responsibilities to the CSP. The CSP maintains registration records for each subscriber to allow recovery of registration records.
In an e-authentication model, a claimant in an authentication protocol is a subscriber to some CSP. At some point, an applicant registers with a Registration Authority (RA), which verifies the identity of the applicant, typically through the presentation of paper credentials and by records in databases. This process is called identity proofing. The RA, in turn, vouches for the identity of the applicant (and possibly other verified attributes) to a CSP. The applicant then becomes a subscriber of the CSP. The CSP establishes a mechanism to uniquely identify each subscriber and the associated tokens and credentials issued to that subscriber. There is always a relationship between the RA and CSP.
CSPs can establishes confidence of a user identity through an electronic authentication process. As a result, some regulatory agencies can ask individuals to proof their identities through a CSP. Today, regulatory agencies require physicians to be authenticated electronically before physicians can issue any prescription for controlled dangerous substances (CDS). Physicians have to seek for federally approved CSPs in order to receive a two-factor authentication credential or digital certificates. The CPSs conduct identity proofing that meets National Institute of Standards and Technology Special Publication 800-63-1 Assurance Level 3.
CSP and the US Government
The federal government is currently the CSP for e-government transactions. However, the government plans to focus all their attention in the applications and leave the credential management business to other industries.
In 2004, the US government proposed an E-authentication initiative. The goals of the initiative include:
- Build and enable mutual trust needed to support widespread use of electronic interactions between the public and the US Government.
- Minimize the burden on the public when obtaining trusted electronic services from the government.
- Deliver common interoperable authentication solutions, appropriately matching the levels of risk and business risks.
As a result of this initiative, campuses may start offering to student, faculty and staff access to certain federal applications. However, before this happens, the government will impose the following requirements:
FedFed Membership requirements for levels 1 & 2
- Credential Assessment
- Signing Business and Operating Rules
- Technical Interoperability at SAML 1.0
FedFed Membership requirements for levels 3 & 4
- Cross-certification with Federal PKI
Service Provider Requirements to Join Federal Federation Directly
Those services provides wishing to join the Federal Federation Directly will have to agree with:
- eAuthentication Business and Operating rules in
- Risk Analysis
- Service levels
- Security levels″
- Compliance with FIPS and NIST SPs
- Reporting requirements
- Procedural, audit and documentation requirements.
Below is a short list of some CSPs with a short description of the services they provide.
Equifax provides credentialing solutions certified that meet Federal security and privacy requirements. Equifax offers beyond basic name and address identification credential. Equifax provides methods of discerning an electronic identity in order to ensure that only trusted users have access to sensitive data and secure networks.
MediQuin is a credential service provider located in Irvine, California. MediQuin provides Medical Credentialing, provider applications, enrollment forms, verification services, and other medical related credential services.
Med Advantage provide numerous verification services.
- Board Certification - Verify Current certificate level
- Criminal Background - Verify State and/or Federal Criminal History
- DEA/CDS Registration - Verify by NTIS and/or by certificate
- Education - Verify Medical Education & Post graduate Education
- FSMB - Query The Federation of State Medical Boards
- License- Verify State license(s)
- Malpractice Claims - Verify from the carrier
- Malpractice Insurance - Verify from the Carrier or Certificate
- NPDB - Query The National Practitioner Databank
- HIPDB - Query The Healthcare Integrity and Protection Databank
- Privileges - Verify Hospital admitting Privileges and Delineation of Privileges
- References - Verify Professional references
- Sanctions - Query Medicare/Medicaid and State License
- Work History - Extract Work History from the Curriculum Vitae
Below is a table that shows the approximate cost for a Credential Service Provider in different Categories.
|Level||Educational Institution||Non-Profit||L0: 1-100 employees||L1: 101-1000 employees||L2: 10001-25000 employees||L3: >25000 employees|
|Credential Service Provider Subscriber||$2,000||$2,000||$4,000||$9,000||$16,500||$21,500|
|Credential Service Provider Renewal||$1,000||$1,000||$3,000||$8,000||$15,500||$20,500|
|Assessor Accreditation Subscriber||$1,500||$2,000||$5,000||$11,000||$17,000||$25,000|
|Assessor Accreditation Renewal||$1,000||$1,500||$4,000||$10,000||$16,000||$24,000|
The Kantara Initiative
The Initiative Identity Assurance Accreditation and Approval Program is a Kantara program that tries to use CPS in order to provide to private sectors with better reliable digital credentials.
Windows uses CSP to implement authentication protocols. With Windows Vista, a new authentication package called Credential Security Service Provider (CredSSP) was introduced. CredSSP uses the client-side CSP to enable applications delegate user's credentials to the target server.
- NIST Special Publication 800-63, Revision 3, Digital Identity Guidelines, June 2017
- "Archived copy" (PDF). Archived from the original (PDF) on 2012-10-01. Retrieved 2012-04-27.
- "Archived copy". Archived from the original on 2012-05-08. Retrieved 2012-05-07.
- "Archived copy". Archived from the original on 2012-05-03. Retrieved 2012-04-27.