SlideShare a Scribd company logo
1 of 34
Download to read offline
Identity as a Building Block ? 
ISOC Briefing Panel 
www.internetsociety.org
Panelists 
Jef Hodges (PayPal) 
Leif Johansson (SUNET) 
Ken Klingenstein (Internet2) 
Natasha Rooney (GSMA) 
ISOC Briefing Panel | 11 Nov 2014 
2
Jeff Hodges 
ISOC Briefing Panel | 11 Nov 2014 
3
Identity: 
everythings gots it.. 
but what is it.. 
and how do we use it? 
ISOC Briefing Panel | 11 Nov 2014 
Jeff Hodges, ISOC Briefing Panel 
11-Nov-2014 IETF-91
ISOC Briefing Panel | 11 Nov 2014
ISOC Briefing Panel | 11 Nov 2014
For myself (speaking as an individual), the context of our 
ISOC Briefing Panel | 11 Nov 2014 
discussion is: 
! how do we (“human subjects”) interact with various 
entities (human and not) throughout the Internet and.. 
! ..be known as “us”.. 
! ..(for some definition of “us”, not necessarily under 
our control).. 
! ..and/or assert ourselves as “us”?
What does this mean under the hood? 
This: Mapping of human subjects to.. 
ISOC Briefing Panel | 11 Nov 2014 
! Actions, 
! Events, 
! Processes, 
! Communication channels, 
! Physical devices, 
! Etc.
..while keeping in mind there are various tensions/ 
ISOC Briefing Panel | 11 Nov 2014 
tussles involved, e.g.: 
! naming, 
! identification, 
! agency, 
! autonomy, 
! privacy, 
! security, 
! etc.
Where things are headed (one way or another).... 
ISOC Briefing Panel | 11 Nov 2014 
Source: AndroidCentral.com
Identity is a cross-layer notion, 
but: which layers and how? 
flmrw 
And 
/or 
Her 
e.. 
ISOC Briefing Panel | 11 Nov 2014 
Sources: Evi Nemeth (RIP), xkcd
NOTE: we really going to need to keep that Layer 9 
ISOC Briefing Panel | 11 Nov 2014 
thing in mind... 
Source: biometricupdate.com
Natasha Rooney 
ISOC Briefing Panel | 11 Nov 2014 
13
@thisNatasha 
[1] Use Cases 
[2] Identity Providers 
& Business
@thisNatasha 
[1] Use Cases:
@thisNatasha 
[1] Use Cases: 
Login and Do Something 
- Managing money at my bank 
(secure, not fast) 
- Accessing your health records 
(secure, not fast) 
- Login and buy 
(secure, fast) 
- Login and Tweet 
(not as secure, fast)
@thisNatasha 
[1] Use Cases: 
Adding Attributes 
- Buying alcohol online 
(age) 
- Accessing your health records 
(attributes to strengthen identity) 
- Renting a Car 
(have a drivers license)
[1] Use Cases: 
Identity is dependant on the situation 
- Login and Tweet 
(Does Twitter really need to know that I am this Natasha, or just 
@thisNatasha?) 
@thisNatasha
@thisNatasha 
[2] Identity Providers 
& Business
@thisNatasha 
[2] Identity Providers 
& Business 
- Trust 
(Who manages your identity?) 
- How 
(How is identity information transported throughout the internet?) 
- Who else needs to be involved 
(Business, regulation, trusted entities, government...)
[1] How do we solve for 
all the use cases? 
@thisNatasha 
(solve the simplest first?) 
[2] How do we enable secure, 
trusted identity management? 
(can internet technologies help?)
Leif Johansson 
ISOC Briefing Panel | 11 Nov 2014 
22
Identity != username+login 
ISOC Briefing Panel | 11 Nov 2014 
just like RTC != SIP+SDP+SCTP
“User-centric” is a 
ISOC Briefing Panel | 11 Nov 2014 
distraction 
We need both trusted 3rd, 4th and maybe 5th parties to help users stay safe .. and >1 of each
There is no such thing as 
an Internet identity layer 
Identity happens at most layers … and no, it isn’t FB either… however (drumroll...) 
ISOC Briefing Panel | 11 Nov 2014
The Internet needs 
reusable, non-hierarchical 
and scalable technical trust 
Not dnssec, but like what BGP is to the network… and with many of the same properties 
ISOC Briefing Panel | 11 Nov 2014
Ken Klingenstein 
ISOC Briefing Panel | 11 Nov 2014 
27
Iden.ty$and$its$trust$infrastructure$ 
ISOC$Briefing$Panel$|$$11$Nov$2014$
Comparisons$to$TCP/IP$layer$ 
• Much$more$careful$now$about$including$trust$ 
• Many$more$policy$dimensions$ 
• No$cover$now$(where$is$OSI,$sigh)$ 
• Not$crea.ve$noodling$on$a$deploying$ 
greenfield;$more$s.tching$and$integra.ng$ 
disparate$players$with$differing$inten.ons$ 
• It$doesn’t$fit$on$a$cocktail$napkin$anymore$ 
$ 
ISOC$Briefing$Panel$|$$11$Nov$2014$
ISOC$Briefing$Panel$|$$11$Nov$2014$ 
Ac.ve$areas$$ 
• Federated$metadata/dynamic$metadata$ 
• LOA$(level$of$assurance)$and$vectoring$of$trust$ 
• ALributes$and$their$metadata$ 
• Reconciling$regimes$of$privacy$ 
• Managing$downstream$use$of$aLributes$ 
• Scalable$privacy$and$the$federated$ 
infrastructures$to$support$it$
ISOC$Briefing$Panel$|$$11$Nov$2014$ 
Building$Blocks$ 
• IdP’s$and$SP’s$ 
• ALribute$authori.es$ 
• ALribute$aggregators,$middlemen,$portals,$etc$ 
• Key$management$ 
• Trust$management$ 
• Consent$management,$UMA,$etc.$
ISOC$Briefing$Panel$|$$11$Nov$2014$ 
Key$issues$ 
• Leveraging$the$emerging$iden.ty$layer$down$ 
the$stack$ 
• What$organiza.on(s)$acts$as$a$registry,$a$ 
registry$of$registries,$a$normalizer$among$ 
registries,$etc.$ 
• Tech$transfer$to$emerging$na.ons$ 
• Sebng$the$rules$of$the$road(s)$
Olaf Kolkman 
Chief Internet Technology 
Office 
kolkman@isoc.org 
www.internetsociety.org

More Related Content

Viewers also liked

Viewers also liked (13)

Novedades marzo 2016
Novedades marzo 2016Novedades marzo 2016
Novedades marzo 2016
 
Novedades abril 2014
Novedades abril 2014Novedades abril 2014
Novedades abril 2014
 
Shakib Al Hasan Photos
Shakib Al Hasan PhotosShakib Al Hasan Photos
Shakib Al Hasan Photos
 
Radware state of_the_union_report_winter_2013-14
Radware state of_the_union_report_winter_2013-14Radware state of_the_union_report_winter_2013-14
Radware state of_the_union_report_winter_2013-14
 
Defend by Gabriel Ybarra
Defend by Gabriel YbarraDefend by Gabriel Ybarra
Defend by Gabriel Ybarra
 
Novedades enero 2014
Novedades enero 2014Novedades enero 2014
Novedades enero 2014
 
ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later
ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years laterISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later
ISOC Panel at IETF 90 - Internet Security and Privacy: Ten years later
 
Evaluation Question 5
Evaluation Question 5Evaluation Question 5
Evaluation Question 5
 
Shakib Al Hasan Photos
Shakib Al Hasan PhotosShakib Al Hasan Photos
Shakib Al Hasan Photos
 
Formazione ed implementazione dell'EBM con i social network. Risultati di un ...
Formazione ed implementazione dell'EBM con i social network. Risultati di un ...Formazione ed implementazione dell'EBM con i social network. Risultati di un ...
Formazione ed implementazione dell'EBM con i social network. Risultati di un ...
 
Novedades septiembre 2015
Novedades septiembre 2015Novedades septiembre 2015
Novedades septiembre 2015
 
Novedades febrero 2016
Novedades febrero 2016Novedades febrero 2016
Novedades febrero 2016
 
Warnambool
WarnamboolWarnambool
Warnambool
 

More from Internet Technology Matters (Internet Society)

More from Internet Technology Matters (Internet Society) (9)

New Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization ProtocolsNew Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization Protocols
 
The I in Internet of Things: Implications for the Global Open Internet
The I in Internet of Things: Implications for the Global Open InternetThe I in Internet of Things: Implications for the Global Open Internet
The I in Internet of Things: Implications for the Global Open Internet
 
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
Tackling Protocol Diversity: ISOC@IETF Panel at IETF 93
 
Olaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative SecurityOlaf Kolkman - FIRST Keynote on Collaborative Security
Olaf Kolkman - FIRST Keynote on Collaborative Security
 
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
 
v6 World Congress: Measurements from World IPv6 Launch
v6 World Congress: Measurements from World IPv6 Launchv6 World Congress: Measurements from World IPv6 Launch
v6 World Congress: Measurements from World IPv6 Launch
 
Initial Routing Resilience Survey Results Show At Least 10% Of Incidents Are ...
Initial Routing Resilience Survey Results Show At Least 10% Of Incidents Are ...Initial Routing Resilience Survey Results Show At Least 10% Of Incidents Are ...
Initial Routing Resilience Survey Results Show At Least 10% Of Incidents Are ...
 
Evolution of end-to-end: why the Internet is not like any other network
Evolution of end-to-end: why the Internet is not like any other networkEvolution of end-to-end: why the Internet is not like any other network
Evolution of end-to-end: why the Internet is not like any other network
 
IPv6 Predictions for 2014
IPv6 Predictions for 2014IPv6 Predictions for 2014
IPv6 Predictions for 2014
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

IETF 91 Internet Society Briefing Panel: "Is Identity an Internet Building Block?"

  • 1. Identity as a Building Block ? ISOC Briefing Panel www.internetsociety.org
  • 2. Panelists Jef Hodges (PayPal) Leif Johansson (SUNET) Ken Klingenstein (Internet2) Natasha Rooney (GSMA) ISOC Briefing Panel | 11 Nov 2014 2
  • 3. Jeff Hodges ISOC Briefing Panel | 11 Nov 2014 3
  • 4. Identity: everythings gots it.. but what is it.. and how do we use it? ISOC Briefing Panel | 11 Nov 2014 Jeff Hodges, ISOC Briefing Panel 11-Nov-2014 IETF-91
  • 5. ISOC Briefing Panel | 11 Nov 2014
  • 6. ISOC Briefing Panel | 11 Nov 2014
  • 7. For myself (speaking as an individual), the context of our ISOC Briefing Panel | 11 Nov 2014 discussion is: ! how do we (“human subjects”) interact with various entities (human and not) throughout the Internet and.. ! ..be known as “us”.. ! ..(for some definition of “us”, not necessarily under our control).. ! ..and/or assert ourselves as “us”?
  • 8. What does this mean under the hood? This: Mapping of human subjects to.. ISOC Briefing Panel | 11 Nov 2014 ! Actions, ! Events, ! Processes, ! Communication channels, ! Physical devices, ! Etc.
  • 9. ..while keeping in mind there are various tensions/ ISOC Briefing Panel | 11 Nov 2014 tussles involved, e.g.: ! naming, ! identification, ! agency, ! autonomy, ! privacy, ! security, ! etc.
  • 10. Where things are headed (one way or another).... ISOC Briefing Panel | 11 Nov 2014 Source: AndroidCentral.com
  • 11. Identity is a cross-layer notion, but: which layers and how? flmrw And /or Her e.. ISOC Briefing Panel | 11 Nov 2014 Sources: Evi Nemeth (RIP), xkcd
  • 12. NOTE: we really going to need to keep that Layer 9 ISOC Briefing Panel | 11 Nov 2014 thing in mind... Source: biometricupdate.com
  • 13. Natasha Rooney ISOC Briefing Panel | 11 Nov 2014 13
  • 14. @thisNatasha [1] Use Cases [2] Identity Providers & Business
  • 16. @thisNatasha [1] Use Cases: Login and Do Something - Managing money at my bank (secure, not fast) - Accessing your health records (secure, not fast) - Login and buy (secure, fast) - Login and Tweet (not as secure, fast)
  • 17. @thisNatasha [1] Use Cases: Adding Attributes - Buying alcohol online (age) - Accessing your health records (attributes to strengthen identity) - Renting a Car (have a drivers license)
  • 18. [1] Use Cases: Identity is dependant on the situation - Login and Tweet (Does Twitter really need to know that I am this Natasha, or just @thisNatasha?) @thisNatasha
  • 19. @thisNatasha [2] Identity Providers & Business
  • 20. @thisNatasha [2] Identity Providers & Business - Trust (Who manages your identity?) - How (How is identity information transported throughout the internet?) - Who else needs to be involved (Business, regulation, trusted entities, government...)
  • 21. [1] How do we solve for all the use cases? @thisNatasha (solve the simplest first?) [2] How do we enable secure, trusted identity management? (can internet technologies help?)
  • 22. Leif Johansson ISOC Briefing Panel | 11 Nov 2014 22
  • 23. Identity != username+login ISOC Briefing Panel | 11 Nov 2014 just like RTC != SIP+SDP+SCTP
  • 24. “User-centric” is a ISOC Briefing Panel | 11 Nov 2014 distraction We need both trusted 3rd, 4th and maybe 5th parties to help users stay safe .. and >1 of each
  • 25. There is no such thing as an Internet identity layer Identity happens at most layers … and no, it isn’t FB either… however (drumroll...) ISOC Briefing Panel | 11 Nov 2014
  • 26. The Internet needs reusable, non-hierarchical and scalable technical trust Not dnssec, but like what BGP is to the network… and with many of the same properties ISOC Briefing Panel | 11 Nov 2014
  • 27. Ken Klingenstein ISOC Briefing Panel | 11 Nov 2014 27
  • 29. Comparisons$to$TCP/IP$layer$ • Much$more$careful$now$about$including$trust$ • Many$more$policy$dimensions$ • No$cover$now$(where$is$OSI,$sigh)$ • Not$crea.ve$noodling$on$a$deploying$ greenfield;$more$s.tching$and$integra.ng$ disparate$players$with$differing$inten.ons$ • It$doesn’t$fit$on$a$cocktail$napkin$anymore$ $ ISOC$Briefing$Panel$|$$11$Nov$2014$
  • 30. ISOC$Briefing$Panel$|$$11$Nov$2014$ Ac.ve$areas$$ • Federated$metadata/dynamic$metadata$ • LOA$(level$of$assurance)$and$vectoring$of$trust$ • ALributes$and$their$metadata$ • Reconciling$regimes$of$privacy$ • Managing$downstream$use$of$aLributes$ • Scalable$privacy$and$the$federated$ infrastructures$to$support$it$
  • 31. ISOC$Briefing$Panel$|$$11$Nov$2014$ Building$Blocks$ • IdP’s$and$SP’s$ • ALribute$authori.es$ • ALribute$aggregators,$middlemen,$portals,$etc$ • Key$management$ • Trust$management$ • Consent$management,$UMA,$etc.$
  • 32. ISOC$Briefing$Panel$|$$11$Nov$2014$ Key$issues$ • Leveraging$the$emerging$iden.ty$layer$down$ the$stack$ • What$organiza.on(s)$acts$as$a$registry,$a$ registry$of$registries,$a$normalizer$among$ registries,$etc.$ • Tech$transfer$to$emerging$na.ons$ • Sebng$the$rules$of$the$road(s)$
  • 33.
  • 34. Olaf Kolkman Chief Internet Technology Office kolkman@isoc.org www.internetsociety.org