SlideShare una empresa de Scribd logo
1 de 16
Case Study: A New Model
for Federated Identity
Management
Presented at the ESRA Conference
November 10, 2010



Randy V. Sabett
Partner and Co-Chair, Internet and Data
Protection Practice Group

T +1 202.408.6830
rsabett@snrdenton.com
snrdenton.com


                                          1
About SNR Denton


   SNR Denton is a client-focused international legal practice delivering quality
   and value.

   We serve clients in key business and financial centers from 48 locations in
   32 countries, through offices, associate firms and special alliances across
   the US, UK, Europe, the Middle East, Russia and the CIS, South-East Asia,
   and Africa, making us a top 25 legal services provider by lawyers and
   professionals worldwide.

   Joining the complementary top tier practices of its founding firms—
   Sonnenschein Nath & Rosenthal LLP and Denton Wilde Sapte LLP—SNR
   Denton offers business, government and institutional clients premier service
   and a disciplined focus to meet evolving needs in eight key industry sectors:
   Energy, Transport and Infrastructure; Financial Institutions and Funds;
   Government; Health and Life Sciences; Insurance; Manufacturing; Real
   Estate, Retail and Hotels; and Technology, Media and Telecommunications.


                                                                                    2
Our Locations




                3
Converged Issues in Federated Identity                           (legal/technical/administrative)




1   Scope of Problem                              2   Root Causes
    • Lack of trust                                   • Old model of communications focused
    • Multiple identity infrastructures                 on closed systems
    • Lack of widespread adoption of identity/        • Lack of widely accepted methods for
      credentialing standards                           electronic signatures
    • Paper is the traditional system of record       • Electronic identity is confused with
      for most entities                                 information technology
                                                      • Local regulatory and legal needs differ




3   Impact                                        4   The opportunity
    • Reduction in Identity access management         • Unified approach for identity, even at high
      costs (~$100 per user)                            levels of assurance
    • Transaction cost avoidance                      • Technology vs. people and paper
    • Clean data faster                               • Industry leadership – allow company to
    • Improve intellectual property protection          scale solution
      capabilities



                                                                                                  4
Review: Values of Federated Identity


     Tactical (Near Term) Value                    Strategic Value
           Infrastructure cost                Innovation and productivity
          reduction/avoidance                       improvements

  Identity management for 3rd parties    Transaction cost avoidance

  Supports single credential issuance    Simplifying external collaboration
   for employees/contractors              Compliance efficiencies
  Common applications enablement         Common liability framework

  Standard systems validation model      Improved intellectual property
                                           protection
  Expanded use of electronic and
   digital signatures



                                                                            5
Implementation Decisions


 Participant scope and relationships?
   • Risk management, geographic requirements & support
 Determining Business Value
   • Tactical vs. strategic
   • Common entry point
 Single or Tiered PKI ?
   • Financial, Regulatory, Legal and Enterprise transactions
 Legal
   • Contracts
 Insource, Outsource, or Hybrid?
   • Governance, Technical Integration, Privacy, Operations




                                                                6
Typical liability and contract issues


  Risk management
    – Relationship between liability assumption and control capability
    – How to manage current risks?
    – How to manage new risks?
  Issues introduced by Federated Identity
    – Legal enforceability and local dispute resolution capabilities
    – Relationships with technology and service providers
    – Relationships with employees, business partners, and others
  Support
    – Provisioning
    – Lifecycle management
    – Helpdesk/call center integration & escalation




                                                                         7
Typical Architecture Approach: Trust Bridge


     All entities can participate through an industry/government trust bridge

                                                 Federating
                                                   Entity
           Legally enforced
                digital
            signatures via
            global contract
                 law          SP/IdP             SP/IdP             SP/IdP


 Trust
               +
                                Users              Users               Users

 Bridge
                                                                 User
                                      User                    Credentials
                                    Credential


                               Accredited                           Accredited
                                 Issuer                               Issuer
             Technical        (Insourced)                          (Outsourced)
          interoperability
          via a Bridge CA
                                                 Bridge CA
                                                                                  8
Federation Introduces Additional Legal Variables


    Federation and third party bridges, however, don’t solve all trust issues…

                                             Federating                            A contract
                                               Entity                             may not exist

                                              +               +
                                                                                  between all
                                                                                    parties or
                                                                                     may not
                          SP/IdP               IdP        +             SP
                                                                                     address
                                                                                     identity
                                                                                   federation
                            Users                                      Users
                                                                                      issues
                                               Users


                                                                 User
                                  User                        Credentials
                                Credential


                           Accredited                               Accredited
                             Issuer                                   Issuer
                          (Insourced)                              (Outsourced)




                                             Bridge CA
                                                                                          9
                                    9
Why 3PA? Not just legal reasons



 Operational Risk – Federation has significant security advantages
  but creates points of “blind trust” for the relying party
   – For each IdP, the Federation Operator adjudicates the auditors
     opinion and report
   – The Federation Operator certifies IdPs against the COR
   – The Federation Operator helps to uniformly govern the
     community COR standard




    Introducing a Federation Operator who provides Third
   Party Assurance of the IdP mitigates this operational risk

                                                                      10
Bilateral Agreements Alone are Not Enough


    Legal Risk – The existing bilateral agreement between the SP and IdP does little to
     enforce the COR even when specific clauses are added
    Hypothetically, a SP becomes aware that the IdP is not following part of the COR but has
     not yet suffered damage
      – Without damage the SP is not likely to have contractual rights to claim breach of
        contract. I.e., this contract’s protection is only reactionary
    Plus
      – The SP is not in a position to likely be aware of a COR breach
      – At best, specific injunctive relief might be available in an egregious case of IdP
        neglect


       The SP obligating the IdP to the COR in their bilateral
       contract should be thought of as a backstop protection

                                                                                             11
Legal Advantages of 3PA



Legal Risk Mitigation
1. The IdP signs an agreement with the FO specifically to bind the IdP to the COR
    –       This contract with the FO will unequivocally be in breach if the IdP is not
            adhering to the COR
    –       This contract contains an indemnification of all SPs the IdP asserts identities to
2. The SP and IdP execute their business oriented bilateral agreement but include
    –       An obligation on the IdP to remain certified in good standing with the FO for the
            duration of their bilateral agreement.
        •       The IdP is now “doubly bound” to the COR and there in no need for the SP to reference the
                COR in this business contract
        •       Should the FO revoke the IdPs certification for failure to adhere to the COR, the relying party
                now has a material breach of this bilateral contract
    –       Any obligations the IdP wishes to place on the SP (data privacy, protection, etc.)
3. There is no general reason for a contract between the SP and the FO




                                                                                                             12
The 3PA Model – Summary Points


                                        Utilizes existing bilateral agreements between
                                         IdP and SP – only one clause is added to
                                         support Federation
                                           – Number of contracts is a good metric to
                                               judge a model but doesn’t take into account

                     En
                st


                       ab
             Tru                               how complicated or how “new” the


                          le
       les


                            s
                                               contracting material is

                           Tr
    ab


                              us
  En


                                 t
                                        Requires a new contract between the FO and
                                         the IdP … but, this only happens once per IdP/
                                         FO pair
                                        Creates a quasi-multilateral effect to the benefit
                                         of the SP (recall how hard multilateral contracts
                                         are to execute)
                                           – Specifically created through third party
                                               beneficiary rights defined in the IdP/FO
                                               contract.
                                        The COR defines most of the obligations on the
                                         IdP
                                           – The FO/IdP contract becomes boilerplate
                                               and scales to large numbers of IdPs as
                                               necessary


                                                                                    13
Variations on the Theme


       SP              FO   SP/IdPB          FO




               IdP                    IdPA


            V Model           Triangle Model




                     SP     SP               FO



                     FO




                     IdP
                            AP               IdP

            i Model               U Model




                                                   14
Summary


 The 3PA model incorporates the best features of other
  federation legal models
 All stakeholders can have certainty as to the rights and
  obligations of all of the entities involved in that
  federation
 A COR that is incorporated by reference in the contract
  between the FO and each IdP provides clarity




                          15
                                                        15
SNR Denton US LLP
1301 K Street, NW
Suite 600
Washington, DC 20005
USA


snrdenton.com

© 2010 SNR Denton. SNR Denton is the collective trade name for an international legal practice. Any reference to a "partner" means a partner, member, consultant or employee with equivalent standing and qualifications in one of
SNR Denton's affiliates. This publication is not designed to provide legal or other advice and you should not take, or refrain from taking, action based on its content. Attorney Advertising. Please see snrdenton.com for Legal Notices.




                                                                                                                                                                                                                                   16

Más contenido relacionado

La actualidad más candente

317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2dP2PSystem
 
2013 feb13 introduction to ppi generic
2013 feb13 introduction to ppi   generic2013 feb13 introduction to ppi   generic
2013 feb13 introduction to ppi genericRichard O'Brien
 
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -Naoto Miyachi
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authenticationlfilliat
 
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...Identive
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2Lucas Gritziotis
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsMartina Naughton
 
Open Source for Enterprise Search: Breaking Down the Barriers to Information
Open Source for Enterprise Search: Breaking Down the Barriers to InformationOpen Source for Enterprise Search: Breaking Down the Barriers to Information
Open Source for Enterprise Search: Breaking Down the Barriers to InformationLucidworks (Archived)
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...IJNSA Journal
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteitStichting ePortfolio Support
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
Experience and Outcomes of the New German Electronic ID Card
Experience and Outcomes of the New German Electronic ID CardExperience and Outcomes of the New German Electronic ID Card
Experience and Outcomes of the New German Electronic ID CardAtos_Worldline
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfStephen Rappaport
 

La actualidad más candente (18)

317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
 
2013 feb13 introduction to ppi generic
2013 feb13 introduction to ppi   generic2013 feb13 introduction to ppi   generic
2013 feb13 introduction to ppi generic
 
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
今更聞けない電子認証入門 - OAuth 2.0/OIDCからFIDOまで -
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
Bi Risk Services
Bi Risk ServicesBi Risk Services
Bi Risk Services
 
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Ireland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firmsIreland - The location of choice for International Payments firms
Ireland - The location of choice for International Payments firms
 
Open Source for Enterprise Search: Breaking Down the Barriers to Information
Open Source for Enterprise Search: Breaking Down the Barriers to InformationOpen Source for Enterprise Search: Breaking Down the Barriers to Information
Open Source for Enterprise Search: Breaking Down the Barriers to Information
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
Ecommerce Chap 08
Ecommerce Chap 08Ecommerce Chap 08
Ecommerce Chap 08
 
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Bi risk services 2013
Bi risk services 2013Bi risk services 2013
Bi risk services 2013
 
Experience and Outcomes of the New German Electronic ID Card
Experience and Outcomes of the New German Electronic ID CardExperience and Outcomes of the New German Electronic ID Card
Experience and Outcomes of the New German Electronic ID Card
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arf
 

Destacado

ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010Ulf Mattsson
 
Choosing the Right Data Security Solution
Choosing the Right Data Security SolutionChoosing the Right Data Security Solution
Choosing the Right Data Security SolutionProtegrity
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
FUSE (Filesystem in Userspace) on OpenSolaris
FUSE (Filesystem in Userspace) on OpenSolarisFUSE (Filesystem in Userspace) on OpenSolaris
FUSE (Filesystem in Userspace) on OpenSolariselliando dias
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentialityggarc153
 
Profile mua thi Kenhtuyensinh
Profile mua thi KenhtuyensinhProfile mua thi Kenhtuyensinh
Profile mua thi Kenhtuyensinhkenhtuyensinh
 
Maksim_Yurlov_Resume_2015_US
Maksim_Yurlov_Resume_2015_USMaksim_Yurlov_Resume_2015_US
Maksim_Yurlov_Resume_2015_USMaksim Yurlov
 
Aula 02 importância do chipset na escolha
Aula 02   importância do chipset na escolhaAula 02   importância do chipset na escolha
Aula 02 importância do chipset na escolhaMarcos Basilio
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim Yurlov
 
Special purposer lathe machine. ppt
Special purposer lathe machine. pptSpecial purposer lathe machine. ppt
Special purposer lathe machine. pptZAKI ANWER
 
Niagara College 2016
Niagara College 2016Niagara College 2016
Niagara College 2016Paul Copcutt
 
Maksim_Yurlov_Resume_2015_US
Maksim_Yurlov_Resume_2015_USMaksim_Yurlov_Resume_2015_US
Maksim_Yurlov_Resume_2015_USMaksim Yurlov
 
Felix 2016 - March 23rd 2016
Felix 2016 - March 23rd 2016Felix 2016 - March 23rd 2016
Felix 2016 - March 23rd 2016Paul Copcutt
 
Т.Анударь - МОТИВАЦИЙГ МАТЕМАТИК ЗАГВАР АШИГЛАН ТООЦООЛОХ НЬ
Т.Анударь - МОТИВАЦИЙГ МАТЕМАТИК ЗАГВАР АШИГЛАН ТООЦООЛОХ НЬТ.Анударь - МОТИВАЦИЙГ МАТЕМАТИК ЗАГВАР АШИГЛАН ТООЦООЛОХ НЬ
Т.Анударь - МОТИВАЦИЙГ МАТЕМАТИК ЗАГВАР АШИГЛАН ТООЦООЛОХ НЬbatnasanb
 

Destacado (20)

ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010ISACA Houston Texas Chapter 2010
ISACA Houston Texas Chapter 2010
 
Choosing the Right Data Security Solution
Choosing the Right Data Security SolutionChoosing the Right Data Security Solution
Choosing the Right Data Security Solution
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Uncovering Public Information on Private Companies by Chris Roush
Uncovering Public Information on Private Companies by Chris RoushUncovering Public Information on Private Companies by Chris Roush
Uncovering Public Information on Private Companies by Chris Roush
 
FUSE (Filesystem in Userspace) on OpenSolaris
FUSE (Filesystem in Userspace) on OpenSolarisFUSE (Filesystem in Userspace) on OpenSolaris
FUSE (Filesystem in Userspace) on OpenSolaris
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Privacy and confidentiality
Privacy and confidentialityPrivacy and confidentiality
Privacy and confidentiality
 
#Sarreufa
#Sarreufa#Sarreufa
#Sarreufa
 
Profile mua thi Kenhtuyensinh
Profile mua thi KenhtuyensinhProfile mua thi Kenhtuyensinh
Profile mua thi Kenhtuyensinh
 
Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?
 
Maksim_Yurlov_Resume_2015_US
Maksim_Yurlov_Resume_2015_USMaksim_Yurlov_Resume_2015_US
Maksim_Yurlov_Resume_2015_US
 
Aula 02 importância do chipset na escolha
Aula 02   importância do chipset na escolhaAula 02   importância do chipset na escolha
Aula 02 importância do chipset na escolha
 
WILB 2015
WILB 2015WILB 2015
WILB 2015
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rus
 
Special purposer lathe machine. ppt
Special purposer lathe machine. pptSpecial purposer lathe machine. ppt
Special purposer lathe machine. ppt
 
Niagara College 2016
Niagara College 2016Niagara College 2016
Niagara College 2016
 
Maksim_Yurlov_Resume_2015_US
Maksim_Yurlov_Resume_2015_USMaksim_Yurlov_Resume_2015_US
Maksim_Yurlov_Resume_2015_US
 
Felix 2016 - March 23rd 2016
Felix 2016 - March 23rd 2016Felix 2016 - March 23rd 2016
Felix 2016 - March 23rd 2016
 
Т.Анударь - МОТИВАЦИЙГ МАТЕМАТИК ЗАГВАР АШИГЛАН ТООЦООЛОХ НЬ
Т.Анударь - МОТИВАЦИЙГ МАТЕМАТИК ЗАГВАР АШИГЛАН ТООЦООЛОХ НЬТ.Анударь - МОТИВАЦИЙГ МАТЕМАТИК ЗАГВАР АШИГЛАН ТООЦООЛОХ НЬ
Т.Анударь - МОТИВАЦИЙГ МАТЕМАТИК ЗАГВАР АШИГЛАН ТООЦООЛОХ НЬ
 
Pharmaceutical Auditing and Inspections Professor Peivand Pirouzi 2010
Pharmaceutical Auditing and Inspections   Professor Peivand Pirouzi 2010Pharmaceutical Auditing and Inspections   Professor Peivand Pirouzi 2010
Pharmaceutical Auditing and Inspections Professor Peivand Pirouzi 2010
 

Similar a Sabett: ESRA Identity Management 11-09-10

User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMOKsystem
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すHyperleger Tokyo Meetup
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...PECB
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412OracleIDM
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at ScaleCloudIDSummit
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonEduserv
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?sorenpeter
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013Mydex CIC
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 

Similar a Sabett: ESRA Identity Management 11-09-10 (20)

User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCM
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
180926 ihan webinar 2
180926 ihan webinar 2180926 ihan webinar 2
180926 ihan webinar 2
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at Scale
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 
Vinod Rebello
Vinod RebelloVinod Rebello
Vinod Rebello
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 

Más de Electronic Signature & Records Association

Más de Electronic Signature & Records Association (16)

MISMO / eMortgage Update
MISMO / eMortgage UpdateMISMO / eMortgage Update
MISMO / eMortgage Update
 
FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0
 
Legal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and SpainLegal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and Spain
 
Student Lending
Student LendingStudent Lending
Student Lending
 
Smedinghoff: International Adoption
Smedinghoff: International AdoptionSmedinghoff: International Adoption
Smedinghoff: International Adoption
 
Patrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosingsPatrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosings
 
Patfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial ActsPatfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial Acts
 
Margo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory UpdateMargo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory Update
 
IRS Expansion of e-Signature Applications
IRS Expansion of e-Signature ApplicationsIRS Expansion of e-Signature Applications
IRS Expansion of e-Signature Applications
 
Harry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse LendingHarry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse Lending
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the FutureEdward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
 
ESRA Update 2011
ESRA Update 2011ESRA Update 2011
ESRA Update 2011
 
Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0
 
Taking Transactions Mobile
Taking Transactions MobileTaking Transactions Mobile
Taking Transactions Mobile
 
IRS Alternative Signatures
IRS Alternative SignaturesIRS Alternative Signatures
IRS Alternative Signatures
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Sabett: ESRA Identity Management 11-09-10

  • 1. Case Study: A New Model for Federated Identity Management Presented at the ESRA Conference November 10, 2010 Randy V. Sabett Partner and Co-Chair, Internet and Data Protection Practice Group T +1 202.408.6830 rsabett@snrdenton.com snrdenton.com 1
  • 2. About SNR Denton SNR Denton is a client-focused international legal practice delivering quality and value. We serve clients in key business and financial centers from 48 locations in 32 countries, through offices, associate firms and special alliances across the US, UK, Europe, the Middle East, Russia and the CIS, South-East Asia, and Africa, making us a top 25 legal services provider by lawyers and professionals worldwide. Joining the complementary top tier practices of its founding firms— Sonnenschein Nath & Rosenthal LLP and Denton Wilde Sapte LLP—SNR Denton offers business, government and institutional clients premier service and a disciplined focus to meet evolving needs in eight key industry sectors: Energy, Transport and Infrastructure; Financial Institutions and Funds; Government; Health and Life Sciences; Insurance; Manufacturing; Real Estate, Retail and Hotels; and Technology, Media and Telecommunications. 2
  • 4. Converged Issues in Federated Identity (legal/technical/administrative) 1 Scope of Problem 2 Root Causes • Lack of trust • Old model of communications focused • Multiple identity infrastructures on closed systems • Lack of widespread adoption of identity/ • Lack of widely accepted methods for credentialing standards electronic signatures • Paper is the traditional system of record • Electronic identity is confused with for most entities information technology • Local regulatory and legal needs differ 3 Impact 4 The opportunity • Reduction in Identity access management • Unified approach for identity, even at high costs (~$100 per user) levels of assurance • Transaction cost avoidance • Technology vs. people and paper • Clean data faster • Industry leadership – allow company to • Improve intellectual property protection scale solution capabilities 4
  • 5. Review: Values of Federated Identity Tactical (Near Term) Value Strategic Value Infrastructure cost Innovation and productivity reduction/avoidance improvements  Identity management for 3rd parties  Transaction cost avoidance  Supports single credential issuance  Simplifying external collaboration for employees/contractors  Compliance efficiencies  Common applications enablement  Common liability framework  Standard systems validation model  Improved intellectual property protection  Expanded use of electronic and digital signatures 5
  • 6. Implementation Decisions  Participant scope and relationships? • Risk management, geographic requirements & support  Determining Business Value • Tactical vs. strategic • Common entry point  Single or Tiered PKI ? • Financial, Regulatory, Legal and Enterprise transactions  Legal • Contracts  Insource, Outsource, or Hybrid? • Governance, Technical Integration, Privacy, Operations 6
  • 7. Typical liability and contract issues  Risk management – Relationship between liability assumption and control capability – How to manage current risks? – How to manage new risks?  Issues introduced by Federated Identity – Legal enforceability and local dispute resolution capabilities – Relationships with technology and service providers – Relationships with employees, business partners, and others  Support – Provisioning – Lifecycle management – Helpdesk/call center integration & escalation 7
  • 8. Typical Architecture Approach: Trust Bridge All entities can participate through an industry/government trust bridge Federating Entity Legally enforced digital signatures via global contract law SP/IdP SP/IdP SP/IdP Trust + Users Users Users Bridge User User Credentials Credential Accredited Accredited Issuer Issuer Technical (Insourced) (Outsourced) interoperability via a Bridge CA Bridge CA 8
  • 9. Federation Introduces Additional Legal Variables Federation and third party bridges, however, don’t solve all trust issues… Federating A contract Entity may not exist + + between all parties or may not SP/IdP IdP + SP address identity federation Users Users issues Users User User Credentials Credential Accredited Accredited Issuer Issuer (Insourced) (Outsourced) Bridge CA 9 9
  • 10. Why 3PA? Not just legal reasons  Operational Risk – Federation has significant security advantages but creates points of “blind trust” for the relying party – For each IdP, the Federation Operator adjudicates the auditors opinion and report – The Federation Operator certifies IdPs against the COR – The Federation Operator helps to uniformly govern the community COR standard Introducing a Federation Operator who provides Third Party Assurance of the IdP mitigates this operational risk 10
  • 11. Bilateral Agreements Alone are Not Enough  Legal Risk – The existing bilateral agreement between the SP and IdP does little to enforce the COR even when specific clauses are added  Hypothetically, a SP becomes aware that the IdP is not following part of the COR but has not yet suffered damage – Without damage the SP is not likely to have contractual rights to claim breach of contract. I.e., this contract’s protection is only reactionary  Plus – The SP is not in a position to likely be aware of a COR breach – At best, specific injunctive relief might be available in an egregious case of IdP neglect The SP obligating the IdP to the COR in their bilateral contract should be thought of as a backstop protection 11
  • 12. Legal Advantages of 3PA Legal Risk Mitigation 1. The IdP signs an agreement with the FO specifically to bind the IdP to the COR – This contract with the FO will unequivocally be in breach if the IdP is not adhering to the COR – This contract contains an indemnification of all SPs the IdP asserts identities to 2. The SP and IdP execute their business oriented bilateral agreement but include – An obligation on the IdP to remain certified in good standing with the FO for the duration of their bilateral agreement. • The IdP is now “doubly bound” to the COR and there in no need for the SP to reference the COR in this business contract • Should the FO revoke the IdPs certification for failure to adhere to the COR, the relying party now has a material breach of this bilateral contract – Any obligations the IdP wishes to place on the SP (data privacy, protection, etc.) 3. There is no general reason for a contract between the SP and the FO 12
  • 13. The 3PA Model – Summary Points  Utilizes existing bilateral agreements between IdP and SP – only one clause is added to support Federation – Number of contracts is a good metric to judge a model but doesn’t take into account En st ab Tru how complicated or how “new” the le les s contracting material is Tr ab us En t  Requires a new contract between the FO and the IdP … but, this only happens once per IdP/ FO pair  Creates a quasi-multilateral effect to the benefit of the SP (recall how hard multilateral contracts are to execute) – Specifically created through third party beneficiary rights defined in the IdP/FO contract.  The COR defines most of the obligations on the IdP – The FO/IdP contract becomes boilerplate and scales to large numbers of IdPs as necessary 13
  • 14. Variations on the Theme SP FO SP/IdPB FO IdP IdPA V Model Triangle Model SP SP FO FO IdP AP IdP i Model U Model 14
  • 15. Summary  The 3PA model incorporates the best features of other federation legal models  All stakeholders can have certainty as to the rights and obligations of all of the entities involved in that federation  A COR that is incorporated by reference in the contract between the FO and each IdP provides clarity 15 15
  • 16. SNR Denton US LLP 1301 K Street, NW Suite 600 Washington, DC 20005 USA snrdenton.com © 2010 SNR Denton. SNR Denton is the collective trade name for an international legal practice. Any reference to a "partner" means a partner, member, consultant or employee with equivalent standing and qualifications in one of SNR Denton's affiliates. This publication is not designed to provide legal or other advice and you should not take, or refrain from taking, action based on its content. Attorney Advertising. Please see snrdenton.com for Legal Notices. 16