SlideShare una empresa de Scribd logo
1 de 13
A few thoughts on the state of the art of identity W3C SWXG - 9 June 2010 Paul Trevithick v2
Why is identity a hard problem? Short answer: It is being worked on by many communities with differring perceptions of the requirements
Language varies by community Identity := globally unique identifier + attributes And a single user can have multiple GUIDs and differring sets of attributes Identity := a set of attributes [may include an identifier] One user can have multiple sets of attributes, some of which may include identifier attributes Communities that adhere to this perspective consider it a significant conceptual advance over the identity:=identifier framing Most of us avoid the word identity—too overloaded to be useful One of a hundred examples: “A fundamental requirement for enabling privacy on the Web is that publishers need to be able to control who as access to their information resources”1.  What’s a publisher? Don’t you mean user?  [1] http://esw.w3.org/PrivacyAwareWeb 3
Requirements vary by community Levels of assurance (LOA) (4 NIST levels, etc.) RPs need higher LOA >1 in some use cases Challenge is that this is considered a “long tail” requirement and thus considered out of scope by many who are focusing on social web (high transaction volume, low value transactions) Verfied third party vs. self-asserted attributes Most social Web use cases require only self-asserted attributes [WebID] Other use cases require verified attributes from third parties (e.g. payment use cases)  Attribute aggregation Some use cases make a distinction between an identity provider and an attribute provider. RPs need attributes from N>1 sources 4
Requirements vary by community Linkability “Identifier has to be universal and linkable”1 “A universal identity system must support both “omni-directional” identifiers for use by public entities and “unidirectional” identifiers for use by private entities, thus facilitating discovery while preventing unnecessary release of correlation handle”2 Some uses cases require high assurance and unlinkability (and sometimes even offline presentation of security tokens). Requires tech such as uProve (Microsoft) or Idemix (IBM) Levels of protection (for the user) Have user-agent/RP exchanges involve signed contracts Support accountability not just secrecy [1] http://esw.w3.org/PrivacyAwareWeb [2] http://www.identityblog.com/?p=352  - Cameron’s Laws of Identity  5
Proliferation of communities Identity Commons (2005) http://idcommons.net Best known for IIW unconference 2/yr. OpenID Foundation (2007) http://openid.net At a crossroads: strong internal competition: OpenID Connect (OAuth-based) and OpenID V.Next What problems are we trying to solve? Federated login from a centralized IdP (e.g. Facebook)? User-managed identity with a distributed architecture? DataPortability.org (2007) http://dataportability.org Has been an advocacy organization; now looking at data sharing policies Information Card Foundation (2008) http://informationcard.net Really should be called the active client foundation First generation: defined by Microsoft’s CardSpace and the OASIS IMI protocol Next generation: Integrated with the browser. Consistent UX across protocols including: un/pw, OpenID (to reduce phishing), IMI (legacy), and OpenID V.Next, client side certs (perhaps)? 6
Proliferation of communities Kantara (2009) - http://kantarainitiative.org Strategically positioned to be the cross-protocol “center”; not fully realized Absorbed and replaced the Liberty Alliance Does work in areas of “trust frameworks” (IAF), certification, eGovernment, User-Managed-Access (UMA), cross protocol login user experience (ULX), VRM, etc. OpenIdentityExchange.org (2010) - http://openidentityexchange.org Foster trust framework (“rules”) layer above the tech (“tools”) Jointly formed by OpenID Foundation and the InfoCard Foundation initially to serve the US Federal government’s need for a trust framework, now broadening to other areas. RPs won’t pay money for attributes/identities without trust frameworks in place XAuth.org (2010) – http://xauth.org/info/ Attempts to solve the NASCAR (discovery) problem (without requiring an active client) Introduces a central server but cookies are stored on the browser’s [HTML5] local storage 7
OpenID roadmap is being debated Legacy OpenID 2.0 - http://openid.net/developers/specs/ Completed in 2007; supported by the OIDF (openid.net) Claim 50,000 RPs and growing Useful for low assurance use cases (e.g. LOA 1) OpenID-AB [Attribute Binding] - http://bitbucket.org/openid/ab/wiki/Home Proposed by Nat Sakamura and others in early 2009 Similarities with OpenID Connect, OAuth-like access token, etc. OpenID Connect - http://openidconnect.com New (May 2010) proposal by David Recordon and others Layers over and leverages OAuth 2.0 User’s identifier now decoupled from their “profile URL” Breaking change from OpenID 2.0 OpenID V.Next	 WG within OIDF chaired by Dick Hardt Assumption is that it will handle a wider set of use cases than 2.0 and Connect Breaking change from OpenID 2.0 8
Personal opinion Efforts continue to create the “one protocol to rule them all” SAML…Infocard/IMI…OpenID…OpenID-Connect…OpenID-V.Next…WebID… Meanwhile UN/PW isn’t going away anytime soon And neither are the previous attempts to overthrow it–each have their adherents We have learned that we need to make the tech easy to adopt by RPs E.g. cross-protocol libraries & services  We have learned that users don’t care about protocols They need an easy to use, consistent user experience irrespective of protocol We have learned that we need a “better with” strategy for active clients Active clients (aka to some as “identity in the browser”) must be optional The reaction of the market to the current chaos of “open” identity tech is “wait and see” (although proprietary solutions (mostly Facebook) are being rapidly adopted) The open identity community is not organized to meet the above needs It may be time for some rethinking, consolidation and restructuring 9
Two Social Web Issues
Identifiers and UX In the beginning OpenID said: “type in your OpenID URI”  Users didn’t get it Then OpenID said: “click on a button” (NASCAR popup) Better UX & conversion rates  Tyranny of the mega-brands +… Recently some are saying “type in your email address” and we’ll use that to discover your IdP [e.g. see webfinger.info]  Even better UX & conversion rates so far  Tyranny of the mega-brand email providers Now XAuth says “click on a button from a personalized list”  Probably the best UX possible (without an active client) 11
Attribute schemas RDF (FOAF, vCard…) Portable Contacts ActivityStrea.ms OpenID AX ICF Schemas WG SAML attributes Facebook OGP etc.  Personal opinion: we need to make consuming attributes easy for RPs by providing them with schema mapping services that eliminate the need to commit to each IdP’s schema. 12
Questions & Comments

Más contenido relacionado

La actualidad más candente

The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...OpenID Foundation Japan
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsEvernym
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
 
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID ConnectOpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID ConnectOpenAthens
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI PlatformEvernym
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Evernym
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarEvernym
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 

La actualidad más candente (20)

The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Ecosystem map Prototype & Future Vision
Ecosystem map  Prototype & Future VisionEcosystem map  Prototype & Future Vision
Ecosystem map Prototype & Future Vision
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
An Expert Panel on Safe Credentials
An Expert Panel on Safe CredentialsAn Expert Panel on Safe Credentials
An Expert Panel on Safe Credentials
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
OIDC4VP for AB/C WG
OIDC4VP for AB/C WGOIDC4VP for AB/C WG
OIDC4VP for AB/C WG
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID ConnectOpenAthens Conference 2018 - Don Thibeau - OpenID Connect
OpenAthens Conference 2018 - Don Thibeau - OpenID Connect
 
Openid
OpenidOpenid
Openid
 
Meet Evernym's SSI Platform
Meet Evernym's SSI PlatformMeet Evernym's SSI Platform
Meet Evernym's SSI Platform
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
 
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym WebinarGetting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
Getting Started With Self-Sovereign Identity (SSI) | Evernym Webinar
 
History of Identity in Computers
History of Identity in ComputersHistory of Identity in Computers
History of Identity in Computers
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 

Destacado

Higgins active clients and personal data stores v2
Higgins active clients and personal data stores v2Higgins active clients and personal data stores v2
Higgins active clients and personal data stores v2Paul Trevithick
 
E Citizen Workshop At Mit V2 Paul
E Citizen Workshop At Mit V2   PaulE Citizen Workshop At Mit V2   Paul
E Citizen Workshop At Mit V2 PaulPaul Trevithick
 
Introducing Joost Widgets (2007 talk)
Introducing Joost Widgets (2007 talk)Introducing Joost Widgets (2007 talk)
Introducing Joost Widgets (2007 talk)Dan Brickley
 
Du Web 2.0 au Web Sémantique avec FOAF et SIOC
Du Web 2.0 au Web Sémantique avec FOAF et SIOCDu Web 2.0 au Web Sémantique avec FOAF et SIOC
Du Web 2.0 au Web Sémantique avec FOAF et SIOCAlexandre Passant
 
XForms and eXist: A Perfect Couple
XForms and eXist: A Perfect CoupleXForms and eXist: A Perfect Couple
XForms and eXist: A Perfect Coupleebruchez
 
Implementing the Media Fragments URI Specification
Implementing the Media Fragments URI SpecificationImplementing the Media Fragments URI Specification
Implementing the Media Fragments URI SpecificationRaphael Troncy
 
XMPP, TV and the Semantic Web
XMPP, TV and the Semantic WebXMPP, TV and the Semantic Web
XMPP, TV and the Semantic WebDan Brickley
 
Identity Technology Trend Overview, February 2009
Identity Technology Trend Overview, February 2009Identity Technology Trend Overview, February 2009
Identity Technology Trend Overview, February 2009Tatsuo Kudo
 
Interlinking Multimedia: How to Apply Linked Data Principles to Multimedia F...
Interlinking Multimedia: How to Apply Linked Data Principles to Multimedia F...Interlinking Multimedia: How to Apply Linked Data Principles to Multimedia F...
Interlinking Multimedia: How to Apply Linked Data Principles to Multimedia F...Raphael Troncy
 

Destacado (9)

Higgins active clients and personal data stores v2
Higgins active clients and personal data stores v2Higgins active clients and personal data stores v2
Higgins active clients and personal data stores v2
 
E Citizen Workshop At Mit V2 Paul
E Citizen Workshop At Mit V2   PaulE Citizen Workshop At Mit V2   Paul
E Citizen Workshop At Mit V2 Paul
 
Introducing Joost Widgets (2007 talk)
Introducing Joost Widgets (2007 talk)Introducing Joost Widgets (2007 talk)
Introducing Joost Widgets (2007 talk)
 
Du Web 2.0 au Web Sémantique avec FOAF et SIOC
Du Web 2.0 au Web Sémantique avec FOAF et SIOCDu Web 2.0 au Web Sémantique avec FOAF et SIOC
Du Web 2.0 au Web Sémantique avec FOAF et SIOC
 
XForms and eXist: A Perfect Couple
XForms and eXist: A Perfect CoupleXForms and eXist: A Perfect Couple
XForms and eXist: A Perfect Couple
 
Implementing the Media Fragments URI Specification
Implementing the Media Fragments URI SpecificationImplementing the Media Fragments URI Specification
Implementing the Media Fragments URI Specification
 
XMPP, TV and the Semantic Web
XMPP, TV and the Semantic WebXMPP, TV and the Semantic Web
XMPP, TV and the Semantic Web
 
Identity Technology Trend Overview, February 2009
Identity Technology Trend Overview, February 2009Identity Technology Trend Overview, February 2009
Identity Technology Trend Overview, February 2009
 
Interlinking Multimedia: How to Apply Linked Data Principles to Multimedia F...
Interlinking Multimedia: How to Apply Linked Data Principles to Multimedia F...Interlinking Multimedia: How to Apply Linked Data Principles to Multimedia F...
Interlinking Multimedia: How to Apply Linked Data Principles to Multimedia F...
 

Similar a SWXG 2010.6.9 v2

Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Donald Malloy
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
OpenID Progress EEMA Conference
OpenID Progress EEMA ConferenceOpenID Progress EEMA Conference
OpenID Progress EEMA Conferenceevidos
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestPaulaPaulSlides
 
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsGluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsDuncan Johnston-Watt
 
Taking A Look At Web Services
Taking A Look At Web ServicesTaking A Look At Web Services
Taking A Look At Web ServicesStacey Cruz
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementGluu
 
DWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For MakersDWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For MakersTechSoup
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptmamathajagarlamudi2
 
Epochs Web 1 2 3 V3 0b
Epochs Web 1 2 3   V3 0bEpochs Web 1 2 3   V3 0b
Epochs Web 1 2 3 V3 0bNigel Green
 
[MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format][MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format]webhostingguy
 
[MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format][MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format]webhostingguy
 
Web 2.0 Core Concepts, Applications, and Implications
Web 2.0 Core Concepts, Applications, and ImplicationsWeb 2.0 Core Concepts, Applications, and Implications
Web 2.0 Core Concepts, Applications, and ImplicationsTomáš Pitner
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSIJNSA Journal
 

Similar a SWXG 2010.6.9 v2 (20)

Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
OpenID Progress EEMA Conference
OpenID Progress EEMA ConferenceOpenID Progress EEMA Conference
OpenID Progress EEMA Conference
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail Quest
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain ApplicationsGluecon 2016 Keynote: Deploying and Managing Blockchain Applications
Gluecon 2016 Keynote: Deploying and Managing Blockchain Applications
 
Taking A Look At Web Services
Taking A Look At Web ServicesTaking A Look At Web Services
Taking A Look At Web Services
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
DWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For MakersDWeb and Civil Society: An Introduction For Makers
DWeb and Civil Society: An Introduction For Makers
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.ppt
 
BlockchainLAB Hackathon
BlockchainLAB HackathonBlockchainLAB Hackathon
BlockchainLAB Hackathon
 
Epochs Web 1 2 3 V3 0b
Epochs Web 1 2 3   V3 0bEpochs Web 1 2 3   V3 0b
Epochs Web 1 2 3 V3 0b
 
Codemash-2017
Codemash-2017Codemash-2017
Codemash-2017
 
Federated and fabulous identity
Federated and fabulous identityFederated and fabulous identity
Federated and fabulous identity
 
[MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format][MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format]
 
[MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format][MS PowerPoint 97/2000 format]
[MS PowerPoint 97/2000 format]
 
Web 2.0 Core Concepts, Applications, and Implications
Web 2.0 Core Concepts, Applications, and ImplicationsWeb 2.0 Core Concepts, Applications, and Implications
Web 2.0 Core Concepts, Applications, and Implications
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

SWXG 2010.6.9 v2

  • 1. A few thoughts on the state of the art of identity W3C SWXG - 9 June 2010 Paul Trevithick v2
  • 2. Why is identity a hard problem? Short answer: It is being worked on by many communities with differring perceptions of the requirements
  • 3. Language varies by community Identity := globally unique identifier + attributes And a single user can have multiple GUIDs and differring sets of attributes Identity := a set of attributes [may include an identifier] One user can have multiple sets of attributes, some of which may include identifier attributes Communities that adhere to this perspective consider it a significant conceptual advance over the identity:=identifier framing Most of us avoid the word identity—too overloaded to be useful One of a hundred examples: “A fundamental requirement for enabling privacy on the Web is that publishers need to be able to control who as access to their information resources”1. What’s a publisher? Don’t you mean user? [1] http://esw.w3.org/PrivacyAwareWeb 3
  • 4. Requirements vary by community Levels of assurance (LOA) (4 NIST levels, etc.) RPs need higher LOA >1 in some use cases Challenge is that this is considered a “long tail” requirement and thus considered out of scope by many who are focusing on social web (high transaction volume, low value transactions) Verfied third party vs. self-asserted attributes Most social Web use cases require only self-asserted attributes [WebID] Other use cases require verified attributes from third parties (e.g. payment use cases) Attribute aggregation Some use cases make a distinction between an identity provider and an attribute provider. RPs need attributes from N>1 sources 4
  • 5. Requirements vary by community Linkability “Identifier has to be universal and linkable”1 “A universal identity system must support both “omni-directional” identifiers for use by public entities and “unidirectional” identifiers for use by private entities, thus facilitating discovery while preventing unnecessary release of correlation handle”2 Some uses cases require high assurance and unlinkability (and sometimes even offline presentation of security tokens). Requires tech such as uProve (Microsoft) or Idemix (IBM) Levels of protection (for the user) Have user-agent/RP exchanges involve signed contracts Support accountability not just secrecy [1] http://esw.w3.org/PrivacyAwareWeb [2] http://www.identityblog.com/?p=352 - Cameron’s Laws of Identity 5
  • 6. Proliferation of communities Identity Commons (2005) http://idcommons.net Best known for IIW unconference 2/yr. OpenID Foundation (2007) http://openid.net At a crossroads: strong internal competition: OpenID Connect (OAuth-based) and OpenID V.Next What problems are we trying to solve? Federated login from a centralized IdP (e.g. Facebook)? User-managed identity with a distributed architecture? DataPortability.org (2007) http://dataportability.org Has been an advocacy organization; now looking at data sharing policies Information Card Foundation (2008) http://informationcard.net Really should be called the active client foundation First generation: defined by Microsoft’s CardSpace and the OASIS IMI protocol Next generation: Integrated with the browser. Consistent UX across protocols including: un/pw, OpenID (to reduce phishing), IMI (legacy), and OpenID V.Next, client side certs (perhaps)? 6
  • 7. Proliferation of communities Kantara (2009) - http://kantarainitiative.org Strategically positioned to be the cross-protocol “center”; not fully realized Absorbed and replaced the Liberty Alliance Does work in areas of “trust frameworks” (IAF), certification, eGovernment, User-Managed-Access (UMA), cross protocol login user experience (ULX), VRM, etc. OpenIdentityExchange.org (2010) - http://openidentityexchange.org Foster trust framework (“rules”) layer above the tech (“tools”) Jointly formed by OpenID Foundation and the InfoCard Foundation initially to serve the US Federal government’s need for a trust framework, now broadening to other areas. RPs won’t pay money for attributes/identities without trust frameworks in place XAuth.org (2010) – http://xauth.org/info/ Attempts to solve the NASCAR (discovery) problem (without requiring an active client) Introduces a central server but cookies are stored on the browser’s [HTML5] local storage 7
  • 8. OpenID roadmap is being debated Legacy OpenID 2.0 - http://openid.net/developers/specs/ Completed in 2007; supported by the OIDF (openid.net) Claim 50,000 RPs and growing Useful for low assurance use cases (e.g. LOA 1) OpenID-AB [Attribute Binding] - http://bitbucket.org/openid/ab/wiki/Home Proposed by Nat Sakamura and others in early 2009 Similarities with OpenID Connect, OAuth-like access token, etc. OpenID Connect - http://openidconnect.com New (May 2010) proposal by David Recordon and others Layers over and leverages OAuth 2.0 User’s identifier now decoupled from their “profile URL” Breaking change from OpenID 2.0 OpenID V.Next WG within OIDF chaired by Dick Hardt Assumption is that it will handle a wider set of use cases than 2.0 and Connect Breaking change from OpenID 2.0 8
  • 9. Personal opinion Efforts continue to create the “one protocol to rule them all” SAML…Infocard/IMI…OpenID…OpenID-Connect…OpenID-V.Next…WebID… Meanwhile UN/PW isn’t going away anytime soon And neither are the previous attempts to overthrow it–each have their adherents We have learned that we need to make the tech easy to adopt by RPs E.g. cross-protocol libraries & services We have learned that users don’t care about protocols They need an easy to use, consistent user experience irrespective of protocol We have learned that we need a “better with” strategy for active clients Active clients (aka to some as “identity in the browser”) must be optional The reaction of the market to the current chaos of “open” identity tech is “wait and see” (although proprietary solutions (mostly Facebook) are being rapidly adopted) The open identity community is not organized to meet the above needs It may be time for some rethinking, consolidation and restructuring 9
  • 10. Two Social Web Issues
  • 11. Identifiers and UX In the beginning OpenID said: “type in your OpenID URI” Users didn’t get it Then OpenID said: “click on a button” (NASCAR popup) Better UX & conversion rates Tyranny of the mega-brands +… Recently some are saying “type in your email address” and we’ll use that to discover your IdP [e.g. see webfinger.info] Even better UX & conversion rates so far Tyranny of the mega-brand email providers Now XAuth says “click on a button from a personalized list” Probably the best UX possible (without an active client) 11
  • 12. Attribute schemas RDF (FOAF, vCard…) Portable Contacts ActivityStrea.ms OpenID AX ICF Schemas WG SAML attributes Facebook OGP etc. Personal opinion: we need to make consuming attributes easy for RPs by providing them with schema mapping services that eliminate the need to commit to each IdP’s schema. 12