SlideShare a Scribd company logo
1 of 41
Canadian Digital Identity
May 28, 2015
Overview
Introduction
Digital Canada 150
Digital ID and Authentication Council of Canada (DIACC)
Government of Canada Credential Federation (GCCF)
Pan-Canadian Identity Standards
Proof of Concept – Identity Validation
Canadian Digital Interchange (CDI)
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Introduction
About 2Keys
• 17 year old employee owned Canadian IT Security company
• Public Sector and Financial Sector
• Managed IAM Security Services
– Systems Integration
– Application Development and Support
– Security Operations Centre
– Service Desk
– Operated under SLA
– On-premise and “in the Cloud”
• Professional Services
– Threat Risk Assessments (TRA)
– Privacy Impact Assessments (PIA)
– Vulnerability Assessments (VA)
– Public Key Infrastructure (PKI)
Digital Trust
Policy
Process
Operations
Technology
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Digital Canada 150
Digital Canada 150 is a Federal Government strategy for Canada's
digital future. Based on 5 pillars:
1. Connecting Canadians
2. Protecting Canadians
3. Economic Opportunities
4. Digital Government
5. Canadian Content
The goals of this strategy are to be achieved before Canada’s
150th birthday in 2017.
Copyright © Identity Summit 2015, all rights reserved.
Digital Canada 150
Connecting Canadians
• Make high speed internet services of at least 5 Mbps available
to 98% of Canadian households.
Protecting Canadians
• New laws and national strategies to protect citizen privacy and
safeguard against cyber bullying and other online threats
(getcybersafe.ca).
Economic Opportunities
• Funding for digital entrepreneurs through the Business
Development Bank of Canada and the Canada Accelerator
and Incubator Program.
Copyright © Identity Summit 2015, all rights reserved.
Digital Canada 150
Digital Government
• Become a a leader in using digital technologies to interact with
Canadians.
• The Open Data Portal (data.gc.ca) provides a single point of
access to government datasets.
• CODE: Canadian Open Data Experience. A 48 hour Hackathon
to build the best apps utilizing data from Canada's Open
Government portal (canadianopendataexperience.ca).
Canadian Content
• Ensure Canadians have easy online access to Canadian
content that will celebrate their history, arts and culture.
• The Memory Project (thememoryproject.com).
Digital ID and Authentication
Council of Canada
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Digital ID and Authentication Council of Canada (DIACC)
• Started in 2012 as a result of recommendations from the
Federal Government’s Task Force for the Payments Systems
Review.
• Goal is to develop a Canadian digital identification and
authentication framework.
• Non-profit coalition of public and private sectors.
• Initial representation from the Federal Government, the
provinces of British Columbia and Ontario, Bank of Montreal,
Desjardin Group, TD Bank, and Telus.
Copyright © Identity Summit 2015, all rights reserved.
Digital ID and Authentication Council of Canada (DIACC)
• Public launch in May 2014.
• Now open to new members.
• Similarities to NSTIC, but not funded by government.
• Dependency on membership fees and private sector funding
handicaps POCs and net new innovation with influences from
specific agendas and existing vendor solutions.
• Membership is growing. More representation from public and
private sectors is required and will stimulate creativity,
innovation, and create value.
Government of Canada
Credential Federation
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Overview
• Authentication as a Service to 27 Federal Government Relying
Parties, securing over 80 online services.
• First step to a digital identity ecosystem.
• Separates credential from identity.
• Each government department is responsible for binding the
credential to an identity, as per their specific requirements.
• Leverage the efficiencies and enhanced security of centralizing
authentication today, while working on a solution for managing
digital identity.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Providing Choice
• Users can choose how they authenticate to Federal
Government online services.
• GCKey – Government of Canada Branded Credential
• Sign In Partner – allows the use of an existing credential from a
participating financial institution.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Sign In Partner
• A commercial service contracted by the Federal Government.
• Allows the use of an existing credential from a financial
institution.
• Currently five financial institutions participate.
• Deemed to be a Level 2 Assurance credential.
• Privacy Protecting*. The financial institutions are not aware of
where their credentials are used, and the relying parties are not
aware of which credential provider was used.
• No identity attributes are exchanged.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
GCKey
• A voluntary, anonymous, user controlled credential.
• Available to everyone: citizens, non-citizens, and businesses.
• User choice. A single credential for access to online services, or
different credentials for different services.
• User Controlled. Created by the user, and can be revoked by
the user.
• Privacy Protecting. No PII collected. Issues a unique persistent
anonymous identifier to each Relying Party.
• Government accredited Level 2 Assurance credential.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
GCKey
• Developed and operated by 2Keys as a Managed Security
Service for the Government of Canada.
• Built on the ForgeRock Platform.
• Operated under SLA of 99.8% uptime with no scheduled login
outages.
• 24 x 7 x 365 Security Operations Centre.
• 24 x 7 x 365 Level 1 and Level 2 Bi-lingual Service Desks.
• Multiple geographically diverse instances.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
GCKey Key Facts
• Go-live date was September 2012.
• Over 7 million credentials issued.
• Over 6 million active credentials in use.
• Over 4 million authentications per month.
• When given a choice, users choose the native GCKey
credential over 3rd party non-government credentials by a factor
or 10 to 1.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Considerations for Public Sector online services:
• Protecting user privacy is non-negotiable.
– There is no business risk calculation to be made. Any privacy breach will be front
page news.
• For web SSO of government online services, global logout is an
absolute must.
– Cannot risk leaving a user unknowingly logged into a service. Must consider the
use of shared kiosks at government service centers and shared computers.
• With BYOC, providers must be carefully vetted – a credential
federation is only as strong as the weakest link.
– How secure is the technical solution? The business processes?
– How susceptible is the service desk to social engineering?
– Is there a natural trust relationship? What’s the tendency for sharing?
Pan-Canadian
Identity Standards
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Pan-Canadian Standards for:
• Trust Framework
• Identity Validation
• Identity Retrieval
• Identity Notifications
Will ensure that all jurisdictions use consistent terminology and
procedures to enable a Pan-Canadian approach to identity
services.
Leverage trusted processes carried out in one jurisdiction for use
by another.
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Standardizing Concepts and Terms
• Personal Information
– Information about an identifiable person
• Identity Information
– Sufficient to ensure uniqueness within a service
– Minimal set of attributes required by the service
• Identifier
– Minimal set of attributes to uniquely identify an entity
• Assigned Identifier
• Identity
• Identity Resolution
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Standardizing Data Sets
• Personal Information Categories
• Associated Data Elements
Standardizing Services
• Identity Validation
• Identity Retrieval
• Identity Notifications
• Identity Resolution
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Core Identity Attributes
• Name
• Date of Birth
• Date of Death
• Sex, Gender, Documented Sex
• Place of Birth
• Place of Death
• Assigned Identifier
• Status
• Address
• Associated Person
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Value of Standardized Identity Services
• Better delivery of services.
– Improved identity-proofing processes, streamline user enrolment.
• Increased integrity of programs and services.
– Improved data accuracy, real-time validation, fraud detection.
• Improved efficiency and reduced costs.
– Reduced need for physical document inspection and in-person visits.
• Increased velocity of innovation and transformation.
– With standardized services in place, focus will be on delivering new value
adds.
Proof of Concept
Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Identity Attributes as Entitlements
• Attribute Based Access Control.
• Utilize Identity Attributes and their Level of Assurance to drive
service entitlements.
• User asserted identity attributes consider LOA 1.
• Utilize the Pan-Canadian Identity Validation Standard to
promote user asserted identity attributes to LOA 2.
• Attributes validated against existing government authoritative
parties or 3rd party services.
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
2Keys Transaction Verification Service
• Real-time user notification and
approval to mobile device.
Canadian Digital Interchange
Putting it all Together
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
An effort by the Government of Canada, along with Provincial and
Territorial partners, to create a secure, reliable, near real-time,
scalable messaging service to facilitate information exchange (i.e.
identity attributes) across jurisdictions.
The service will:
• Ensure a standardized and comprehensive approach for the
protection of personal information and ensure accountability
from all partners.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
• Ensure identity information disclosure between jurisdictions is
transparent – users will understand how and why their
information is shared.
• Implement a secure and cost-effective solution that will allow
parties to confirm identity information, and provide updated
information between relevant jurisdictions and programs where
legal authority exists to do so.
• Implement a solution without creating any new databases or
repositories of personal information.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
Current Status
• Request for Information has been issued, responses due by
May 29, 2015.
• No commitment yet on whether a Request for Proposal will be
issued.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
2Keys Proposal
• Distributed Architecture
• Based on UMA
• CDI Trust Framework
– Defines the “rules of the road”
• CDI Deployment Profile
– Defines the APIs
– Defines the messages formats
– Defines the data elements
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
Jurisdictional Clouds
• Identity data in Canada is distributed.
• Provinces/Territories are authoritative
on Birth and Death events.
• Federal Government is authoritative on
Immigration status.
• Resource owners should have control
over their data.
• Does not preclude the use of shared
resource among jurisdictions.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
A Digital Identity Ecosystem
• The Canadian Digital Interchange is the beginning of a
standardized Digital Identity Ecosystem, defining a common set
of Identity Services for the public sector, and possibly the private
sector in the future.
• Potential for an Identity Marketplace to emerge, providing a
source of revenue for governments to sustain their services.
Thank You
John Spicer
jspicer@2Keys.ca
Copyright © Identity Summit 2015, all rights reserved.

More Related Content

What's hot

Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDForgeRock
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2EForgeRock
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011kantarainitiative
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...ForgeRock
 
Kantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy InternetKantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy Internetkantarainitiative
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinForgeRock
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAForgeRock
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensForgeRock
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-SocialNetIQ
 

What's hot (20)

Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
 
Kantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy InternetKantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy Internet
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Ki overview-2014
Ki overview-2014Ki overview-2014
Ki overview-2014
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 

Viewers also liked

ForgeRock and the Graph: A Match Made for IRM
ForgeRock and the Graph: A Match Made for IRMForgeRock and the Graph: A Match Made for IRM
ForgeRock and the Graph: A Match Made for IRMForgeRock
 
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...ForgeRock
 
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)ForgeRock
 
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)ForgeRock
 
Taking Flexibility to the Next Level
Taking Flexibility to the Next LevelTaking Flexibility to the Next Level
Taking Flexibility to the Next LevelForgeRock
 
Entitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold RushEntitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold RushForgeRock
 
Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!ForgeRock
 
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMIdentity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMForgeRock
 
Dev Ops Geek Fest: Automating the ForgeRock Platform
Dev Ops Geek Fest: Automating the ForgeRock PlatformDev Ops Geek Fest: Automating the ForgeRock Platform
Dev Ops Geek Fest: Automating the ForgeRock PlatformForgeRock
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesForgeRock
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’ForgeRock
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016ForgeRock
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentationjpelletier123
 
The Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesThe Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesForgeRock
 

Viewers also liked (14)

ForgeRock and the Graph: A Match Made for IRM
ForgeRock and the Graph: A Match Made for IRMForgeRock and the Graph: A Match Made for IRM
ForgeRock and the Graph: A Match Made for IRM
 
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
 
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
 
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
 
Taking Flexibility to the Next Level
Taking Flexibility to the Next LevelTaking Flexibility to the Next Level
Taking Flexibility to the Next Level
 
Entitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold RushEntitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold Rush
 
Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!
 
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMIdentity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
 
Dev Ops Geek Fest: Automating the ForgeRock Platform
Dev Ops Geek Fest: Automating the ForgeRock PlatformDev Ops Geek Fest: Automating the ForgeRock Platform
Dev Ops Geek Fest: Automating the ForgeRock Platform
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentation
 
The Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesThe Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory Services
 

Similar to Identity Summit 2015: 2Keys Canadian Digital Identity

2014 07-19 id cloud summit
2014 07-19 id cloud summit2014 07-19 id cloud summit
2014 07-19 id cloud summitCloudIDSummit
 
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...CloudIDSummit
 
Symbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewRosy Kaur
 
apidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptxapidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptxapidays
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura StanfordIdentityNorthEvents
 
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel GroupFintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel GroupFinTech Belgium
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
SoftAge Corporate Presentation
SoftAge Corporate Presentation SoftAge Corporate Presentation
SoftAge Corporate Presentation Ishita Malhotra
 
Chapter 5 the kyc utility
Chapter 5   the kyc utilityChapter 5   the kyc utility
Chapter 5 the kyc utilityQuan Risk
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...FinTechLabs.io
 
Digital Identity In Canada - GovConnect Canada - ottawa - kenmcmillan
Digital Identity In Canada -  GovConnect Canada - ottawa - kenmcmillanDigital Identity In Canada -  GovConnect Canada - ottawa - kenmcmillan
Digital Identity In Canada - GovConnect Canada - ottawa - kenmcmillanKen McMillan, PMP, CISSP, ITIL
 
MyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech SingaporeMyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech SingaporeNUS-ISS
 
Big data4analytics ai-powered compliance
Big data4analytics   ai-powered complianceBig data4analytics   ai-powered compliance
Big data4analytics ai-powered complianceMike Fish
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
 
Eu fintech lab smouy rkhan
Eu fintech lab   smouy rkhanEu fintech lab   smouy rkhan
Eu fintech lab smouy rkhanStphaneMouy
 
Fintech Belgium - Meetup on Compliance / KYC - Olivier Roucloux - finoryx
Fintech Belgium - Meetup on Compliance / KYC - Olivier Roucloux - finoryxFintech Belgium - Meetup on Compliance / KYC - Olivier Roucloux - finoryx
Fintech Belgium - Meetup on Compliance / KYC - Olivier Roucloux - finoryxFinTech Belgium
 
IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW
 

Similar to Identity Summit 2015: 2Keys Canadian Digital Identity (20)

2014 07-19 id cloud summit
2014 07-19 id cloud summit2014 07-19 id cloud summit
2014 07-19 id cloud summit
 
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
 
Symbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance Overview
 
apidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptxapidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptx
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura Stanford
 
DIACC Strategic Collaboration to Solve Digital Identity
DIACC Strategic Collaboration to Solve Digital IdentityDIACC Strategic Collaboration to Solve Digital Identity
DIACC Strategic Collaboration to Solve Digital Identity
 
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel GroupFintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
SoftAge Corporate Presentation
SoftAge Corporate Presentation SoftAge Corporate Presentation
SoftAge Corporate Presentation
 
Chapter 5 the kyc utility
Chapter 5   the kyc utilityChapter 5   the kyc utility
Chapter 5 the kyc utility
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
 
2020 kyriba payment_network
2020 kyriba payment_network2020 kyriba payment_network
2020 kyriba payment_network
 
Digital Identity In Canada - GovConnect Canada - ottawa - kenmcmillan
Digital Identity In Canada -  GovConnect Canada - ottawa - kenmcmillanDigital Identity In Canada -  GovConnect Canada - ottawa - kenmcmillan
Digital Identity In Canada - GovConnect Canada - ottawa - kenmcmillan
 
MyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech SingaporeMyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech Singapore
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
 
Big data4analytics ai-powered compliance
Big data4analytics   ai-powered complianceBig data4analytics   ai-powered compliance
Big data4analytics ai-powered compliance
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
Eu fintech lab smouy rkhan
Eu fintech lab   smouy rkhanEu fintech lab   smouy rkhan
Eu fintech lab smouy rkhan
 
Fintech Belgium - Meetup on Compliance / KYC - Olivier Roucloux - finoryx
Fintech Belgium - Meetup on Compliance / KYC - Olivier Roucloux - finoryxFintech Belgium - Meetup on Compliance / KYC - Olivier Roucloux - finoryx
Fintech Belgium - Meetup on Compliance / KYC - Olivier Roucloux - finoryx
 
IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?
 

More from ForgeRock

Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilForgeRock
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 

More from ForgeRock (20)

Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Identity Summit 2015: 2Keys Canadian Digital Identity

  • 2. Overview Introduction Digital Canada 150 Digital ID and Authentication Council of Canada (DIACC) Government of Canada Credential Federation (GCCF) Pan-Canadian Identity Standards Proof of Concept – Identity Validation Canadian Digital Interchange (CDI) Copyright © Identity Summit 2015, all rights reserved.
  • 3. Copyright © Identity Summit 2015, all rights reserved. Introduction About 2Keys • 17 year old employee owned Canadian IT Security company • Public Sector and Financial Sector • Managed IAM Security Services – Systems Integration – Application Development and Support – Security Operations Centre – Service Desk – Operated under SLA – On-premise and “in the Cloud” • Professional Services – Threat Risk Assessments (TRA) – Privacy Impact Assessments (PIA) – Vulnerability Assessments (VA) – Public Key Infrastructure (PKI) Digital Trust Policy Process Operations Technology
  • 4. Copyright © Identity Summit 2015, all rights reserved.
  • 5. Copyright © Identity Summit 2015, all rights reserved. Digital Canada 150 Digital Canada 150 is a Federal Government strategy for Canada's digital future. Based on 5 pillars: 1. Connecting Canadians 2. Protecting Canadians 3. Economic Opportunities 4. Digital Government 5. Canadian Content The goals of this strategy are to be achieved before Canada’s 150th birthday in 2017.
  • 6. Copyright © Identity Summit 2015, all rights reserved. Digital Canada 150 Connecting Canadians • Make high speed internet services of at least 5 Mbps available to 98% of Canadian households. Protecting Canadians • New laws and national strategies to protect citizen privacy and safeguard against cyber bullying and other online threats (getcybersafe.ca). Economic Opportunities • Funding for digital entrepreneurs through the Business Development Bank of Canada and the Canada Accelerator and Incubator Program.
  • 7. Copyright © Identity Summit 2015, all rights reserved. Digital Canada 150 Digital Government • Become a a leader in using digital technologies to interact with Canadians. • The Open Data Portal (data.gc.ca) provides a single point of access to government datasets. • CODE: Canadian Open Data Experience. A 48 hour Hackathon to build the best apps utilizing data from Canada's Open Government portal (canadianopendataexperience.ca). Canadian Content • Ensure Canadians have easy online access to Canadian content that will celebrate their history, arts and culture. • The Memory Project (thememoryproject.com).
  • 8. Digital ID and Authentication Council of Canada Copyright © Identity Summit 2015, all rights reserved.
  • 9. Copyright © Identity Summit 2015, all rights reserved. Digital ID and Authentication Council of Canada (DIACC) • Started in 2012 as a result of recommendations from the Federal Government’s Task Force for the Payments Systems Review. • Goal is to develop a Canadian digital identification and authentication framework. • Non-profit coalition of public and private sectors. • Initial representation from the Federal Government, the provinces of British Columbia and Ontario, Bank of Montreal, Desjardin Group, TD Bank, and Telus.
  • 10. Copyright © Identity Summit 2015, all rights reserved. Digital ID and Authentication Council of Canada (DIACC) • Public launch in May 2014. • Now open to new members. • Similarities to NSTIC, but not funded by government. • Dependency on membership fees and private sector funding handicaps POCs and net new innovation with influences from specific agendas and existing vendor solutions. • Membership is growing. More representation from public and private sectors is required and will stimulate creativity, innovation, and create value.
  • 11. Government of Canada Credential Federation Copyright © Identity Summit 2015, all rights reserved.
  • 12. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) Overview • Authentication as a Service to 27 Federal Government Relying Parties, securing over 80 online services. • First step to a digital identity ecosystem. • Separates credential from identity. • Each government department is responsible for binding the credential to an identity, as per their specific requirements. • Leverage the efficiencies and enhanced security of centralizing authentication today, while working on a solution for managing digital identity.
  • 13. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) Providing Choice • Users can choose how they authenticate to Federal Government online services. • GCKey – Government of Canada Branded Credential • Sign In Partner – allows the use of an existing credential from a participating financial institution.
  • 14. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF)
  • 15. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) Sign In Partner • A commercial service contracted by the Federal Government. • Allows the use of an existing credential from a financial institution. • Currently five financial institutions participate. • Deemed to be a Level 2 Assurance credential. • Privacy Protecting*. The financial institutions are not aware of where their credentials are used, and the relying parties are not aware of which credential provider was used. • No identity attributes are exchanged.
  • 16. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) GCKey • A voluntary, anonymous, user controlled credential. • Available to everyone: citizens, non-citizens, and businesses. • User choice. A single credential for access to online services, or different credentials for different services. • User Controlled. Created by the user, and can be revoked by the user. • Privacy Protecting. No PII collected. Issues a unique persistent anonymous identifier to each Relying Party. • Government accredited Level 2 Assurance credential.
  • 17. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF)
  • 18. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) GCKey • Developed and operated by 2Keys as a Managed Security Service for the Government of Canada. • Built on the ForgeRock Platform. • Operated under SLA of 99.8% uptime with no scheduled login outages. • 24 x 7 x 365 Security Operations Centre. • 24 x 7 x 365 Level 1 and Level 2 Bi-lingual Service Desks. • Multiple geographically diverse instances.
  • 19. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) GCKey Key Facts • Go-live date was September 2012. • Over 7 million credentials issued. • Over 6 million active credentials in use. • Over 4 million authentications per month. • When given a choice, users choose the native GCKey credential over 3rd party non-government credentials by a factor or 10 to 1.
  • 20. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) Considerations for Public Sector online services: • Protecting user privacy is non-negotiable. – There is no business risk calculation to be made. Any privacy breach will be front page news. • For web SSO of government online services, global logout is an absolute must. – Cannot risk leaving a user unknowingly logged into a service. Must consider the use of shared kiosks at government service centers and shared computers. • With BYOC, providers must be carefully vetted – a credential federation is only as strong as the weakest link. – How secure is the technical solution? The business processes? – How susceptible is the service desk to social engineering? – Is there a natural trust relationship? What’s the tendency for sharing?
  • 21. Pan-Canadian Identity Standards Copyright © Identity Summit 2015, all rights reserved.
  • 22. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Pan-Canadian Standards for: • Trust Framework • Identity Validation • Identity Retrieval • Identity Notifications Will ensure that all jurisdictions use consistent terminology and procedures to enable a Pan-Canadian approach to identity services. Leverage trusted processes carried out in one jurisdiction for use by another.
  • 23. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Standardizing Concepts and Terms • Personal Information – Information about an identifiable person • Identity Information – Sufficient to ensure uniqueness within a service – Minimal set of attributes required by the service • Identifier – Minimal set of attributes to uniquely identify an entity • Assigned Identifier • Identity • Identity Resolution
  • 24. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Standardizing Data Sets • Personal Information Categories • Associated Data Elements Standardizing Services • Identity Validation • Identity Retrieval • Identity Notifications • Identity Resolution
  • 25. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Core Identity Attributes • Name • Date of Birth • Date of Death • Sex, Gender, Documented Sex • Place of Birth • Place of Death • Assigned Identifier • Status • Address • Associated Person
  • 26. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Value of Standardized Identity Services • Better delivery of services. – Improved identity-proofing processes, streamline user enrolment. • Increased integrity of programs and services. – Improved data accuracy, real-time validation, fraud detection. • Improved efficiency and reduced costs. – Reduced need for physical document inspection and in-person visits. • Increased velocity of innovation and transformation. – With standardized services in place, focus will be on delivering new value adds.
  • 27. Proof of Concept Identity Validation Copyright © Identity Summit 2015, all rights reserved.
  • 28. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation Identity Attributes as Entitlements • Attribute Based Access Control. • Utilize Identity Attributes and their Level of Assurance to drive service entitlements. • User asserted identity attributes consider LOA 1. • Utilize the Pan-Canadian Identity Validation Standard to promote user asserted identity attributes to LOA 2. • Attributes validated against existing government authoritative parties or 3rd party services.
  • 29. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation
  • 30. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation
  • 31. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation
  • 32. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation
  • 33. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation 2Keys Transaction Verification Service • Real-time user notification and approval to mobile device.
  • 34. Canadian Digital Interchange Putting it all Together Copyright © Identity Summit 2015, all rights reserved.
  • 35. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) An effort by the Government of Canada, along with Provincial and Territorial partners, to create a secure, reliable, near real-time, scalable messaging service to facilitate information exchange (i.e. identity attributes) across jurisdictions. The service will: • Ensure a standardized and comprehensive approach for the protection of personal information and ensure accountability from all partners.
  • 36. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) • Ensure identity information disclosure between jurisdictions is transparent – users will understand how and why their information is shared. • Implement a secure and cost-effective solution that will allow parties to confirm identity information, and provide updated information between relevant jurisdictions and programs where legal authority exists to do so. • Implement a solution without creating any new databases or repositories of personal information.
  • 37. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) Current Status • Request for Information has been issued, responses due by May 29, 2015. • No commitment yet on whether a Request for Proposal will be issued.
  • 38. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) 2Keys Proposal • Distributed Architecture • Based on UMA • CDI Trust Framework – Defines the “rules of the road” • CDI Deployment Profile – Defines the APIs – Defines the messages formats – Defines the data elements
  • 39. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) Jurisdictional Clouds • Identity data in Canada is distributed. • Provinces/Territories are authoritative on Birth and Death events. • Federal Government is authoritative on Immigration status. • Resource owners should have control over their data. • Does not preclude the use of shared resource among jurisdictions.
  • 40. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) A Digital Identity Ecosystem • The Canadian Digital Interchange is the beginning of a standardized Digital Identity Ecosystem, defining a common set of Identity Services for the public sector, and possibly the private sector in the future. • Potential for an Identity Marketplace to emerge, providing a source of revenue for governments to sustain their services.
  • 41. Thank You John Spicer jspicer@2Keys.ca Copyright © Identity Summit 2015, all rights reserved.

Editor's Notes

  1. I suspect not many of you have heard of 2Keys, so I’ll give a brief introduction, then I thought I would start with the 10,000 foot view of the federal government’s strategy for a digital Canada, followed by details on a relatively new organization aimed and growing the digital identity space in Canada. I’ll also talk about the current state, introduce the emerging Pan-Canadian identity standards, walk through a proof of concept related to identity validation, and finish with an overview of what’s coming next.
  2. Digital Canada 150 represents a comprehensive approach to ensuring Canada can take full advantage of the opportunities in the digital age.
  3. Memory Project - Creating a digital online record of the stories from our war veterans.
  4. Public launch in May of 2014, and opened their doors to new members.
  5. When a user accesses a protected resource, they are presented the chooser page to select their authentication method.
  6. You’ll notice the *, while the service is privacy protecting, it does limit the the authentication context at the CSPs. For example, the CSP can still monitor the velocity of authentication requests, but without knowing the source, it can’t tell the difference between a an error at one relying partying causing the use to re-attempt the login, or a compromised account where the attacker is trying to hijack accounts at as many services as he can.
  7. GCKey is an anonymous credential, where the user has complete control over creation and revocation. There is a sense of ownership. Many users are non citizens without Canadian bank accounts. Users may not be customers of one of the five financial institutions support Financial credentials are not applicable to business related online services such as Record of Employment and eManifest In Canada, there is not a strong relationship between financial institutions and the government, there is a tendency to use native credentials for native purposes -The second reason (my reason) is there isn't a natural trust relationship between the banks and the government. (Some cynics would argue neither can be trusted!) The federation isn't natural, not in the way that InCommon/CAF is natural to higher education. My belief is that there must be a natural circle of trust, perhaps even when the credential is the only thing being federated (and in an anonymous way). This solution is missing that. A more natural federation might be with provincial gov't credentials/identities - and perhaps that is in the works with recent developments in BC. And given that identity proofing must be repeated by each gov't agency, there are insufficient convenience motivations to overcome the lack of natural trust and use the partner sign-in. Getting a GCKey is a mild pain (one time) but once you have it why would you change? Easy recall of the more frequently used credential (from your bank) is the only reason and likely insufficient. 3rd party CSP are susceptible to social engineering breaches. There are many examples of breaches at banks and telcos by social engineering attacks through the service desks. Not sure who this could be done with GCKey, no PII available at the service desk. There is at the department level, but they have no access to the credential.
  8. There is consideration being given to adding telcos as credential providers. In Canada, the major telcos are also in the television business. To access TV shows online, many networks no require you to authenticate with your providers credential to gain access to premium content. My kids are the biggest users of this, so they know credential, and guess what? So do their friends. So while the technical implementation of the credential provider may meet the LOA 2 requirements, the user’s value attached that credential is very low. You get a mismatch is value. The same is true with banking credentials, except it’s the inverse. I attach more value to the credential, and don’t want to use it for anything but banking.
  9. Personal Information Information about an identifiable person Identity Information Sufficient to ensure uniqueness within a service Minimal setup of attributes required by the service Identifier Minimal setup of attributes to ensure uniqueness Identity Collection of attributes about a unique entity Assigned Identifier - Generated unique identifier linked to an identity
  10. The final piece of the proof of concept dealt with real-time user notifications. This utilized the 2Keys Transaction Verification Service and the 2Keys Smart Token mobile application. When a request is received, a real-time push notification message is sent to the mobile app, the user is presented with the details and asked to approve or decline the request. We believe this service will be a great companion for an UMA authorization server. Consider the classic Alice to Bob sharing use case, now Alice does need to pre-provision the sharing policy, she can approve it in real-time when Bob is ready to use the data.
  11. Distributed does not preclude the use of shared resources among jurisdictions, it does not required full distribution. Jurisdictions can collaborate and share costs. The distributed model will allow the CDI to grow over time. Some jurisdictions will lead, others will wait and watch. Follows the model of the API economy.