SlideShare a Scribd company logo
Follow	
  the	
  Money	
  
Business	
  Filters	
  on	
  Technology	
  
Things	
  don’t	
  get	
  simpler	
  …	
  
•  Iden:ty	
  is	
  no	
  longer	
  about	
  3	
  par:es	
  
•  A?ributes	
  are	
  as	
  interes:ng	
  as	
  iden:fiers	
  
•  Fresh	
  informa:on	
  is	
  a	
  business	
  driver	
  
•  Iden:ty	
  assurance	
  is	
  giving	
  way	
  to	
  
a?ribute	
  confidence	
  
•  Consumer	
  IDPs	
  are	
  in	
  full	
  swing	
  
•  Useful	
  systems	
  can	
  be	
  built	
  without	
  being	
  
the	
  account	
  owner	
  
•  Brand	
  recogni:on	
  is	
  as	
  important	
  as	
  trust	
  	
  
Internet	
  ID	
  is	
  not	
  just	
  about	
  anonymity	
  
•  Iden::es	
  and	
  a?ributes	
  are	
  a	
  mul:-­‐
variable	
  calculus	
  
UMA	
  
Identity
Provider
Relying
Party
The 3-Party Model
User
Iden:ty	
  Ecosystem	
  En::es	
  
Attribute
Exchange
Attribute
Providers
Identity
Provider
Relying
Parties
User
Authorization
Manager
Who	
  Adds	
  Value	
  &	
  What	
  is	
  it?	
  
•  Aggrega:on	
  of	
  service	
  capabili:es	
  tends	
  to	
  confuse	
  the	
  
conversa:on	
  
–  Not	
  clear	
  that	
  *any*	
  provider	
  can	
  cover	
  all	
  aspects	
  
•  Authen:ca:on	
  services	
  don’t	
  provide	
  iden:ty	
  
•  IDP’s	
  may	
  provide	
  iden::es,	
  more	
  	
  
frequently	
  provide	
  iden:fiers	
  
•  IDPs	
  outside	
  of	
  enterprise	
  context	
  	
  
do	
  not	
  originate	
  iden:ty	
  a?ributes	
  
–  Not	
  authorita:ve(?)	
  &not	
  a	
  fresh	
  source	
  
•  Internet2	
  work	
  on	
  a?ribute	
  format	
  
–  Seman:cs	
  are	
  less	
  understood	
  
Verified	
  Phone	
  #’s	
  
•  Any	
  may	
  be	
  “correct”	
  or	
  sufficient	
  
•  It	
  costs	
  more	
  to	
  do	
  “be?er”	
  
•  Most	
  of	
  these	
  may	
  be	
  devalued	
  by	
  so	
  mobile	
  
providers	
  including	
  Twilio	
  
Syntac'cally	
  
Correct	
  
Allocated	
  
#	
  
Response	
  Consistently	
  
Asserted	
  
Account	
  
Holder	
  Name	
  
Match	
  
Posi've	
  
Event	
  
Temporal/	
  
Spa'al	
  
Correla'on	
  
Authorita:ve	
  Sources	
  
•  Loca:on	
  
– No	
  longer	
  the	
  purview	
  of	
  telcos	
  
– 	
  compliance	
  constraints	
  
•  Sources	
  of	
  a	
  “verified”	
  mobile	
  #	
  
– OnTrac,	
  UPS,	
  FEDEX	
  enable	
  package	
  tracking	
  
– Yelp	
  delivers	
  recommenda:ons	
  to	
  my	
  phone	
  
– Not	
  :ed	
  to	
  an	
  “address”	
  
– Usually	
  :ed	
  to	
  an	
  iden:fier	
  
Fresh	
  Informa:on	
  Delivery	
  
•  When	
  is	
  fresh	
  informa:on	
  delivered?	
  
•  My	
  iden:ty	
  validated	
  and	
  an	
  	
  
iden:fier	
  issued	
  5	
  years	
  ago	
  
–  As	
  useful	
  as	
  a	
  birth	
  cer:ficate	
  
–  Not	
  appropriate	
  for	
  transac:onal	
  value	
  
•  What	
  channels	
  are	
  used	
  
–  IDPs	
  may	
  not	
  wish	
  to	
  be	
  in	
  the	
  informa:on	
  flow	
  
–  Fresh	
  data	
  criteria	
  may	
  be	
  different	
  to	
  session	
  limits	
  
and	
  may	
  be	
  set	
  by	
  different	
  policy	
  domains	
  
•  AXN	
  A?ribute	
  Criteria	
  
–  Refresh	
  Rate	
  
Deriving	
  A?ribute	
  	
  
Confidence	
  
Data	
  Type	
   Metric	
  
Availability/	
  
Timing	
  
Metric	
  
Geographic	
  
Coverage	
  
Metric	
   Refresh	
  Rate	
   Metric	
  
Authorita:ve	
   5	
   Real-­‐:me	
   1	
   Global	
   3	
   Real-­‐Time	
   5	
  
Aggregated	
   4	
   Not	
  Real-­‐:me	
   0	
   Na:onal	
   2	
   Daily	
   4	
  
Direct	
  Captured	
   3	
   State/Provence	
   1	
   Weekly	
   3	
  
Self	
  Asserted	
   2	
   N/A	
   0	
   Monthly	
   2	
  
Derived	
   1	
   Annually	
   1	
  
N/A	
   0	
   Never	
   0	
  
This	
  is	
  a	
  	
  derived	
  a+ribute	
  
Verifica'on	
  Method	
   Metric	
   Level	
  of	
  Confidence	
   Metric	
   Coverage	
  Amount	
   Metric	
   Currency/	
  
Refresh	
  Date	
  
Verified	
  by	
  Issuer	
   4	
   High	
   3	
   Full	
   3	
   Actual	
  Date	
  
Verified	
  by	
  3rd	
  Party	
   3	
   Med	
   2	
   Par:al	
   2	
  
Out	
  of	
  Band	
   2	
   Low	
   1	
   Minimal	
   1	
  
Not	
  Verified	
   1	
   None	
   0	
   N/A	
   0	
  
N/A	
   0	
  
LOC	
  (level	
  of	
  confidence)	
  =	
  fcn(Data	
  Type,	
  Verifica'on	
  Method,	
  Refresh	
  Rate,	
  Currency)	
  
Pricing	
  =	
  fcn	
  (LOC,	
  Coverage,	
  AMribute	
  Type)	
  
A?ribute	
  Exchange	
  Networks	
  
Attribute
Exchange
Attribute
Providers Relying
Parties
Attributes
Source
Attributes
Simple Attribute Exchange
A?ribute	
  Redistribu:on	
  	
  
in	
  the	
  Enterprise	
  
Attribute
Exchange
Attribute
Providers
Enterprise
Relying PartiesAttributes
Source
Attributes
Enterprise Internal
Attribute Distribution
IDP	
  	
  
Trusted	
  Iden:ty	
  Establishment	
  
Attribute
Exchange
Attribute
Providers
Identity
Provider
Verified
Identity
Login
Client
Verified Identity/Credential
Establishment & Use
Trusted	
  IDs	
  with	
  	
  
Associated	
  A?ributes	
  
Attribute
Exchange
Attribute
Providers
Identity
Providers
Verified
Identity
Identity
Attributes
Verified Identity/Credential
+ Attribute Exchange
USER	
   RELYING	
  PARTY	
  
If	
  I	
  had	
  more	
  :me,	
  I	
  would	
  have	
  
wri?en	
  less…	
  
Direct	
  A?ribute	
  Associa:on	
  
Attribute
Exchange
Attribute
Providers
Relying
Parties
Attributes
Direct to RP Model
Policy	
  based	
  Facilita:on	
  
Attribute
Exchange
Attribute
Providers
Relying
Parties
Attributes
Control +
AccountingControl +
Accounting
Facilitated Direct to RP Model
Layered	
  Ecosystem	
  
•  Why	
  is	
  it	
  everyone	
  talks	
  about	
  authen:ca:on?	
  
•  Our	
  ubiquitous	
  biometrics	
  sign-­‐in	
  apis	
  
suppor:ng	
  mul:ple	
  biometrics	
  types	
  will	
  solve	
  
all	
  your	
  problems	
  
•  I	
  have	
  TPMs	
  in	
  every	
  xyz	
  product	
  on	
  earth	
  –	
  I	
  
should	
  be	
  in	
  the	
  Iden:ty	
  Business	
  
•  I	
  own	
  70%	
  of	
  the	
  PC	
  market	
  –	
  I	
  should	
  be	
  an	
  
IDP	
  
Abstract	
  
Despite	
  what	
  we	
  may	
  wish	
  to	
  implement	
  in	
  our	
  
iden:ty	
  architectures,	
  large-­‐scale	
  iden:ty	
  
deployments	
  are	
  driven	
  by	
  financial	
  value.	
  This	
  
session	
  examines	
  recent	
  thinking	
  on	
  how	
  
iden:ty	
  a?ribute	
  models	
  are	
  likely	
  to	
  be	
  
deployed,	
  the	
  values	
  and	
  roles	
  of	
  the	
  various	
  
par:cipants	
  and	
  the	
  challenges	
  of	
  how	
  value	
  is	
  
distributed	
  among	
  the	
  par:cipants.	
  

More Related Content

Similar to CIS13: Follow the Money

[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics OpportunityAIIM International
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...Lavante Inc.
 
SiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand OrchestrationSiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand OrchestrationIntegrate
 
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCloudIDSummit
 
Increase online growth: In 4 steps optimal data orchestration
Increase online growth: In 4 steps optimal data orchestration Increase online growth: In 4 steps optimal data orchestration
Increase online growth: In 4 steps optimal data orchestration OrangeValley
 
Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Arnaud Le Hors
 
CIS13: Which Way Forward
CIS13: Which Way ForwardCIS13: Which Way Forward
CIS13: Which Way ForwardCloudIDSummit
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity gppcpa
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big InvestmentGGV Capital
 
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your InformationAIIM International
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerDarrell O'Donnell
 
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesGraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesNeo4j
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCloudIDSummit
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCloudIDSummit
 
Moving to a web based crm database or fundraising system
Moving to a web based crm database or fundraising systemMoving to a web based crm database or fundraising system
Moving to a web based crm database or fundraising systemJeff Gordy
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real WorldNeo4j
 

Similar to CIS13: Follow the Money (20)

Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
 
180926 ihan webinar 2
180926 ihan webinar 2180926 ihan webinar 2
180926 ihan webinar 2
 
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
[AIIM16] How Regulatory Data Can Set the Narrative for an Analytics Opportunity
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF P...
 
SiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand OrchestrationSiriusDecisions Explores the Need for Demand Orchestration
SiriusDecisions Explores the Need for Demand Orchestration
 
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground Up
 
Increase online growth: In 4 steps optimal data orchestration
Increase online growth: In 4 steps optimal data orchestration Increase online growth: In 4 steps optimal data orchestration
Increase online growth: In 4 steps optimal data orchestration
 
Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508
 
CIS13: Which Way Forward
CIS13: Which Way ForwardCIS13: Which Way Forward
CIS13: Which Way Forward
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
 
Big Data, Big Investment
Big Data, Big InvestmentBig Data, Big Investment
Big Data, Big Investment
 
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
[Webinar Slides] 3 Steps to Organizing, Finding, and Governing Your Information
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph DatabasesGraphTalks Copenhagen - Analyzing Fraud with Graph Databases
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
Moving to a web based crm database or fundraising system
Moving to a web based crm database or fundraising systemMoving to a web based crm database or fundraising system
Moving to a web based crm database or fundraising system
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real World
 
Andrew Nash
Andrew NashAndrew Nash
Andrew Nash
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»QADay
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 

CIS13: Follow the Money

  • 1. Follow  the  Money   Business  Filters  on  Technology  
  • 2. Things  don’t  get  simpler  …   •  Iden:ty  is  no  longer  about  3  par:es   •  A?ributes  are  as  interes:ng  as  iden:fiers   •  Fresh  informa:on  is  a  business  driver   •  Iden:ty  assurance  is  giving  way  to   a?ribute  confidence   •  Consumer  IDPs  are  in  full  swing   •  Useful  systems  can  be  built  without  being   the  account  owner   •  Brand  recogni:on  is  as  important  as  trust     Internet  ID  is  not  just  about  anonymity   •  Iden::es  and  a?ributes  are  a  mul:-­‐ variable  calculus   UMA   Identity Provider Relying Party The 3-Party Model User
  • 3. Iden:ty  Ecosystem  En::es   Attribute Exchange Attribute Providers Identity Provider Relying Parties User Authorization Manager
  • 4. Who  Adds  Value  &  What  is  it?   •  Aggrega:on  of  service  capabili:es  tends  to  confuse  the   conversa:on   –  Not  clear  that  *any*  provider  can  cover  all  aspects   •  Authen:ca:on  services  don’t  provide  iden:ty   •  IDP’s  may  provide  iden::es,  more     frequently  provide  iden:fiers   •  IDPs  outside  of  enterprise  context     do  not  originate  iden:ty  a?ributes   –  Not  authorita:ve(?)  &not  a  fresh  source   •  Internet2  work  on  a?ribute  format   –  Seman:cs  are  less  understood  
  • 5. Verified  Phone  #’s   •  Any  may  be  “correct”  or  sufficient   •  It  costs  more  to  do  “be?er”   •  Most  of  these  may  be  devalued  by  so  mobile   providers  including  Twilio   Syntac'cally   Correct   Allocated   #   Response  Consistently   Asserted   Account   Holder  Name   Match   Posi've   Event   Temporal/   Spa'al   Correla'on  
  • 6. Authorita:ve  Sources   •  Loca:on   – No  longer  the  purview  of  telcos   –   compliance  constraints   •  Sources  of  a  “verified”  mobile  #   – OnTrac,  UPS,  FEDEX  enable  package  tracking   – Yelp  delivers  recommenda:ons  to  my  phone   – Not  :ed  to  an  “address”   – Usually  :ed  to  an  iden:fier  
  • 7. Fresh  Informa:on  Delivery   •  When  is  fresh  informa:on  delivered?   •  My  iden:ty  validated  and  an     iden:fier  issued  5  years  ago   –  As  useful  as  a  birth  cer:ficate   –  Not  appropriate  for  transac:onal  value   •  What  channels  are  used   –  IDPs  may  not  wish  to  be  in  the  informa:on  flow   –  Fresh  data  criteria  may  be  different  to  session  limits   and  may  be  set  by  different  policy  domains   •  AXN  A?ribute  Criteria   –  Refresh  Rate  
  • 8. Deriving  A?ribute     Confidence   Data  Type   Metric   Availability/   Timing   Metric   Geographic   Coverage   Metric   Refresh  Rate   Metric   Authorita:ve   5   Real-­‐:me   1   Global   3   Real-­‐Time   5   Aggregated   4   Not  Real-­‐:me   0   Na:onal   2   Daily   4   Direct  Captured   3   State/Provence   1   Weekly   3   Self  Asserted   2   N/A   0   Monthly   2   Derived   1   Annually   1   N/A   0   Never   0   This  is  a    derived  a+ribute   Verifica'on  Method   Metric   Level  of  Confidence   Metric   Coverage  Amount   Metric   Currency/   Refresh  Date   Verified  by  Issuer   4   High   3   Full   3   Actual  Date   Verified  by  3rd  Party   3   Med   2   Par:al   2   Out  of  Band   2   Low   1   Minimal   1   Not  Verified   1   None   0   N/A   0   N/A   0   LOC  (level  of  confidence)  =  fcn(Data  Type,  Verifica'on  Method,  Refresh  Rate,  Currency)   Pricing  =  fcn  (LOC,  Coverage,  AMribute  Type)  
  • 9. A?ribute  Exchange  Networks   Attribute Exchange Attribute Providers Relying Parties Attributes Source Attributes Simple Attribute Exchange
  • 10. A?ribute  Redistribu:on     in  the  Enterprise   Attribute Exchange Attribute Providers Enterprise Relying PartiesAttributes Source Attributes Enterprise Internal Attribute Distribution
  • 11. IDP     Trusted  Iden:ty  Establishment   Attribute Exchange Attribute Providers Identity Provider Verified Identity Login Client Verified Identity/Credential Establishment & Use
  • 12. Trusted  IDs  with     Associated  A?ributes   Attribute Exchange Attribute Providers Identity Providers Verified Identity Identity Attributes Verified Identity/Credential + Attribute Exchange
  • 13. USER   RELYING  PARTY   If  I  had  more  :me,  I  would  have   wri?en  less…  
  • 14.
  • 15. Direct  A?ribute  Associa:on   Attribute Exchange Attribute Providers Relying Parties Attributes Direct to RP Model
  • 16. Policy  based  Facilita:on   Attribute Exchange Attribute Providers Relying Parties Attributes Control + AccountingControl + Accounting Facilitated Direct to RP Model
  • 17. Layered  Ecosystem   •  Why  is  it  everyone  talks  about  authen:ca:on?   •  Our  ubiquitous  biometrics  sign-­‐in  apis   suppor:ng  mul:ple  biometrics  types  will  solve   all  your  problems   •  I  have  TPMs  in  every  xyz  product  on  earth  –  I   should  be  in  the  Iden:ty  Business   •  I  own  70%  of  the  PC  market  –  I  should  be  an   IDP  
  • 18. Abstract   Despite  what  we  may  wish  to  implement  in  our   iden:ty  architectures,  large-­‐scale  iden:ty   deployments  are  driven  by  financial  value.  This   session  examines  recent  thinking  on  how   iden:ty  a?ribute  models  are  likely  to  be   deployed,  the  values  and  roles  of  the  various   par:cipants  and  the  challenges  of  how  value  is   distributed  among  the  par:cipants.