VeriSign is promoting the use of standards in the token market.

VeriSign has announced the formation of the Open Authentication Reference Architecture (OATH) alliance and is publishing the first white paper detailing such a reference architecture.

OATH will base 90% to 95% of its framework on existing standards, such as LDAP and RADIUS, VeriSign’s VP of authentication services Mark Griffiths said. It will work on two areas that, he says, lack much-needed standardization.

The group will work on standards for credential provisioning, and on a standard algorithm for generating one-time passwords. This work will be submitted to groups such as the Trusted Computing Group, the IETF and the Smart Card Alliance.

The idea is to allow buyers to pick-n-mix the best or cheapest authentication products, knowing they will interoperate. Currently, different vendors use different methods, which can lead to vendor lock-in for buyers.

OATH members are drawn from the markets that provide token-based authentication, and those that provide systems that leverage it. Named participants include Aventail, ActivCard, Aladdin, ARM [ARM.L], Axalto, BEA [BEAS], Gemplus [GEM.PA], HP [HPQ], IBM [IBM] and Rainbow [RNBO].

RSA, which owns more than half the token market with its SecurID devices, is not a member of OATH. Given the amount of recurring revenue SecurID creates, the company arguably has a vested interest in keeping its methods proprietary.

VeriSign is also getting into the token business at least for a while in order to stimulate the market, Mr Griffiths said. VeriSign will later this year start selling two USB tokens, one based on smart card technology with a digital certificate built-in.

It seems that this business may be not core to its strategy, however. The company prefers to offer the hosted lookup services in which it specializes, and it seems its moves into authentication are also aimed at pushing this type of service.

The OATH architecture will allow for validation services to be hosted locally on a user’s network, as they generally are today, or hosted elsewhere on the Internet, such as on VeriSign’s ATLAS lookup processing servers.

This article is based on material originally published by ComputerWire