SlideShare a Scribd company logo
Digital Identity
DISCUSSION AT THE VANCOUVER IAM MEETUP 2017-12-19
ANDREWHUGHES3000@GMAIL.COM @IDIMANDREW
Digital Identity Landscape for Vancouver IAM Meetup by Andrew Hughes is licensed under
a Creative Commons Attribution 4.0 International License.
Today’s Topic
 (not blockchain – sorry!)
 What does the IAM/IDM landscape look like?
 Where do new approaches and technologies fit?
 What’s exciting (to me, at least) and evolving to attack long-standing
problems?
2
What Organizational Contexts?
 Context is everything
 Identification, authentication, authorization are all relative to a population, a
relationship set, a resource set, authorities, etc.
 A) Internal operations
 Employees, contractors, students, business units, …
 B) External partners
 Vendors, commercial partners, back-office services, supply chain, …
 C) External clients
 Customers, shoppers, social networks, offline-ish, devices/things, …
3
What other (non-org) contexts?
 Peer-to-peer (P2P)
 ‘Circle of Trust’ / ‘Web of Trust’
 User Centric
 Anonymous
 Profiling / cookie tracking / marketing segmentation
 Segregated domain (walled gardens, in-game communities)
 Self-Sovereign
 Non-Person Entity, Autonomous agents
4
What’s the primary goal of IDM?
 Convert an ‘unknown’ entity into a ‘known’ entity,
then do interesting stuff
 Login / Authenticate to a system
 Physical/logical credentials, authorization/access control, …
 Manage a customer (service) account & deliver services
 Personalize, add info, keep records, …
 Increase the ‘known-ness’ of the entity – increase ‘proof’ of identity
 Get attributes, assertions, evidence from sources to substantiate
 Register, enroll, step-up/’trust elevate’
5
What’s the primary goal of IDM?
 Convert an ‘unknown’ entity into a ‘known’ entity,
then do interesting stuff
 Login / Authenticate to a system
 Physical/logical credentials, authorization/access control, …
 Manage a customer (service) account & deliver services
 Could be: hire person, pay them, do productive work, manage, …
 Increase the ‘known-ness’ of the entity – increase ‘proof’ of identity
 Get attributes, assertions, evidence from sources to substantiate
 Register, enroll, step-up/’trust elevate’
6
A Simplistic Digital Identity Matrix
Internal External - Partner External - Client
‘Login’
1 4 7
Service Account
2 5 8
ID Verification &
’Entity Binding’ 3 6 9
7
A Simplistic Digital Identity Matrix
Internal Notes Tech Standards
1: ‘Login’
• Managed
environment
• Known actors
• Employment
contracts
• Policy is
enforceable
• Active Directory
• LDAP
• Virtual directory
• Privileged account
management
• Multi-factor
authentication
• Federated
authentication
• IDaaS &
Directories
• Lots of them
2: Service Account
3: ID Verification &
‘Entity Binding’
• Hiring process,
background
checks, payroll
• Onboarding
processes
• Long relationship
8
A Simplistic Digital Identity Matrix
External - Partner Notes Tech Standards
4: ‘Login’
• Known actors
• Commercial
contracts
• T&C enforceable
• Active Directory
• LDAP
• Virtual directory
• Privileged account
management
• Multi-factor
authentication
• Federated
authentication
• IDaaS &
Directories
• Lots of them5: Service Account
6: ID Verification &
‘Entity Binding’
• Contract specified
• Onboarding
processes
• Prior relationships
9
A Simplistic Digital Identity Matrix
External - Client Notes Tech Standards
7: ‘Login’
• Outside the
security domain
• Previously-
unknown actors
• T&C iffy
• Uncontrolled user
behaviour & tech
• Username-
password
• One-time
password (SW|HW)
• SW|HW ‘crypto’
tokens
• PKIs
• Biometric-enabled
devices
• Device
fingerprinting
• Decentralized
Identifiers
• NIST SP 800-63
• ISO 24760
• ISO 29003
• ISO 29115
• OASIS SAML
• IETF OAUTH, JWT,
JOSE, SCIM
• OIDF OpenID
Connect
• FIDO U2F & UAF &
CTAP
• W3C Verifiable
Claims, WebAuthn
• OpenBadges
8: Service Account
9: ID Verification &
‘Entity Binding’
• Self-asserted
evidence
• KBA/KBV (ugh)
• ID Resolution
companies
• Remote attribute
assertions
10
Old approaches
 Increase the ‘known-ness’ of the entity – increase ‘proof’ of identity
 Get attributes, assertions, evidence from sources to substantiate
 Old approaches
 Gather ID Evidence at registration only
 Use ‘paper’ credentials as a primary source of evidence
 Weak connection (binding process) between person and issued authentication credential
 Use public, hacked, or guessable data to feed KBA/KBV and (in)security questions
 Rely on service counter staff to be better than machines and fake ID
11
A Simplistic Digital Identity Matrix
External - Client Notes Tech Standards
7: ‘Login’
• Outside the
security domain
• Previously-
unknown actors
• T&C iffy
• Uncontrolled user
behaviour & tech
• Username-
password
• One-time
password (SW|HW)
• SW|HW ‘crypto’
tokens
• PKIs
• Biometric-enabled
devices
• Device
fingerprinting
• Decentralized
Identifiers
• NIST SP 800-63 v3
• ISO 24760
• ISO 29003
• ISO 29115
• OASIS SAML
• IETF OAUTH, JWT,
JOSE, SCIM
• OIDF OpenID
Connect
• FIDO U2F & UAF &
CTAP
• W3C Verifiable
Claims, WebAuthn
• OpenBadges
8: Service Account
9: ID Verification &
‘Entity Binding’
• Self-asserted
evidence
• KBA/KBV (ugh)
• ID Resolution
companies
• Remote attribute
assertions
12
Old ways: How to connect/bind
the ‘entity’ to the ‘electronic
record’
New techniques
 Increase the ‘known-ness’ of the entity – increase ‘proof’ of identity
 Get attributes, assertions, evidence from sources to substantiate
 New techniques
 Attribute collection and verification over time
 Accept assertions from a large number of authorities and sources
 Risk-based and relationship-based confidence
 Use ‘non-memory’ human indicators to confirm presence and the specific individual
(device fingerprints, behavioural analysis, human gestures)
 Optimize for user experience (passwordless systems, hardware/mobile authenticators,
intrude thoughtfully, better account recovery)
 Don’t trust the humans to spot the fake credentials
13
A Simplistic Digital Identity Matrix
External - Client Notes Tech Standards
7: ‘Login’
• Outside the
security domain
• Previously-
unknown actors
• T&C iffy
• Uncontrolled user
behaviour & tech
• Username-
password
• One-time
password (SW|HW)
• SW|HW ‘crypto’
tokens
• PKIs
• Biometric-enabled
devices
• Device
fingerprinting
• Decentralized
Identifiers
• NIST SP 800-63 v3
• ISO 24760
• ISO 29003
• ISO 29115
• OASIS SAML
• IETF OAUTH, JWT,
JOSE, SCIM
• OIDF OpenID
Connect
• FIDO U2F & UAF &
CTAP
• W3C Verifiable
Claims, WebAuthn
• OpenBadges
8: Service Account
9: ID Verification &
‘Entity Binding’
• Self-asserted
evidence
• KBA/KBV (ugh)
• ID Resolution
companies
• Remote attribute
assertions
14
New ways to triangulate on the
‘entity’ and build confidence
over time
Problems?
 How does a service provider figure out all the authorities, data sources and
verifiers that pertain to an entity?
 How does a service provider know if data about an entity is ‘good’ or reliable?
 How does an entity keep track of where it’s authorities, data sources and
verifiers are?
 How does an entity shield themselves from correlation and usage profiling?
 Who keeps the private keys private?
 Does anyone actually care who the real person really and truly is? Or is taking
their word for it good enough most of the time?
In other words: should IDM systems be very concerned with identification? Or
mostly authentication and verification? 
15
Attribute Data
 Fast evolution of approaches and technologies
 Data is a toxic compound!
 How to decentralize or distribute data to lower risk and overhead?
 Move to a claims-based approach
 Be an originator and authority for the smallest possible data set
 See Open Badges, Blockcerts, Verifiable Claims
16
Verifiable Claims
 https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-
fall2017/blob/master/topics-and-advance-readings/verifiable-claims-
primer.md
 Key points
 Issuer does not know when or to whom the Holder presents the claim
 Strategy is to use a browser ‘polyfill’ and the Web Payments pattern to
encourage vendors to build it in
17
Blockcerts, Open Badges
 “Learning Machine collaborated with the MIT Media Lab to develop
Blockcerts, an open standard for issuing and verifying credentials on a
blockchain.”
 “The aim behind Blockcerts is to give recipients ownership of their official
records so that they are freed from ongoing dependency on issuing
institutions—or any centralized authority—to verify their own credentials
and achievements.”
 “Blockcerts, a blockchain-based credentialing standard, is architected from
many of the same values that drove the development of Open Badges:
interoperability, portability, and verifiability.”
 https://medium.com/learning-machine-blog/the-time-for-self-sovereign-
identity-is-now-222aab97041b
18
Identifiers
 Fast evolution of approaches and technologies
 Turns out that identifiers are (still) the keys to the systems
 Universal identifiers are not great for online connected systems (e.g. email
address or SIN)
 Per-domain identifiers do not readily cross namespace boundaries
 People do not deal with kazillions of identifiers very well
 Public registries and DLT approaches are evolving to enable namespace
discovery and traversal
 See Decentralized Identifiers, Blockstack/Onename
19
Decentralized Identifiers
 “Decentralized Identifiers (DIDs) are a new type of identifier intended for
verifiable digital identity that is "self-sovereign", i.e., fully under the control
of an entity and not dependent on a centralized registry, identity provider,
or certificate authority. DIDs resolve to DID Documents. Which typically
contains at least three things. 1) a set of mechanisms that may be used to
authenticate as as a particular DID (e.g. public keys, pseudonymous
biometric templates, etc.). 2) a set of authorization information that
outlines which entities may modify the DID Document. 3) a set of service
endpoints, which may be used to initiate trusted interactions with the
entity.”
 Decentralized ID Foundation:
https://medium.com/decentralized-identity/the-rising-tide-of-
decentralized-identity-2e163e4ec663
20
Decentralized Public Key Systems
 This is still the big unsolved issue – how to generate, distribute, manage
and secure key pairs
 Will ‘blockchain wallets’ save the day?
 Will someone develop self-healing key management systems?
 Will a new type of entity arise to do the ‘binding’ of entity to keys better than
Certificate Authorities have done?
 Who will invent ‘keyless’ security systems that take responsibility for
private keys away from the humans?
21
Entity Binding & Assurance
 Precise determination of the actual, authentic, ‘real person’ entity is
overrated in most cases
 In particular when it is front-loaded into registration
 This approach tends to grow big data sets that need to be maintained
 Long-lasting services or infrequent accesses defeat the utility of front-loaded
resolution
 Risk-based authentication, delayed identification, real-time techniques, trust
elevation are being used to increase assurance over time that the entity is
correctly identified when needed and to the degree needed
22
About me
 Andrew Hughes, CISSP, CISM
 Founder, ITIM Consulting Corp.
 ~ 25 years in IM/IT consulting
 ~ 14 years @ Sierra Systems Victoria; ~ 5 years Independent Analyst
 Working on: digital identity & personal data consortia, international standards,
trust frameworks, peering into the future of digital people and evolving
systems of systems
 KantaraInitiative.org Leadership Council Chair; Chair of Consent & Information
Sharing WG; Secretary/Instigator of the new Consent Management Solutions WG
 Past Plenary Vice-Chair, US NSTIC ID Ecosystem Steering Committee
 Current delegate to ISO as a Canadian Expert for SC 27 WG 5 (Identity and Privacy);
co-rapporteur for 2 Study Periods, tracking 3-4 standards
 I learn about, research and explore new and interesting Digital Identity stuff
that will emerge in 3 to 5 years’ time.
23

More Related Content

What's hot

Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
kantarainitiative
 
Lessons Learned from Federal ICAM - User Group
Lessons Learned from Federal ICAM - User GroupLessons Learned from Federal ICAM - User Group
Lessons Learned from Federal ICAM - User Group
Joel Rader, CISSP
 
Blockchain Solutions for HR
Blockchain Solutions for HRBlockchain Solutions for HR
Blockchain Solutions for HR
Edward Lange
 
Managing identity for the future how everybody can win - david alexander - ...
Managing identity for the future   how everybody can win - david alexander - ...Managing identity for the future   how everybody can win - david alexander - ...
Managing identity for the future how everybody can win - david alexander - ...
Mydex CIC
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
SSIMeetup
 
Blockchain in human resource
Blockchain in human resourceBlockchain in human resource
Blockchain in human resource
Celine George
 
ICAM Target Architecture
ICAM Target ArchitectureICAM Target Architecture
ICAM Target Architecture
Joel Rader, CISSP
 
Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013
Mydex CIC
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Kaliya "Identity Woman" Young
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
Calvin Cheng
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
sorenpeter
 
Blockchain private permissioned
Blockchain private permissionedBlockchain private permissioned
Blockchain private permissioned
Jan Biets [jan_biets@hotmail.com]
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
Eryk Budi Pratama
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
Phil Windley
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
Avirot Mitamura
 
Building trust attributes in e transactions (final) ver 3.0
Building trust attributes in e transactions (final) ver 3.0Building trust attributes in e transactions (final) ver 3.0
Building trust attributes in e transactions (final) ver 3.0
Aladdin Dandis
 
Baasid whitepaper_v2.9.8_en
Baasid whitepaper_v2.9.8_enBaasid whitepaper_v2.9.8_en
Baasid whitepaper_v2.9.8_en
BaaSid, Blockchain as a Service for ID
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
Tudor Stanciu
 
Verifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply ChainsVerifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply Chains
Karyl Fowler
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentation
Sebastian Cochinescu
 

What's hot (20)

Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Lessons Learned from Federal ICAM - User Group
Lessons Learned from Federal ICAM - User GroupLessons Learned from Federal ICAM - User Group
Lessons Learned from Federal ICAM - User Group
 
Blockchain Solutions for HR
Blockchain Solutions for HRBlockchain Solutions for HR
Blockchain Solutions for HR
 
Managing identity for the future how everybody can win - david alexander - ...
Managing identity for the future   how everybody can win - david alexander - ...Managing identity for the future   how everybody can win - david alexander - ...
Managing identity for the future how everybody can win - david alexander - ...
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
Blockchain in human resource
Blockchain in human resourceBlockchain in human resource
Blockchain in human resource
 
ICAM Target Architecture
ICAM Target ArchitectureICAM Target Architecture
ICAM Target Architecture
 
Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013
 
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
Blockchain private permissioned
Blockchain private permissionedBlockchain private permissioned
Blockchain private permissioned
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Building trust attributes in e transactions (final) ver 3.0
Building trust attributes in e transactions (final) ver 3.0Building trust attributes in e transactions (final) ver 3.0
Building trust attributes in e transactions (final) ver 3.0
 
Baasid whitepaper_v2.9.8_en
Baasid whitepaper_v2.9.8_enBaasid whitepaper_v2.9.8_en
Baasid whitepaper_v2.9.8_en
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
Verifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply ChainsVerifiable Credentials for Global Supply Chains
Verifiable Credentials for Global Supply Chains
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentation
 

Similar to Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19

Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
bernardgolden
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
Prof. Jacques Folon (Ph.D)
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. Solution
Timetogrowup
 
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver  ISSA Chapter Meetings - Changing the Security ParadigmDenver  ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity Defined Security Alliance
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
Karyl Fowler
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Evernym
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
jbasney
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
Heather Vescent
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
Katherine Cola
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
PECB
 
IAM
IAMIAM
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
Evernym
 
Building open source identity infrastructures
Building open source identity infrastructuresBuilding open source identity infrastructures
Building open source identity infrastructures
Francesco Chicchiriccò
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
Prof. Jacques Folon (Ph.D)
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
Priyanka Aash
 
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Azgari Lipshy
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Ubisecure
 

Similar to Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19 (20)

Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, MicrosoftBlockchain-Anchored Identity -- Daniel Buchner, Microsoft
Blockchain-Anchored Identity -- Daniel Buchner, Microsoft
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Jan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. SolutionJan Keil - Identity and access management Facts. Challenges. Solution
Jan Keil - Identity and access management Facts. Challenges. Solution
 
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver  ISSA Chapter Meetings - Changing the Security ParadigmDenver  ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
 
Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
 
IAM
IAMIAM
IAM
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
Building open source identity infrastructures
Building open source identity infrastructuresBuilding open source identity infrastructures
Building open source identity infrastructures
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
Benefits of Blockchain for Identity and Access Management - By Azgari Lipshy
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 

Recently uploaded

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19

  • 1. Digital Identity DISCUSSION AT THE VANCOUVER IAM MEETUP 2017-12-19 ANDREWHUGHES3000@GMAIL.COM @IDIMANDREW Digital Identity Landscape for Vancouver IAM Meetup by Andrew Hughes is licensed under a Creative Commons Attribution 4.0 International License.
  • 2. Today’s Topic  (not blockchain – sorry!)  What does the IAM/IDM landscape look like?  Where do new approaches and technologies fit?  What’s exciting (to me, at least) and evolving to attack long-standing problems? 2
  • 3. What Organizational Contexts?  Context is everything  Identification, authentication, authorization are all relative to a population, a relationship set, a resource set, authorities, etc.  A) Internal operations  Employees, contractors, students, business units, …  B) External partners  Vendors, commercial partners, back-office services, supply chain, …  C) External clients  Customers, shoppers, social networks, offline-ish, devices/things, … 3
  • 4. What other (non-org) contexts?  Peer-to-peer (P2P)  ‘Circle of Trust’ / ‘Web of Trust’  User Centric  Anonymous  Profiling / cookie tracking / marketing segmentation  Segregated domain (walled gardens, in-game communities)  Self-Sovereign  Non-Person Entity, Autonomous agents 4
  • 5. What’s the primary goal of IDM?  Convert an ‘unknown’ entity into a ‘known’ entity, then do interesting stuff  Login / Authenticate to a system  Physical/logical credentials, authorization/access control, …  Manage a customer (service) account & deliver services  Personalize, add info, keep records, …  Increase the ‘known-ness’ of the entity – increase ‘proof’ of identity  Get attributes, assertions, evidence from sources to substantiate  Register, enroll, step-up/’trust elevate’ 5
  • 6. What’s the primary goal of IDM?  Convert an ‘unknown’ entity into a ‘known’ entity, then do interesting stuff  Login / Authenticate to a system  Physical/logical credentials, authorization/access control, …  Manage a customer (service) account & deliver services  Could be: hire person, pay them, do productive work, manage, …  Increase the ‘known-ness’ of the entity – increase ‘proof’ of identity  Get attributes, assertions, evidence from sources to substantiate  Register, enroll, step-up/’trust elevate’ 6
  • 7. A Simplistic Digital Identity Matrix Internal External - Partner External - Client ‘Login’ 1 4 7 Service Account 2 5 8 ID Verification & ’Entity Binding’ 3 6 9 7
  • 8. A Simplistic Digital Identity Matrix Internal Notes Tech Standards 1: ‘Login’ • Managed environment • Known actors • Employment contracts • Policy is enforceable • Active Directory • LDAP • Virtual directory • Privileged account management • Multi-factor authentication • Federated authentication • IDaaS & Directories • Lots of them 2: Service Account 3: ID Verification & ‘Entity Binding’ • Hiring process, background checks, payroll • Onboarding processes • Long relationship 8
  • 9. A Simplistic Digital Identity Matrix External - Partner Notes Tech Standards 4: ‘Login’ • Known actors • Commercial contracts • T&C enforceable • Active Directory • LDAP • Virtual directory • Privileged account management • Multi-factor authentication • Federated authentication • IDaaS & Directories • Lots of them5: Service Account 6: ID Verification & ‘Entity Binding’ • Contract specified • Onboarding processes • Prior relationships 9
  • 10. A Simplistic Digital Identity Matrix External - Client Notes Tech Standards 7: ‘Login’ • Outside the security domain • Previously- unknown actors • T&C iffy • Uncontrolled user behaviour & tech • Username- password • One-time password (SW|HW) • SW|HW ‘crypto’ tokens • PKIs • Biometric-enabled devices • Device fingerprinting • Decentralized Identifiers • NIST SP 800-63 • ISO 24760 • ISO 29003 • ISO 29115 • OASIS SAML • IETF OAUTH, JWT, JOSE, SCIM • OIDF OpenID Connect • FIDO U2F & UAF & CTAP • W3C Verifiable Claims, WebAuthn • OpenBadges 8: Service Account 9: ID Verification & ‘Entity Binding’ • Self-asserted evidence • KBA/KBV (ugh) • ID Resolution companies • Remote attribute assertions 10
  • 11. Old approaches  Increase the ‘known-ness’ of the entity – increase ‘proof’ of identity  Get attributes, assertions, evidence from sources to substantiate  Old approaches  Gather ID Evidence at registration only  Use ‘paper’ credentials as a primary source of evidence  Weak connection (binding process) between person and issued authentication credential  Use public, hacked, or guessable data to feed KBA/KBV and (in)security questions  Rely on service counter staff to be better than machines and fake ID 11
  • 12. A Simplistic Digital Identity Matrix External - Client Notes Tech Standards 7: ‘Login’ • Outside the security domain • Previously- unknown actors • T&C iffy • Uncontrolled user behaviour & tech • Username- password • One-time password (SW|HW) • SW|HW ‘crypto’ tokens • PKIs • Biometric-enabled devices • Device fingerprinting • Decentralized Identifiers • NIST SP 800-63 v3 • ISO 24760 • ISO 29003 • ISO 29115 • OASIS SAML • IETF OAUTH, JWT, JOSE, SCIM • OIDF OpenID Connect • FIDO U2F & UAF & CTAP • W3C Verifiable Claims, WebAuthn • OpenBadges 8: Service Account 9: ID Verification & ‘Entity Binding’ • Self-asserted evidence • KBA/KBV (ugh) • ID Resolution companies • Remote attribute assertions 12 Old ways: How to connect/bind the ‘entity’ to the ‘electronic record’
  • 13. New techniques  Increase the ‘known-ness’ of the entity – increase ‘proof’ of identity  Get attributes, assertions, evidence from sources to substantiate  New techniques  Attribute collection and verification over time  Accept assertions from a large number of authorities and sources  Risk-based and relationship-based confidence  Use ‘non-memory’ human indicators to confirm presence and the specific individual (device fingerprints, behavioural analysis, human gestures)  Optimize for user experience (passwordless systems, hardware/mobile authenticators, intrude thoughtfully, better account recovery)  Don’t trust the humans to spot the fake credentials 13
  • 14. A Simplistic Digital Identity Matrix External - Client Notes Tech Standards 7: ‘Login’ • Outside the security domain • Previously- unknown actors • T&C iffy • Uncontrolled user behaviour & tech • Username- password • One-time password (SW|HW) • SW|HW ‘crypto’ tokens • PKIs • Biometric-enabled devices • Device fingerprinting • Decentralized Identifiers • NIST SP 800-63 v3 • ISO 24760 • ISO 29003 • ISO 29115 • OASIS SAML • IETF OAUTH, JWT, JOSE, SCIM • OIDF OpenID Connect • FIDO U2F & UAF & CTAP • W3C Verifiable Claims, WebAuthn • OpenBadges 8: Service Account 9: ID Verification & ‘Entity Binding’ • Self-asserted evidence • KBA/KBV (ugh) • ID Resolution companies • Remote attribute assertions 14 New ways to triangulate on the ‘entity’ and build confidence over time
  • 15. Problems?  How does a service provider figure out all the authorities, data sources and verifiers that pertain to an entity?  How does a service provider know if data about an entity is ‘good’ or reliable?  How does an entity keep track of where it’s authorities, data sources and verifiers are?  How does an entity shield themselves from correlation and usage profiling?  Who keeps the private keys private?  Does anyone actually care who the real person really and truly is? Or is taking their word for it good enough most of the time? In other words: should IDM systems be very concerned with identification? Or mostly authentication and verification?  15
  • 16. Attribute Data  Fast evolution of approaches and technologies  Data is a toxic compound!  How to decentralize or distribute data to lower risk and overhead?  Move to a claims-based approach  Be an originator and authority for the smallest possible data set  See Open Badges, Blockcerts, Verifiable Claims 16
  • 17. Verifiable Claims  https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust- fall2017/blob/master/topics-and-advance-readings/verifiable-claims- primer.md  Key points  Issuer does not know when or to whom the Holder presents the claim  Strategy is to use a browser ‘polyfill’ and the Web Payments pattern to encourage vendors to build it in 17
  • 18. Blockcerts, Open Badges  “Learning Machine collaborated with the MIT Media Lab to develop Blockcerts, an open standard for issuing and verifying credentials on a blockchain.”  “The aim behind Blockcerts is to give recipients ownership of their official records so that they are freed from ongoing dependency on issuing institutions—or any centralized authority—to verify their own credentials and achievements.”  “Blockcerts, a blockchain-based credentialing standard, is architected from many of the same values that drove the development of Open Badges: interoperability, portability, and verifiability.”  https://medium.com/learning-machine-blog/the-time-for-self-sovereign- identity-is-now-222aab97041b 18
  • 19. Identifiers  Fast evolution of approaches and technologies  Turns out that identifiers are (still) the keys to the systems  Universal identifiers are not great for online connected systems (e.g. email address or SIN)  Per-domain identifiers do not readily cross namespace boundaries  People do not deal with kazillions of identifiers very well  Public registries and DLT approaches are evolving to enable namespace discovery and traversal  See Decentralized Identifiers, Blockstack/Onename 19
  • 20. Decentralized Identifiers  “Decentralized Identifiers (DIDs) are a new type of identifier intended for verifiable digital identity that is "self-sovereign", i.e., fully under the control of an entity and not dependent on a centralized registry, identity provider, or certificate authority. DIDs resolve to DID Documents. Which typically contains at least three things. 1) a set of mechanisms that may be used to authenticate as as a particular DID (e.g. public keys, pseudonymous biometric templates, etc.). 2) a set of authorization information that outlines which entities may modify the DID Document. 3) a set of service endpoints, which may be used to initiate trusted interactions with the entity.”  Decentralized ID Foundation: https://medium.com/decentralized-identity/the-rising-tide-of- decentralized-identity-2e163e4ec663 20
  • 21. Decentralized Public Key Systems  This is still the big unsolved issue – how to generate, distribute, manage and secure key pairs  Will ‘blockchain wallets’ save the day?  Will someone develop self-healing key management systems?  Will a new type of entity arise to do the ‘binding’ of entity to keys better than Certificate Authorities have done?  Who will invent ‘keyless’ security systems that take responsibility for private keys away from the humans? 21
  • 22. Entity Binding & Assurance  Precise determination of the actual, authentic, ‘real person’ entity is overrated in most cases  In particular when it is front-loaded into registration  This approach tends to grow big data sets that need to be maintained  Long-lasting services or infrequent accesses defeat the utility of front-loaded resolution  Risk-based authentication, delayed identification, real-time techniques, trust elevation are being used to increase assurance over time that the entity is correctly identified when needed and to the degree needed 22
  • 23. About me  Andrew Hughes, CISSP, CISM  Founder, ITIM Consulting Corp.  ~ 25 years in IM/IT consulting  ~ 14 years @ Sierra Systems Victoria; ~ 5 years Independent Analyst  Working on: digital identity & personal data consortia, international standards, trust frameworks, peering into the future of digital people and evolving systems of systems  KantaraInitiative.org Leadership Council Chair; Chair of Consent & Information Sharing WG; Secretary/Instigator of the new Consent Management Solutions WG  Past Plenary Vice-Chair, US NSTIC ID Ecosystem Steering Committee  Current delegate to ISO as a Canadian Expert for SC 27 WG 5 (Identity and Privacy); co-rapporteur for 2 Study Periods, tracking 3-4 standards  I learn about, research and explore new and interesting Digital Identity stuff that will emerge in 3 to 5 years’ time. 23