SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
A Model for
Privacy Enhanced
Federated Identity Management

Rainer Hörbe, EUSTIX Alliance
Privacy Issues in
Federated Identity
Management
Technical Privacy Controls for FIM
Standard FIM (e.g. SAML WebSSO)
PE-FIM
• Data minimization:
• Limited unobservability by TTP
• IdPs release only required
• IdP/AP talks to groups of
attributes, only to authorized
services, cannot identify
services
service
• Limited unlinkability between services • Limited unlinkability between
• Identifiers are targeted
services
• Impersonation
• Messaging, payment and
• (HoK)
delivery are pseudonymized;
!
e.g. IdP will proxy SMTP
!
traffic from targets email
address to registered one

Rationale for enhanced privacy: scaling federation across vertical sectors
Software Architecture
Research Group
Architectural challenge:

Technical controls to
Provide and evaluate
enhance privacy

principles, techniques,
and tools to support
and facilitate the
development and
evolution of softwareintensive system
Software Architecture
Research Group

Options for technical controls

Provide and evaluate
Identity escrow (zero-knowlege proof)
principles, techniques,
Late binding (separate authN from attributes)
and tools to support
Proxy pool (hub+spoke with many hubs)
and facilitate the
User-based IdPs (PAD, IMI) development and
Pseudonym SP, targeted evolution(PE-FIM)
attributes of softwareintensive system
!5
1.5

The Privacy-enhanced FIM Architecture (PE-FIM)

This model proposes an approach to federated identity management (FIM) that is
privacy-friendly with respect to the requirements defined above. It is based on a 3-tier
architecture that is an extended hub-and-spoke model with privacy by design principles applied to it. The hub is called the service broker (SB) in this model.

Software Architecture
Research Group

High-level Architecture.
The very outset of the PE-FIM model is the introduction of a secure pseudonymous
channel to support requirements R1, R2 and R3. The desired property of this bidirectional channel is that an IdP and an SP, or two SPs, can communicate about a principal, where (a) the SPs are pseudonymous to the IdPs, (b) the principal is pseudonymous to the SPs and (c) the IdP’s and SP’s identities are vouched for by the certificate
authority.

Pseudonym SP

one-time
Providecertificates evaluate
and
! principles, techniques,
and
pseudonymous secure channel tools to support
!
Service
and facilitate the
Provider
!
development and
!
message flow
message flow
Service
evolution of softwareBroker
intensive system

IdP trusts CA

Identity
Provider

Certificate
!
Authority

Fig. 2. High-level Architecture

It is assumed, but not shown in!6the picture above, that trust has been established be-
Software Architecture
Research Group

Pseudonymous SP

Provide
3-tier architecture (hub-and-spoke) and evaluate

principles, techniques,
Service broker (hub) does not see user attributes
and tools to support
SP issues one-time encryption keys signed by CA
and facilitate the
Group signatures would work as well
development and
Unobservability improves with number of services
evolution of softwareper Service Broker
intensive system
!7
Software Architecture
Research Group

Provide and
Targeted Attributes (e-mail) evaluate

principles, techniques,
Targeted email for SP is targeted id @to support
SB
and tools
and @ IdP
Targeted email for SB is targeted id facilitate the
development and
SB, IdP act as MTA and rewrite address
evolution of softwareintensive system
!8
Software Architecture
Research Group

Provide and evaluate
Pseudonymous Payment & Delivery
principles, techniques,
and tools to support
Virtual credit cards
and facilitate the
Intermediate PO-boxes(?)
development and
evolution of softwareintensive system
!9
Software Architecture
Research Group

Out of scope

Provide and evaluate
Display names (could beprinciples,+ number)
first name techniques,
and tools to support
IP-Addresses (need overlay networks)
and facilitate the
development and
!
evolution of softwareintensive system
!10
What else?
The model can be applied to SAML BAE, WSTrust and OIDC as well.
A profile for SAML looks like this:
Certificate
Authority

1
1

IdP-side
Metadata
Feed

SP-side
Metadata
Feed 2

7
1

3
1

Service Broker
MX
Login

IdP

9
1

10
1

SAML
5
1

Proxy

2
1
4
1

SP

App

9
1

AP

MX

8
1

Consent
Service

(4) /AuthnRequest/extension/pefim:SPCertEnc/ds:KeyInfo/..
(6) /Assertion/Advice/EncryptedAssertion
Project Status

Development underway for PoC using OpenAM,
Shibboleth and pysaml2
Demo @ EEMA/Vienna April 2014
Pilot project: EDI-federation in Austria

!13

Más contenido relacionado

Similar a Privacy-Enhanced Federated Identity Management Architecture (PE-FIM

Selecting-CPaaS-Vendor-for-Software-Integration.pptx
Selecting-CPaaS-Vendor-for-Software-Integration.pptxSelecting-CPaaS-Vendor-for-Software-Integration.pptx
Selecting-CPaaS-Vendor-for-Software-Integration.pptxBrijesh Kumar
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Donald Malloy
 
Open Reputation Management Systems
Open Reputation Management SystemsOpen Reputation Management Systems
Open Reputation Management SystemsAbbie Barbir
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsBeyondTrust
 
STL LItigation Services
STL LItigation ServicesSTL LItigation Services
STL LItigation Servicesguestc7f86
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodologyDatabase Architechs
 
#SPSottawa The SharePoint Framework and The Microsoft Graph on steroids with ...
#SPSottawa The SharePoint Framework and The Microsoft Graph on steroids with ...#SPSottawa The SharePoint Framework and The Microsoft Graph on steroids with ...
#SPSottawa The SharePoint Framework and The Microsoft Graph on steroids with ...Vincent Biret
 
Securing Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudSecuring Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudVMware Tanzu
 
Shared IT Solutions: The Secret Sauce for Research Collaboration
Shared IT Solutions: The Secret Sauce for Research CollaborationShared IT Solutions: The Secret Sauce for Research Collaboration
Shared IT Solutions: The Secret Sauce for Research CollaborationCybera Inc.
 
Gianluigi Viganò - How to use HP HEAVEN-on-demand functions for Big Data apps
Gianluigi Viganò - How to use HP HEAVEN-on-demand functions for Big Data appsGianluigi Viganò - How to use HP HEAVEN-on-demand functions for Big Data apps
Gianluigi Viganò - How to use HP HEAVEN-on-demand functions for Big Data appsCodemotion
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profilesanirudha
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture OverviewDavid Solivan
 
Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationnexB Inc.
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionIRJET Journal
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 

Similar a Privacy-Enhanced Federated Identity Management Architecture (PE-FIM (20)

Selecting-CPaaS-Vendor-for-Software-Integration.pptx
Selecting-CPaaS-Vendor-for-Software-Integration.pptxSelecting-CPaaS-Vendor-for-Software-Integration.pptx
Selecting-CPaaS-Vendor-for-Software-Integration.pptx
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
 
Rajasekhar Raju
Rajasekhar RajuRajasekhar Raju
Rajasekhar Raju
 
Open Reputation Management Systems
Open Reputation Management SystemsOpen Reputation Management Systems
Open Reputation Management Systems
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
STL LItigation Services
STL LItigation ServicesSTL LItigation Services
STL LItigation Services
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
 
Guru_poster
Guru_posterGuru_poster
Guru_poster
 
Master Data Management methodology
Master Data Management methodologyMaster Data Management methodology
Master Data Management methodology
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
#SPSottawa The SharePoint Framework and The Microsoft Graph on steroids with ...
#SPSottawa The SharePoint Framework and The Microsoft Graph on steroids with ...#SPSottawa The SharePoint Framework and The Microsoft Graph on steroids with ...
#SPSottawa The SharePoint Framework and The Microsoft Graph on steroids with ...
 
Securing Microservices in Hybrid Cloud
Securing Microservices in Hybrid CloudSecuring Microservices in Hybrid Cloud
Securing Microservices in Hybrid Cloud
 
Shared IT Solutions: The Secret Sauce for Research Collaboration
Shared IT Solutions: The Secret Sauce for Research CollaborationShared IT Solutions: The Secret Sauce for Research Collaboration
Shared IT Solutions: The Secret Sauce for Research Collaboration
 
Gianluigi Viganò - How to use HP HEAVEN-on-demand functions for Big Data apps
Gianluigi Viganò - How to use HP HEAVEN-on-demand functions for Big Data appsGianluigi Viganò - How to use HP HEAVEN-on-demand functions for Big Data apps
Gianluigi Viganò - How to use HP HEAVEN-on-demand functions for Big Data apps
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
PSI corporate profile
PSI corporate profilePSI corporate profile
PSI corporate profile
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture Overview
 
Rightsizing Open Source Software Identification
Rightsizing Open Source Software IdentificationRightsizing Open Source Software Identification
Rightsizing Open Source Software Identification
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 

Último

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Privacy-Enhanced Federated Identity Management Architecture (PE-FIM

  • 1. A Model for Privacy Enhanced Federated Identity Management Rainer Hörbe, EUSTIX Alliance
  • 2. Privacy Issues in Federated Identity Management
  • 3. Technical Privacy Controls for FIM Standard FIM (e.g. SAML WebSSO) PE-FIM • Data minimization: • Limited unobservability by TTP • IdPs release only required • IdP/AP talks to groups of attributes, only to authorized services, cannot identify services service • Limited unlinkability between services • Limited unlinkability between • Identifiers are targeted services • Impersonation • Messaging, payment and • (HoK) delivery are pseudonymized; ! e.g. IdP will proxy SMTP ! traffic from targets email address to registered one Rationale for enhanced privacy: scaling federation across vertical sectors
  • 4. Software Architecture Research Group Architectural challenge:
 Technical controls to Provide and evaluate enhance privacy principles, techniques, and tools to support and facilitate the development and evolution of softwareintensive system
  • 5. Software Architecture Research Group Options for technical controls Provide and evaluate Identity escrow (zero-knowlege proof) principles, techniques, Late binding (separate authN from attributes) and tools to support Proxy pool (hub+spoke with many hubs) and facilitate the User-based IdPs (PAD, IMI) development and Pseudonym SP, targeted evolution(PE-FIM) attributes of softwareintensive system !5
  • 6. 1.5 The Privacy-enhanced FIM Architecture (PE-FIM) This model proposes an approach to federated identity management (FIM) that is privacy-friendly with respect to the requirements defined above. It is based on a 3-tier architecture that is an extended hub-and-spoke model with privacy by design principles applied to it. The hub is called the service broker (SB) in this model. Software Architecture Research Group High-level Architecture. The very outset of the PE-FIM model is the introduction of a secure pseudonymous channel to support requirements R1, R2 and R3. The desired property of this bidirectional channel is that an IdP and an SP, or two SPs, can communicate about a principal, where (a) the SPs are pseudonymous to the IdPs, (b) the principal is pseudonymous to the SPs and (c) the IdP’s and SP’s identities are vouched for by the certificate authority. Pseudonym SP one-time Providecertificates evaluate and ! principles, techniques, and pseudonymous secure channel tools to support ! Service and facilitate the Provider ! development and ! message flow message flow Service evolution of softwareBroker intensive system IdP trusts CA Identity Provider Certificate ! Authority Fig. 2. High-level Architecture It is assumed, but not shown in!6the picture above, that trust has been established be-
  • 7. Software Architecture Research Group Pseudonymous SP Provide 3-tier architecture (hub-and-spoke) and evaluate principles, techniques, Service broker (hub) does not see user attributes and tools to support SP issues one-time encryption keys signed by CA and facilitate the Group signatures would work as well development and Unobservability improves with number of services evolution of softwareper Service Broker intensive system !7
  • 8. Software Architecture Research Group Provide and Targeted Attributes (e-mail) evaluate principles, techniques, Targeted email for SP is targeted id @to support SB and tools and @ IdP Targeted email for SB is targeted id facilitate the development and SB, IdP act as MTA and rewrite address evolution of softwareintensive system !8
  • 9. Software Architecture Research Group Provide and evaluate Pseudonymous Payment & Delivery principles, techniques, and tools to support Virtual credit cards and facilitate the Intermediate PO-boxes(?) development and evolution of softwareintensive system !9
  • 10. Software Architecture Research Group Out of scope Provide and evaluate Display names (could beprinciples,+ number) first name techniques, and tools to support IP-Addresses (need overlay networks) and facilitate the development and ! evolution of softwareintensive system !10
  • 11. What else? The model can be applied to SAML BAE, WSTrust and OIDC as well. A profile for SAML looks like this:
  • 13. Project Status Development underway for PoC using OpenAM, Shibboleth and pysaml2 Demo @ EEMA/Vienna April 2014 Pilot project: EDI-federation in Austria !13