SlideShare una empresa de Scribd logo
1 de 20
Identity federation &  user centric identity Maarten Wegdam Novay (formerly Telematica Instituut) Identity 2009, 6 October 2009
What to expect ,[object Object],[object Object],[object Object],[object Object],[object Object]
Who am I? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity federation – the basics ,[object Object],[object Object],[object Object],identity provider (IdP) user relying party also called: service provider
Why identity federation? sales pitch for a service provider  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sectors and examples in NL B2G C2B B2B C2G eHerkenning Digitaal Paspoort (Sivi) OpenID.nl+ intra organization
5 reasons why identity federation is difficult ,[object Object],[object Object],[object Object],[object Object],[object Object]
Business model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User centric identity – what is it? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User centric identity OpenID is more than a hype ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User centric identity OpenID is more than a hype ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User centric identity OpenID & SAML: beyond the marketing ,[object Object],[object Object],[object Object],[object Object],[object Object]
User centric identity Information Cards  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User centric identity Information Cards  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[inspired by Venn of Identity by Eve Maler] Comparison SAML OpenID InfoCard simplicity and scalability  over security client less closed trust model enables user centric identity anti-phishing & IdP-RP unlinkability integrates with web services client centered “ old” and much used “ new” and hype “ very new” and promising IdP discovery features
Scaling federations & trust ,[object Object],[object Object],[object Object],[object Object]
Scaling federations & Trust  Trust models [OASIS] ,[object Object],[object Object],[object Object],[object Object],[object Object],IdP RP IdP TTP RP IdP RP
Scaling federations & Trust  Identity-as-a-Service  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Scaling federations & Trust  Approaches to scaling trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key take aways ,[object Object],[object Object],[object Object],[object Object],[object Object],More information: [email_address] blog:  http://maarten.wegdam.name

Más contenido relacionado

La actualidad más candente

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
Lucas Gritziotis
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 

La actualidad más candente (19)

Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Access management
Access managementAccess management
Access management
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other WorldsCIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
 
Learning 2.0 and OpenID
Learning 2.0 and OpenIDLearning 2.0 and OpenID
Learning 2.0 and OpenID
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
SWID Tag Creation Tool
SWID Tag Creation Tool SWID Tag Creation Tool
SWID Tag Creation Tool
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signature
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Cidway Byod Authentication
Cidway Byod AuthenticationCidway Byod Authentication
Cidway Byod Authentication
 
Experiences in federated access control for UK e-Science
Experiences in federated access control for UK e-ScienceExperiences in federated access control for UK e-Science
Experiences in federated access control for UK e-Science
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
 

Destacado

How information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedHow information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 branded
Nalneesh Gaur
 

Destacado (9)

Identity federation and strong authentication
Identity federation and strong authenticationIdentity federation and strong authentication
Identity federation and strong authentication
 
How information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 brandedHow information security empowers mobile innovation v3 branded
How information security empowers mobile innovation v3 branded
 
Identity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons LearnedIdentity Federation for the Enterprise: Lessons Learned
Identity Federation for the Enterprise: Lessons Learned
 
SSIR corporate presentation
SSIR corporate presentationSSIR corporate presentation
SSIR corporate presentation
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Understanding 'Authentication' and 'Identity Federation'
Understanding 'Authentication' and 'Identity Federation'Understanding 'Authentication' and 'Identity Federation'
Understanding 'Authentication' and 'Identity Federation'
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Federation
Federation Federation
Federation
 
The Next Half Century of Co-operation
The Next Half Century of Co-operationThe Next Half Century of Co-operation
The Next Half Century of Co-operation
 

Similar a Identity federation & user centric identity

Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
Roger CARHUATOCTO
 
Identity Management as an Enabler for Digital Transformation
Identity Management as an Enabler for Digital TransformationIdentity Management as an Enabler for Digital Transformation
Identity Management as an Enabler for Digital Transformation
Carlos Sousa
 

Similar a Identity federation & user centric identity (20)

Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
A A A
A A AA A A
A A A
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
Identity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.pptIdentity_and_Access_Management_Overview.ppt
Identity_and_Access_Management_Overview.ppt
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
IBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo ReynoldsIBM CIO 2010 Outlook - Roo Reynolds
IBM CIO 2010 Outlook - Roo Reynolds
 
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...
CIS 2015 How to Maximize the Business Value of Identity and Preference Manage...
 
Identity is key - Robin Gorris
Identity is key - Robin GorrisIdentity is key - Robin Gorris
Identity is key - Robin Gorris
 
Improve identity management with open id
Improve identity management with open idImprove identity management with open id
Improve identity management with open id
 
Navigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT StrategyNavigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT Strategy
 
Identity Management as an Enabler for Digital Transformation
Identity Management as an Enabler for Digital TransformationIdentity Management as an Enabler for Digital Transformation
Identity Management as an Enabler for Digital Transformation
 
Azure AD B2C An Introduction - DogFoodCon 2018
Azure AD B2C An Introduction - DogFoodCon 2018Azure AD B2C An Introduction - DogFoodCon 2018
Azure AD B2C An Introduction - DogFoodCon 2018
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Cloud computing in context
Cloud computing in contextCloud computing in context
Cloud computing in context
 

Más de wegdam

2de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 292de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 29
wegdam
 

Más de wegdam (20)

Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
 
Digital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studyDigital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case study
 
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
 
AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)
 
#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data
 
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielNovay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
 
Cloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenCloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en technieken
 
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...
XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced ...
 
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
 
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
 
The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)
 
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
 
User controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatieUser controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatie
 
cidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventcidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA event
 
2de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 292de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 29
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)
 
cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)
 
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
 
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
 

Identity federation & user centric identity

  • 1. Identity federation & user centric identity Maarten Wegdam Novay (formerly Telematica Instituut) Identity 2009, 6 October 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Sectors and examples in NL B2G C2B B2B C2G eHerkenning Digitaal Paspoort (Sivi) OpenID.nl+ intra organization
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. [inspired by Venn of Identity by Eve Maler] Comparison SAML OpenID InfoCard simplicity and scalability over security client less closed trust model enables user centric identity anti-phishing & IdP-RP unlinkability integrates with web services client centered “ old” and much used “ new” and hype “ very new” and promising IdP discovery features
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.

Notas del editor

  1. 17.30 Identity federaties en hoe deze te schalen Vertrouwt u een ander in het beheren van de identiteiten? Kansen en bedreigen voor dienstenaanbieders? Welke standaarden en hoe deze te interoperen? Wat is de rol van Identity-as-a-Service hier? Hoe problematisch is schaalbaarheid van met name vertrouwen? De SURFfederatie wordt hier als case gebruikt.