信息安全研究 ›› 2021, Vol. 7 ›› Issue (E1): 106-.

• 优秀论文 • 上一篇    下一篇

可信终端身份认证解决方案

陈世杰;于丹;武杨   

  1. (腾讯科技(深圳)有限公司广东深圳518049)
  • 出版日期:2022-04-20 发布日期:2022-04-22
  • 通讯作者: 陈世杰 曾负责公安部、人民银行、中石化等单位信息安全建设工作.主要研究方向为PKICA、IAM、零信任. jermiechen@tencent.com
  • 作者简介:陈世杰 曾负责公安部、人民银行、中石化等单位信息安全建设工作.主要研究方向为PKICA、IAM、零信任. jermiechen@tencent.com 于丹 硕士.主要研究方向为数字身份认证、API安全、多因子身份认证. dandyu@tencent.com 武杨 博士,中国通信学会区块链专业委员会委员.发表论文10余篇(SCI 2篇),牵头国际标准3项,国家标准1项.主要研究方向为信息安全、大数据、区块链. youngywu@tencent.com

Identity Access Management with Trusted Device Solution

  • Online:2022-04-20 Published:2022-04-22

摘要: 可信终端身份认证解决方案以数字身份认证管控平台为枢纽,以可信身份数据为核心,与第三方终端安全产品相结合,实现终端信息、身份信息和应用信息动态关联.配合多样的安全认证方式,可信终端身份认证解决方案利用灵活的访问控制模型,强大的身份数据管理系统,实现与终端结合的动态身份认证,重新定义企业可信边界.该方案主要特点如下:1)以用户信息为核心,联动终端信息和应用信息,实现一站式用户生命周期管理;2)具备完善的身份数据管理能力,配合双轨机制,可以实现平滑、无感替换存在安全漏洞的AD域用户数据源;3)落实国家“国产自主可控”政策,与国家信创系统完美结合,通过实现高效安全的终端可信身份认证,形成一套完整的信创终端安全生态合作体系.

关键词: 可信终端, 身份认证, 多因子认证, 动态访问控制, 身份管理, 替换AD

Abstract: The Identity Access Management with trusted device solution is pivoted around the Digital Access Management Platform. Based on the trusted identity data at its core, the platform can be integrated with thirdparty device security products to achieve binding endpoint information, identity information, and application information dynamically. Providing various secure authentication methods, the Identity Access Management with Trusted Device Solution utilized the dynamic access control model and powerful identity management system to realize authenticating user identity dynamically based on device status. Such solution redefines the secured perimeter of an enterprise. The main features of this solution are as follows: 1) Based on user identity information at its core, binding device information and application information together to achieve full user lifecycle management in one console. 2) With full capabilities of identity management, combined with the twoway synchronization mechanism, the solution provides a smooth and seamless replacement of AD Domain, which has security risks, as a user data source.  3) In accordance with the “domestic made, independent and controllable” policy, this solution works seamlessly with systems created under China Information Technology Innovation Program. Providing efficient and secure authentication methods based on trusted devices, this solution creates a complete ecosystem based on all domestic made, innovative information technology devices.

Key words: trusted device, identity authentication, multi-factor authentication, dynamic access control, identity management, replace active directory (AD)