SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
Introduction to
Self-Sovereign Identity
INTERNET IDENTITY WORKSHOP | SPRING 2020
Nice to Meet You
WELCOME
AGENDAHOSTS
Karyl Fowler
CEO @Transmute
@TheKaryl
karyl@transmute.industries
Juan Caballero
Comms / Research @Spherity GmbH
@by_caballero
juan.caballero@spherity.com
1. Two Tales: Self-Sovereign Identity
2. SSI: The Movement
3. SSI: The Technology
4. Pairing the Two: Uses & Applications
5. Where to Learn More & Get Involved
6. Audience Q&A
2
Self-Sovereign Identity (SSI)
TWO PARTS
The Movement The Technology
3
The Movement
SELF – SOVEREIGN IDENTITY
Influential writers and essayists:
- Kim Cameron (“Laws of Identity”, 2005)
- Doc Searls (co-founded IIW in 2005 with...)
- Kaliya Young (...who gives this talk some years!)
- Christopher Allen (author of “10 principles” and of slide #6!)
4
Shared Ideals
THE MOVEMENT
Data Sovereignty
21st Century
Governance & Policy21st Century
Business Practices
Decentralized
Identity / SSI
Decentralization,
Shared data,
Open source
Open data,
Data rights
Privacy-by-design, Open standards
& protocols, Data unions, Rights to
Repair & Portability
Radical
Transparency
& Auditability,
Ecosystem design,
Mechanism design,
Incentive
engineering
Multi-stakeholder
data controls,
Differential privacy,
Data accountability,
revocable anonymity
Digital-first,
Trust economics
5
Key characteristics:
• Minimum Disclosure
• Full Control
• Necessary Proofs
• Legally-Enabled
6
Key characteristics:
• Anonymity
• Web of Trust
• Censorship Resistance
• Defend Human Rights vs. Powerful Actors
(nation states, multi-national corps,
mafias, etc.)
* Originally coined by Tim Bouma (@trbouma) https://medium.com/@trbouma/less-identity-65f65d87f56b
CC BY-SA 4.0
Less Identity + Trustless Identity
TWO MAJOR TRACKS
Or more properly
“Trust Minimized” Identity
“Legally-Enabled
Self-Sovereign” Identity*
SLIDE CREDIT: CHRISTOPHER ALLEN’S ODYSSEY PRESENTATION 2020
7
The Technology
SELF – SOVEREIGN IDENTITY
Identity is the gene of
software applications.
8
©TRANSMUTE | ALL RIGHTS RESERVED.
Centralized Identity
EXISTING WAY OF DOING THINGS
9
Our “identities” (assembling into “profiles”) are stored away
on the servers of identity providers, which own the structure,
the content, and the access rights to everything we do.
They lend us a key, but they can change the locks, or throw
away the contents. We are but lowly subjects of the data
barons.
Federated Identity
EXISTING WAY OF DOING THINGS 2.0
10
By linking together silos into a “federation,” managers of
businesses, platforms and services can outsource the “ID
checks” at the door, making them interchangeable and
interoperable. Authentication is tricky business, and most
relying parties are happy to offload this headache…
...onto ever more powerful middlemen who now hold richer,
multi-silo identities on all of us in exchange for this
convenience. Single-Sign On makes the data barons into
data emperors.
Today’s Problems
PAST WAY OF DOING THINGS CAUSED
11
• Usage data collected to create detailed profiles with all-or-nothing access
• Who owns user data & decides how it’s used?
• Difficult to delegate or attenuate access or privileges dynamically
• Users can’t control how their data is secured or shared
(or notified if there is a breach)
• Single points of failure and honeypots everywhere
• Usernames + Password databases are an attack surface
• Data bloat: businesses taking on liability for more data than they need
• There is no identity layer that persists across all systems
• Lacking data portability
SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
Decentralized Identity
WEB 3.0 WAY OF DOING THINGS
Blockchains and DLTs aren’t perfect, but they’re the
best way currently stable and production-ready for
self-publishing and self-controlling the cryptographic
keys for our identity. Some work (such as KERI and
Sidetree) are pushing the envelope on other ways
of decentralizing public key infrastructure.
Tech Foundations
SELF – SOVEREIGN IDENTITY
Decentralized Identifiers (DIDs):
self-controlled, digital fingerprints assigned to
people, entities, or things
Verifiable Credentials (VCs): Like “files” but
with granular controls baked in
Resolvers (“Mini DNS”): can function as
local namespaces (or not)
Secure Data Storage (“lockers”): Extend
granular controls to underlying data
Cutting-edge Privacy-preserving Crypto:
Zero-Knowledge, Differential Privacy, MPC, etc
Wallets & Agents: Web interfaces beyond
the “browser”/”app” paradigm 13
A Decentralized Identifier (DID) is a new
type of identifier that is globally unique,
resolvable with high availability, and
cryptographically verifiable.
Decentralized Identifiers
DEFINITION
14
https://w3c-ccg.github.io/did-primer/
The purpose of the DID document is to
describe the public keys, authentication
protocols, and service endpoints necessary
to bootstrap cryptographically-verifiable
interactions with the identified entity.
>50 DID Methods Today
DIFFERENT STROKES FOR DIFFERENT FOLKS
15
https://w3c-ccg.github.io/did-method-registry/
A verifiable credential (VC) is a set of tamper-evident claims
and metadata about real life achievements, qualifications, or
attributes that includes a cryptographic proof about who
issued it.
Verifiable Credentials
DEFINITION
16
https://www.w3.org/TR/vc-data-model/#credentials
Examples of verifiable credentials include digital employee
identification cards, digital birth certificates, and digital
educational certificates, authentication and authorization
bearer tokens, logistics or shipping certifications.
• Reduce database security risks and business process risks
• Give users increased to total control over their identity data and credentials
• Increased data portability and near-global scope (for reputation and history)
• Increase business efficiency through streamlined onboarding & auditing
• Reduce fraud by confirming multiple data points
• Streamline confirmation of compliance data/documentation
• Increase trust of any verified data that must be shared downstream, in a form more
persistent than the legal persons involved
• Key use cases: Drug trials, Compliance documents, Provenance data
DIDs + VCs Can...
SO WHAT?
17
SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
FRAMEWORK FOR ADOPTION
1. Is selective disclosure or privacy a priority?
2. Is there high coordination burden?
3. Is traceability or auditability important?
Application Areas
Chains of Custody
Commercial + Defense Supply Chain Logistics
Cold Chain (pharma to agriculture)
Contract Management (Legal, HR, Real Estate)
Software
Data Infrastructure & Governance_
Cloud roles + access management_
Microservices monitoring_
Telco
5G + IoT Enablement
Identity/Data-as-a-Service
Anti-Fraud (verification + roaming)
Healthcare_
Insurance + Billing_
Patient-centric data sharing + management_
18©TRANSMUTE | ALL RIGHTS RESERVED.
Ideas
(2-10 years)
Incubation
(6-18 months)
Refinement
(1-3 years)
Standardization
(~18-24 months)
Conversations
Whitepapers, position
papers
Experiments, Specifications,
Pilots
Standards
W3C Community Groups
Rebooting the Web
of Trust
19
SLIDE CREDIT: HEATHER VESCENT @ THE PURPLE TORNADO
Get Involved
RESOURCES
Primary Sources:
• W3C Credentials Community Group
• DIF Working Group Records
• Rebooting the Web of Trust Conference, Proceedings & Digests
• Internet Identity Workshop (You are here) Conf & Notes
Secondary Sources & Commentaries:
• 2019 IIW Intro to SSI Deck by Heather Vescent + Karyl Fowler + Lucas
Tétreault
• 2018 IIW Intro to SSI Deck by Heather Vescent + Kim Hamilton Duffy
• 2018 IIW Intro to SSI Deck by Drummond Reed +
• Infominer’s Resources: https://decentralized-id.com/
• The Purple Tornado reports for US DHS (2019)
• PSA (Privacy, Surveillance, Anonymity) Podcast (Kaliya Young, Seth
Goldstein)
• SSIMeetup Webinar series (Alex Preukschat)
• Definitely Identity podcast (Tim Bouma)
• One World Identity (“KNOW”) Podcast
• MyData Slack and Conference series
• CyberForge (includes some great posts by Anil John, US DHS S&T)
• Transmute TechTalk: On Enterprise Use + Integrations
Monographs:
• Comprehensive Guide to Self Sovereign Identity (2019) - Heather
Vescent / Kaliya Young
• Spherity’s SSI 101 Series on Medium (2020) - Juan Caballero
• Self Sovereign Identity (2021) - Alex Preukschat / Drummond Reed
Technical Resources:
• W3C DID Specification & Use Case guidance
• W3C VC Data Model Specification
• Digital Credential Consortium whitepaper (Kim Hamilton Duffy)
• Secure Data Storage Specification WG (DIF-W3C)
• Credential Handler API (CHAPI)
• Universal Resolver (Danube Tech)
• Trust Over IP Foundation (TBD)
• DIDcomm WG (DIF-W3C)
• Aries RFCs (Hyperledger)
20
Knowledge Bases + Education
REFERENCES
Thank You!QUESTIONS?

Más contenido relacionado

La actualidad más candente

Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityEvernym
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
 
Introduction to Corda Blockchain for Developers
Introduction to Corda Blockchain for DevelopersIntroduction to Corda Blockchain for Developers
Introduction to Corda Blockchain for DevelopersR3
 
eKYC POC on Azure
eKYC POC on Azure eKYC POC on Azure
eKYC POC on Azure R3
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases101 Blockchains
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized IdentityJim Flynn
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?Evernym
 
Blockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - ClaventBlockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - ClaventAraf Karsh Hamid
 
Blockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsStrategyWorks
 
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain TechnologyList of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology101 Blockchains
 
Blockchain Powerpoint Presentation Slides
Blockchain Powerpoint Presentation SlidesBlockchain Powerpoint Presentation Slides
Blockchain Powerpoint Presentation SlidesSlideTeam
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology Niuversity
 
Blockchain, Hyperledger and the Oracle Blockchain Platform
Blockchain, Hyperledger and the Oracle Blockchain PlatformBlockchain, Hyperledger and the Oracle Blockchain Platform
Blockchain, Hyperledger and the Oracle Blockchain PlatformJuarez Junior
 
Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618Arnaud Le Hors
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain PresentationZied GUESMI
 
Blockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricBlockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricAraf Karsh Hamid
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technologyhellygeorge
 

La actualidad más candente (20)

Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
Introduction to Corda Blockchain for Developers
Introduction to Corda Blockchain for DevelopersIntroduction to Corda Blockchain for Developers
Introduction to Corda Blockchain for Developers
 
eKYC POC on Azure
eKYC POC on Azure eKYC POC on Azure
eKYC POC on Azure
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
 
Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
Blockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - ClaventBlockchain HyperLedger Fabric Internals - Clavent
Blockchain HyperLedger Fabric Internals - Clavent
 
Blockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and CredentialsBlockchain, Self-Sovereign Identity and Credentials
Blockchain, Self-Sovereign Identity and Credentials
 
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain TechnologyList of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
 
Blockchain Powerpoint Presentation Slides
Blockchain Powerpoint Presentation SlidesBlockchain Powerpoint Presentation Slides
Blockchain Powerpoint Presentation Slides
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology
 
Blockchain, Hyperledger and the Oracle Blockchain Platform
Blockchain, Hyperledger and the Oracle Blockchain PlatformBlockchain, Hyperledger and the Oracle Blockchain Platform
Blockchain, Hyperledger and the Oracle Blockchain Platform
 
Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618Hyperledger Fabric Technical Deep Dive 20190618
Hyperledger Fabric Technical Deep Dive 20190618
 
Blockchain Presentation
Blockchain PresentationBlockchain Presentation
Blockchain Presentation
 
Blockchain - HyperLedger Fabric
Blockchain - HyperLedger FabricBlockchain - HyperLedger Fabric
Blockchain - HyperLedger Fabric
 
Blockchain technology
Blockchain technologyBlockchain technology
Blockchain technology
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 

Similar a Introduction to Self-Sovereign Identity

Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Digipolis Antwerpen
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Kaliya "Identity Woman" Young
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Kaliya "Identity Woman" Young
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentAnil John
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018Kaliya "Identity Woman" Young
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessKaliya "Identity Woman" Young
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Modelsdrummondreed
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すHyperleger Tokyo Meetup
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellmansaastr
 

Similar a Introduction to Self-Sovereign Identity (20)

Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
Meetup 24/5/2018 - Digitale identiteit op blockchain (Self-Sovereign Identity)
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon Self-Sovereign Identity: Lightening Talk at RightsCon
Self-Sovereign Identity: Lightening Talk at RightsCon
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity Deployment
 
The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018The Domains of Identity & Self-Sovereign Identity MyData 2018
The Domains of Identity & Self-Sovereign Identity MyData 2018
 
My Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and OpennessMy Identiverse: The Evolution of Digital Identity and Openness
My Identiverse: The Evolution of Digital Identity and Openness
 
How Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business ModelsHow Personal Cloud Networks Enable New Business Models
How Personal Cloud Networks Enable New Business Models
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
IAM
IAMIAM
IAM
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized IdentityData Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
Data Con LA 2022 - Pre- recorded - Web3 and Decentralized Identity
 
Web 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with SchellmanWeb 3.0 – From Buzzword to Security with Schellman
Web 3.0 – From Buzzword to Security with Schellman
 

Último

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Último (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Introduction to Self-Sovereign Identity

  • 1. Introduction to Self-Sovereign Identity INTERNET IDENTITY WORKSHOP | SPRING 2020
  • 2. Nice to Meet You WELCOME AGENDAHOSTS Karyl Fowler CEO @Transmute @TheKaryl karyl@transmute.industries Juan Caballero Comms / Research @Spherity GmbH @by_caballero juan.caballero@spherity.com 1. Two Tales: Self-Sovereign Identity 2. SSI: The Movement 3. SSI: The Technology 4. Pairing the Two: Uses & Applications 5. Where to Learn More & Get Involved 6. Audience Q&A 2
  • 3. Self-Sovereign Identity (SSI) TWO PARTS The Movement The Technology 3
  • 4. The Movement SELF – SOVEREIGN IDENTITY Influential writers and essayists: - Kim Cameron (“Laws of Identity”, 2005) - Doc Searls (co-founded IIW in 2005 with...) - Kaliya Young (...who gives this talk some years!) - Christopher Allen (author of “10 principles” and of slide #6!) 4
  • 5. Shared Ideals THE MOVEMENT Data Sovereignty 21st Century Governance & Policy21st Century Business Practices Decentralized Identity / SSI Decentralization, Shared data, Open source Open data, Data rights Privacy-by-design, Open standards & protocols, Data unions, Rights to Repair & Portability Radical Transparency & Auditability, Ecosystem design, Mechanism design, Incentive engineering Multi-stakeholder data controls, Differential privacy, Data accountability, revocable anonymity Digital-first, Trust economics 5
  • 6. Key characteristics: • Minimum Disclosure • Full Control • Necessary Proofs • Legally-Enabled 6 Key characteristics: • Anonymity • Web of Trust • Censorship Resistance • Defend Human Rights vs. Powerful Actors (nation states, multi-national corps, mafias, etc.) * Originally coined by Tim Bouma (@trbouma) https://medium.com/@trbouma/less-identity-65f65d87f56b CC BY-SA 4.0 Less Identity + Trustless Identity TWO MAJOR TRACKS Or more properly “Trust Minimized” Identity “Legally-Enabled Self-Sovereign” Identity* SLIDE CREDIT: CHRISTOPHER ALLEN’S ODYSSEY PRESENTATION 2020
  • 7. 7 The Technology SELF – SOVEREIGN IDENTITY
  • 8. Identity is the gene of software applications. 8 ©TRANSMUTE | ALL RIGHTS RESERVED.
  • 9. Centralized Identity EXISTING WAY OF DOING THINGS 9 Our “identities” (assembling into “profiles”) are stored away on the servers of identity providers, which own the structure, the content, and the access rights to everything we do. They lend us a key, but they can change the locks, or throw away the contents. We are but lowly subjects of the data barons.
  • 10. Federated Identity EXISTING WAY OF DOING THINGS 2.0 10 By linking together silos into a “federation,” managers of businesses, platforms and services can outsource the “ID checks” at the door, making them interchangeable and interoperable. Authentication is tricky business, and most relying parties are happy to offload this headache… ...onto ever more powerful middlemen who now hold richer, multi-silo identities on all of us in exchange for this convenience. Single-Sign On makes the data barons into data emperors.
  • 11. Today’s Problems PAST WAY OF DOING THINGS CAUSED 11 • Usage data collected to create detailed profiles with all-or-nothing access • Who owns user data & decides how it’s used? • Difficult to delegate or attenuate access or privileges dynamically • Users can’t control how their data is secured or shared (or notified if there is a breach) • Single points of failure and honeypots everywhere • Usernames + Password databases are an attack surface • Data bloat: businesses taking on liability for more data than they need • There is no identity layer that persists across all systems • Lacking data portability SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
  • 12. Decentralized Identity WEB 3.0 WAY OF DOING THINGS Blockchains and DLTs aren’t perfect, but they’re the best way currently stable and production-ready for self-publishing and self-controlling the cryptographic keys for our identity. Some work (such as KERI and Sidetree) are pushing the envelope on other ways of decentralizing public key infrastructure.
  • 13. Tech Foundations SELF – SOVEREIGN IDENTITY Decentralized Identifiers (DIDs): self-controlled, digital fingerprints assigned to people, entities, or things Verifiable Credentials (VCs): Like “files” but with granular controls baked in Resolvers (“Mini DNS”): can function as local namespaces (or not) Secure Data Storage (“lockers”): Extend granular controls to underlying data Cutting-edge Privacy-preserving Crypto: Zero-Knowledge, Differential Privacy, MPC, etc Wallets & Agents: Web interfaces beyond the “browser”/”app” paradigm 13
  • 14. A Decentralized Identifier (DID) is a new type of identifier that is globally unique, resolvable with high availability, and cryptographically verifiable. Decentralized Identifiers DEFINITION 14 https://w3c-ccg.github.io/did-primer/ The purpose of the DID document is to describe the public keys, authentication protocols, and service endpoints necessary to bootstrap cryptographically-verifiable interactions with the identified entity.
  • 15. >50 DID Methods Today DIFFERENT STROKES FOR DIFFERENT FOLKS 15 https://w3c-ccg.github.io/did-method-registry/
  • 16. A verifiable credential (VC) is a set of tamper-evident claims and metadata about real life achievements, qualifications, or attributes that includes a cryptographic proof about who issued it. Verifiable Credentials DEFINITION 16 https://www.w3.org/TR/vc-data-model/#credentials Examples of verifiable credentials include digital employee identification cards, digital birth certificates, and digital educational certificates, authentication and authorization bearer tokens, logistics or shipping certifications.
  • 17. • Reduce database security risks and business process risks • Give users increased to total control over their identity data and credentials • Increased data portability and near-global scope (for reputation and history) • Increase business efficiency through streamlined onboarding & auditing • Reduce fraud by confirming multiple data points • Streamline confirmation of compliance data/documentation • Increase trust of any verified data that must be shared downstream, in a form more persistent than the legal persons involved • Key use cases: Drug trials, Compliance documents, Provenance data DIDs + VCs Can... SO WHAT? 17 SLIDE INSPIRATION: HEATHER VESCENT + KIM HAMILTON DUFFY + KALIYA YOUNG
  • 18. FRAMEWORK FOR ADOPTION 1. Is selective disclosure or privacy a priority? 2. Is there high coordination burden? 3. Is traceability or auditability important? Application Areas Chains of Custody Commercial + Defense Supply Chain Logistics Cold Chain (pharma to agriculture) Contract Management (Legal, HR, Real Estate) Software Data Infrastructure & Governance_ Cloud roles + access management_ Microservices monitoring_ Telco 5G + IoT Enablement Identity/Data-as-a-Service Anti-Fraud (verification + roaming) Healthcare_ Insurance + Billing_ Patient-centric data sharing + management_ 18©TRANSMUTE | ALL RIGHTS RESERVED.
  • 19. Ideas (2-10 years) Incubation (6-18 months) Refinement (1-3 years) Standardization (~18-24 months) Conversations Whitepapers, position papers Experiments, Specifications, Pilots Standards W3C Community Groups Rebooting the Web of Trust 19 SLIDE CREDIT: HEATHER VESCENT @ THE PURPLE TORNADO Get Involved RESOURCES
  • 20. Primary Sources: • W3C Credentials Community Group • DIF Working Group Records • Rebooting the Web of Trust Conference, Proceedings & Digests • Internet Identity Workshop (You are here) Conf & Notes Secondary Sources & Commentaries: • 2019 IIW Intro to SSI Deck by Heather Vescent + Karyl Fowler + Lucas Tétreault • 2018 IIW Intro to SSI Deck by Heather Vescent + Kim Hamilton Duffy • 2018 IIW Intro to SSI Deck by Drummond Reed + • Infominer’s Resources: https://decentralized-id.com/ • The Purple Tornado reports for US DHS (2019) • PSA (Privacy, Surveillance, Anonymity) Podcast (Kaliya Young, Seth Goldstein) • SSIMeetup Webinar series (Alex Preukschat) • Definitely Identity podcast (Tim Bouma) • One World Identity (“KNOW”) Podcast • MyData Slack and Conference series • CyberForge (includes some great posts by Anil John, US DHS S&T) • Transmute TechTalk: On Enterprise Use + Integrations Monographs: • Comprehensive Guide to Self Sovereign Identity (2019) - Heather Vescent / Kaliya Young • Spherity’s SSI 101 Series on Medium (2020) - Juan Caballero • Self Sovereign Identity (2021) - Alex Preukschat / Drummond Reed Technical Resources: • W3C DID Specification & Use Case guidance • W3C VC Data Model Specification • Digital Credential Consortium whitepaper (Kim Hamilton Duffy) • Secure Data Storage Specification WG (DIF-W3C) • Credential Handler API (CHAPI) • Universal Resolver (Danube Tech) • Trust Over IP Foundation (TBD) • DIDcomm WG (DIF-W3C) • Aries RFCs (Hyperledger) 20 Knowledge Bases + Education REFERENCES