The Initiative for Open Authentication (OATH) is a collaborative effort of IT industry leaders aimed at providing a reference architecture for universal strong authentication across all users and all devices over all networks. Using open standards, OATH will offer more hardware choices, lower cost of ownership, and allow customers to replace existing disparate and proprietary security systems whose complexity often leads to higher costs.
High Level Features of OATH Reference Architecture:
- Open, royalty free specification – leverages existing standards where possible and initiates standardization efforts in other well-established technical standards bodies as needed
- Device innovation and embedding – supports a variety of authentication form factors (tokens, smart cards, etc.) as well as transformation of existing mobile devices (mobile phones, PDAs, laptops, etc.) into authentication devices.
- Interoperable modules – framework components are designed to be interoperable to provide flexibility in solution development and deployment.
- Native platform support – designed to integrate with existing identity and access management platforms and infrastructure (e.g. LDAP directories, AAA servers)
Benefits for Authentication Solution Providers:
- Interoperability and personal networking opportunities allows vendors to create solutions that work with complementary vendors in “best of breed” solutions
- Comprehensive framework provides architecture for development of complete “end-to-end” solutions
- Reduced cost or research and development through royalty-free, open standards-based specifications and technical collaboration.
- Facilitates technology innovation in development of hardware and software “devices” using multiple authentication methods (OTP, SIM, PKI-based)
Benefits for Enterprises Deploying Authentication:
- Increase user / consumer acceptability of strong authentication
- Potential to drive revenues through a more secure online experience for consumers / users
- Reduced cost of solution deployment by simplifying solution component integration, allowing validation to be deployed as a “network utility”
- Reduced cost of solution deployment by enabling sharing / reuse of authentication device with multiple web sites or applications
- Open standards approach prevents “vendor lock-in” and broader vendor choice for flexible, best-in-class solution deployment
Benefits for Consumers / End Users:
- Reduced risk and impact of identity theft through more widespread deployment of strong authentication
- Convenience and improved user experience through a broad range of authentication devices and services