SlideShare a Scribd company logo
Higgins 1:  A species of Tasmanian long-tailed mouse 2:  An open source identity framework being developed at the Eclipse Foundation
Sections ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Section One: Higgins 1.0 Released February 2008 Commercial products based on Higgins 1.0 have been announced by Novell, Serena, Computer Associates and IBM Copyright © 2008 Parity. Made available under EPL 1.0
Higgins is an Identity Framework Enables users and applications to integrate identity, profile, and social relationship information across multiple data sources and protocols.  Copyright © 2008 Parity. Made available under EPL 1.0
End-users experience Higgins through the UI metaphor of Information Cards using an app called an  Identity Selector Information Cards and selectors are just tip of the iceberg of what can be done with Higgins, but it’s a place to start… Copyright © 2008 Parity. Made available under EPL 1.0
Today you go from site to site filling in forms and passwords Copyright © 2008 Parity. Made available under EPL 1.0 Type, type, type. Click, click.  Here a password, there a password. Everywhere a password. Here a form, there a form, ... Websites…
Information Cards Put You in Control Copyright © 2008 Parity. Made available under EPL 1.0 Each card is a slice of the digital you (or a friend of yours) held in some data silo. Any kind of information: your preferences, favorite songs, employee id numbers, drivers licenses, affiliations, your health plan id, ...you get the idea, can be accessed using a card. This wallet-like thing is an app called an  Identity Selector
Higgins Identity Selectors Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
How to Use I-Cards ,[object Object],[object Object],[object Object]
Identity Selector “Wallet” Click on a card to send it to a site Click Copyright © 2008 Parity. Made available under EPL 1.0 Higgins is interoperable with Microsoft CardSpace™ shown here
Identity Selector Card-based Sign-in ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Selector Supported Card Types Copyright © 2008 Parity. Made available under EPL 1.0 Managed  What some other entity says about you Personal  What you say about you
Identity Selectors Three Flavors in Higgins 1.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App  Identity Provider Relying Party  Website or App  Cards are generated and downloaded from here.  A local Token Service issues tokens as requested by Selector. Cards are stored and selected here Tokens containing claim data is requested and received here
Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App  Identity Provider Relying Party  Some Higgins Identity Selectors rely on a hosted  I-Card Service component
Identity Selector  Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins Identity Selectors. Client apps for Windows, OSX and Linux  I-Card Web Service User
Identity Selector  Selector Selector – Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins includes a Higgins Selector Selector component (Windows-only)  Provides an abstraction layer that decouples browser extensions from selectors.  I-Card Web Service User
Architecture Identity Providers Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Selectors Identity Attribute Service Identity Services
Identity Providers  Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins Token/IdP Service is used by the Identity Provider website User
Identity Providers Two Flavors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Architecture Relying Party Website Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Selectors Identity Attribute Service Identity Services
Relying Party Website  Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet RP Libraries Selector Selector Higgins RP Website provides code to validate tokens from Identity Selectors Key: Generic Technology Higgins Components User
Relying Party Website Multi-Protocol Support ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Architecture Identity Services Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
Architecture Extensible  Identity Services Copyright © 2008 Parity. Made available under EPL 1.0 CardSpace Protocol Provider-Plugins Implement RP protocols OpenID Managed I-Card Provider-Plugins   Implement card types Personal SAML X509 Relationship Kerberos Token Provider-Plugins Implement security tokens UN/PW Idemix Plug-ins Identity Services Login (un/pw) Key: Beyond Higgins 1.0 Higgins 1.0
Architecture Identity Attribute Service Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
Architecture Extensible  Identity Attribute Service Copyright © 2008 Parity. Made available under EPL 1.0 Identity Attribute Service (IdAS) LDAP XML File IdAS Context Providers-Plugins   Connect to existing data sources RDF Google Contacts Others… Plug-ins Key: Beyond Higgins 1.0 Higgins 1.0
Identity Attribute Service ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service Context Data Model (CDM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service CDM extends RDF ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Architecture Interoperability Points Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
Interoperability Event Participants RSA 2008 Copyright © 2008 Parity. Made available under EPL 1.0
Interoperability Event Participants RSA 2008 Copyright © 2008 Parity. Made available under EPL 1.0
Section Two: Higgins 1.1 June 2009 Copyright © 2008 Parity. Made available under EPL 1.0
AIR-Based Selector ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service  Access Control Enhancements ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service  New Context Providers ,[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service XDI Protocol Support ,[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Relationship Cards Relationship Card What you  and  Best Buy say about you Copyright © 2008 Parity. Made available under EPL 1.0
Relationship Cards  Human Friendly Data References ,[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0 Data object (called an  Entity )
Relationship Cards  Data Location and Authority ,[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Relationship Cards Data Model ,[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Other New Card Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Selector as an OpenID Service OpenID Provider  Identity Provider Relying Website I-Card Web Service Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector OpenID 2.0 OP with associated Higgins Selector Service User
ID-WSF Support (maybe) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
IdAS Client Component (maybe) Higgins Identity Selector Local App Higgins  I-Card Service Banking  Site eCommerce or Community Site SAML Enterprise Directory Social Network Site Social Networks RDF Semantic Web Repository Social Network Site STS IdP RP STS IdP RP SAML2 IdP I dAS Client LDAP Server Linked Data Server OpenSocial OpenID Provider I dAS Client IdAS  Client Other Local Apps & Bots IdAS Client Internet Extension Browser Key: K ey: O ther… R DF O pen  Social L DAP Enterprise Directories Enterprise Directories Enterprise Directories Social Networks Linked Data Linked Data Linked Data Higgins 1.0 H iggins X.X 3 rd  Party I dAS RDF Data Source LDAP Directory Browser Computer or mobile device LDAP Identity Providers Web apps CP XDI Service XDI4J Selector Selector RDF CP Personal Data Services Web 2.0 and Enterprise Apps Higgins Extension Data Contexts Identity Attribute Service
Section Three:  Beyond Higgins 1.1 Mobile Higgins Higgins project is seeking project funding and/or contributions to develop a Higgins selector for mobile platforms Copyright © 2008 Parity. Made available under EPL 1.0
Target Platforms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Project Co-leads http://higgins-project.org Paul Trevithick    Mary Ruddy [email_address]   [email_address] +1.617.513.7924   +1.617.290.8591 Copyright © 2008 Parity. Made available under EPL 1.0
Appendix Original Project Goals Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 1 of 5 ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 2 of 5 ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 3 of 5 ,[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 4 of 5 ,[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 5 of 5 ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0

More Related Content

What's hot

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
Martijn Oostdijk
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...
AntonioMaio2
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
SC Leung
 
Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...
Amazon Web Services
 
Secure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid'sSecure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid's
Swathi Rampur
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?
rlsoft
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
Oliver Pfaff
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
Synacts
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
TransUnion
 
Saas webinar-dec6-01
Saas webinar-dec6-01Saas webinar-dec6-01
Saas webinar-dec6-01Paul Madsen
 
Authentication and Identity with Amazon Cognito
Authentication and Identity with Amazon CognitoAuthentication and Identity with Amazon Cognito
Authentication and Identity with Amazon Cognito
Amazon Web Services
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5
DigiLocker
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio Maio
AntonioMaio2
 
Digital Locker User Manual
Digital Locker User ManualDigital Locker User Manual
Digital Locker User Manual
DigiLocker
 

What's hot (17)

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
Open ID in Government
Open ID in GovernmentOpen ID in Government
Open ID in Government
 
Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...
 
Secure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid'sSecure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid's
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Saas webinar-dec6-01
Saas webinar-dec6-01Saas webinar-dec6-01
Saas webinar-dec6-01
 
Authentication and Identity with Amazon Cognito
Authentication and Identity with Amazon CognitoAuthentication and Identity with Amazon Cognito
Authentication and Identity with Amazon Cognito
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio Maio
 
Digital Locker User Manual
Digital Locker User ManualDigital Locker User Manual
Digital Locker User Manual
 

Viewers also liked

MeeGo, AppUp & Atom – планы и перспективы
MeeGo, AppUp & Atom – планы и перспективыMeeGo, AppUp & Atom – планы и перспективы
MeeGo, AppUp & Atom – планы и перспективыElena Kotina
 
Skydiving 07-2006
Skydiving 07-2006Skydiving 07-2006
Skydiving 07-2006
TracieGrady
 
Plan de trabajo
Plan de trabajoPlan de trabajo
Plan de trabajo
guesta27e2
 
онтология
онтологияонтология
онтологияElena Kotina
 
AdentráNdonos Nas Renovables
AdentráNdonos Nas RenovablesAdentráNdonos Nas Renovables
AdentráNdonos Nas Renovables
BelindaLorenzo
 
Extrospection klinkowstein 2011_slideshare
Extrospection klinkowstein 2011_slideshareExtrospection klinkowstein 2011_slideshare
Extrospection klinkowstein 2011_slideshare
Thomas Klinkowstein
 
Innovations Dirty Secrets
Innovations Dirty SecretsInnovations Dirty Secrets
Innovations Dirty Secrets
Jay Heuer
 
FreedomBox
FreedomBoxFreedomBox
FreedomBox
Markus Sabadello
 
Klinkowstein tom design and value(s) in the interconnected state
Klinkowstein tom design and value(s) in the interconnected stateKlinkowstein tom design and value(s) in the interconnected state
Klinkowstein tom design and value(s) in the interconnected state
Thomas Klinkowstein
 
Singularit University presentation Nanotechnology nextbigfuture.com
Singularit University presentation Nanotechnology nextbigfuture.comSingularit University presentation Nanotechnology nextbigfuture.com
Singularit University presentation Nanotechnology nextbigfuture.com
Brian Wang
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A Blogguestd7940cb
 
Problem-based Learning & Resource-based Learning two complementary approac...
Problem-based Learning & Resource-based Learning  two complementary approac...Problem-based Learning & Resource-based Learning  two complementary approac...
Problem-based Learning & Resource-based Learning two complementary approac...Wilco te Winkel
 
Latest Developments in Nanotechnology: Singularity University Presentation
Latest Developments in Nanotechnology: Singularity University PresentationLatest Developments in Nanotechnology: Singularity University Presentation
Latest Developments in Nanotechnology: Singularity University Presentation
Brian Wang
 
Technology Developments for high impact future technology
Technology Developments for high impact future technologyTechnology Developments for high impact future technology
Technology Developments for high impact future technologyBrian Wang
 
Intro lecture and workshop project
Intro lecture and workshop projectIntro lecture and workshop project
Intro lecture and workshop project
Thomas Klinkowstein
 

Viewers also liked (20)

MeeGo, AppUp & Atom – планы и перспективы
MeeGo, AppUp & Atom – планы и перспективыMeeGo, AppUp & Atom – планы и перспективы
MeeGo, AppUp & Atom – планы и перспективы
 
Skydiving 07-2006
Skydiving 07-2006Skydiving 07-2006
Skydiving 07-2006
 
Plan de trabajo
Plan de trabajoPlan de trabajo
Plan de trabajo
 
77538 therapythorugh love
77538 therapythorugh love77538 therapythorugh love
77538 therapythorugh love
 
онтология
онтологияонтология
онтология
 
AdentráNdonos Nas Renovables
AdentráNdonos Nas RenovablesAdentráNdonos Nas Renovables
AdentráNdonos Nas Renovables
 
Extrospection klinkowstein 2011_slideshare
Extrospection klinkowstein 2011_slideshareExtrospection klinkowstein 2011_slideshare
Extrospection klinkowstein 2011_slideshare
 
Higgins
HigginsHiggins
Higgins
 
Innovations Dirty Secrets
Innovations Dirty SecretsInnovations Dirty Secrets
Innovations Dirty Secrets
 
FreedomBox
FreedomBoxFreedomBox
FreedomBox
 
Higgins
HigginsHiggins
Higgins
 
Higgins
HigginsHiggins
Higgins
 
Klinkowstein tom design and value(s) in the interconnected state
Klinkowstein tom design and value(s) in the interconnected stateKlinkowstein tom design and value(s) in the interconnected state
Klinkowstein tom design and value(s) in the interconnected state
 
Singularit University presentation Nanotechnology nextbigfuture.com
Singularit University presentation Nanotechnology nextbigfuture.comSingularit University presentation Nanotechnology nextbigfuture.com
Singularit University presentation Nanotechnology nextbigfuture.com
 
How To Create A Blog
How To Create A BlogHow To Create A Blog
How To Create A Blog
 
Higgins ESE
Higgins ESEHiggins ESE
Higgins ESE
 
Problem-based Learning & Resource-based Learning two complementary approac...
Problem-based Learning & Resource-based Learning  two complementary approac...Problem-based Learning & Resource-based Learning  two complementary approac...
Problem-based Learning & Resource-based Learning two complementary approac...
 
Latest Developments in Nanotechnology: Singularity University Presentation
Latest Developments in Nanotechnology: Singularity University PresentationLatest Developments in Nanotechnology: Singularity University Presentation
Latest Developments in Nanotechnology: Singularity University Presentation
 
Technology Developments for high impact future technology
Technology Developments for high impact future technologyTechnology Developments for high impact future technology
Technology Developments for high impact future technology
 
Intro lecture and workshop project
Intro lecture and workshop projectIntro lecture and workshop project
Intro lecture and workshop project
 

Similar to Higgins

Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
John Lewis
 
AWS Webinar Series - Build web-based and native mobile applications on AWS
AWS Webinar Series - Build web-based and native mobile applications on AWS AWS Webinar Series - Build web-based and native mobile applications on AWS
AWS Webinar Series - Build web-based and native mobile applications on AWS
Amazon Web Services
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
WAFAA AL SALMAN
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
AllSeen Alliance
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
ForgeRock
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
ForgeRock
 
Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication
FIDO Alliance
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ping Identity
 
2016-Mar-03 Leppitsch in Auckland meetup
2016-Mar-03 Leppitsch in Auckland meetup2016-Mar-03 Leppitsch in Auckland meetup
2016-Mar-03 Leppitsch in Auckland meetup
Michael Leppitsch
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Amazon Web Services
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
Ki-Eun Shin
 
SPS Belgium 2015 - High-trust Apps for On-Premises Development
SPS Belgium 2015 -  High-trust Apps for On-Premises DevelopmentSPS Belgium 2015 -  High-trust Apps for On-Premises Development
SPS Belgium 2015 - High-trust Apps for On-Premises Development
Edin Kapic
 
Spsbe15 high-trust apps for on-premises development
Spsbe15   high-trust apps for on-premises developmentSpsbe15   high-trust apps for on-premises development
Spsbe15 high-trust apps for on-premises development
BIWUG
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
guest2a5a03
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
ForgeRock
 
Let’s Talk About the Ipro Platform
Let’s Talk About the Ipro PlatformLet’s Talk About the Ipro Platform
Let’s Talk About the Ipro Platform
Ipro Tech
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
Sreeni Pamidala
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 
20190523 archiver fim
20190523 archiver fim20190523 archiver fim
20190523 archiver fim
Archiver
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
ForgeRock
 

Similar to Higgins (20)

Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
AWS Webinar Series - Build web-based and native mobile applications on AWS
AWS Webinar Series - Build web-based and native mobile applications on AWS AWS Webinar Series - Build web-based and native mobile applications on AWS
AWS Webinar Series - Build web-based and native mobile applications on AWS
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 
Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
2016-Mar-03 Leppitsch in Auckland meetup
2016-Mar-03 Leppitsch in Auckland meetup2016-Mar-03 Leppitsch in Auckland meetup
2016-Mar-03 Leppitsch in Auckland meetup
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
 
SPS Belgium 2015 - High-trust Apps for On-Premises Development
SPS Belgium 2015 -  High-trust Apps for On-Premises DevelopmentSPS Belgium 2015 -  High-trust Apps for On-Premises Development
SPS Belgium 2015 - High-trust Apps for On-Premises Development
 
Spsbe15 high-trust apps for on-premises development
Spsbe15   high-trust apps for on-premises developmentSpsbe15   high-trust apps for on-premises development
Spsbe15 high-trust apps for on-premises development
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
Let’s Talk About the Ipro Platform
Let’s Talk About the Ipro PlatformLet’s Talk About the Ipro Platform
Let’s Talk About the Ipro Platform
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
20190523 archiver fim
20190523 archiver fim20190523 archiver fim
20190523 archiver fim
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Higgins

  • 1. Higgins 1: A species of Tasmanian long-tailed mouse 2: An open source identity framework being developed at the Eclipse Foundation
  • 2.
  • 3. Section One: Higgins 1.0 Released February 2008 Commercial products based on Higgins 1.0 have been announced by Novell, Serena, Computer Associates and IBM Copyright © 2008 Parity. Made available under EPL 1.0
  • 4. Higgins is an Identity Framework Enables users and applications to integrate identity, profile, and social relationship information across multiple data sources and protocols. Copyright © 2008 Parity. Made available under EPL 1.0
  • 5. End-users experience Higgins through the UI metaphor of Information Cards using an app called an Identity Selector Information Cards and selectors are just tip of the iceberg of what can be done with Higgins, but it’s a place to start… Copyright © 2008 Parity. Made available under EPL 1.0
  • 6. Today you go from site to site filling in forms and passwords Copyright © 2008 Parity. Made available under EPL 1.0 Type, type, type. Click, click. Here a password, there a password. Everywhere a password. Here a form, there a form, ... Websites…
  • 7. Information Cards Put You in Control Copyright © 2008 Parity. Made available under EPL 1.0 Each card is a slice of the digital you (or a friend of yours) held in some data silo. Any kind of information: your preferences, favorite songs, employee id numbers, drivers licenses, affiliations, your health plan id, ...you get the idea, can be accessed using a card. This wallet-like thing is an app called an Identity Selector
  • 8. Higgins Identity Selectors Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
  • 9.
  • 10. Identity Selector “Wallet” Click on a card to send it to a site Click Copyright © 2008 Parity. Made available under EPL 1.0 Higgins is interoperable with Microsoft CardSpace™ shown here
  • 11.
  • 12. Identity Selector Supported Card Types Copyright © 2008 Parity. Made available under EPL 1.0 Managed What some other entity says about you Personal What you say about you
  • 13.
  • 14. Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App Identity Provider Relying Party Website or App Cards are generated and downloaded from here. A local Token Service issues tokens as requested by Selector. Cards are stored and selected here Tokens containing claim data is requested and received here
  • 15. Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App Identity Provider Relying Party Some Higgins Identity Selectors rely on a hosted I-Card Service component
  • 16. Identity Selector Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins Identity Selectors. Client apps for Windows, OSX and Linux I-Card Web Service User
  • 17. Identity Selector Selector Selector – Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins includes a Higgins Selector Selector component (Windows-only) Provides an abstraction layer that decouples browser extensions from selectors. I-Card Web Service User
  • 18. Architecture Identity Providers Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Selectors Identity Attribute Service Identity Services
  • 19. Identity Providers Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins Token/IdP Service is used by the Identity Provider website User
  • 20.
  • 21. Architecture Relying Party Website Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Selectors Identity Attribute Service Identity Services
  • 22. Relying Party Website Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet RP Libraries Selector Selector Higgins RP Website provides code to validate tokens from Identity Selectors Key: Generic Technology Higgins Components User
  • 23.
  • 24. Architecture Identity Services Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
  • 25. Architecture Extensible Identity Services Copyright © 2008 Parity. Made available under EPL 1.0 CardSpace Protocol Provider-Plugins Implement RP protocols OpenID Managed I-Card Provider-Plugins Implement card types Personal SAML X509 Relationship Kerberos Token Provider-Plugins Implement security tokens UN/PW Idemix Plug-ins Identity Services Login (un/pw) Key: Beyond Higgins 1.0 Higgins 1.0
  • 26. Architecture Identity Attribute Service Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
  • 27. Architecture Extensible Identity Attribute Service Copyright © 2008 Parity. Made available under EPL 1.0 Identity Attribute Service (IdAS) LDAP XML File IdAS Context Providers-Plugins Connect to existing data sources RDF Google Contacts Others… Plug-ins Key: Beyond Higgins 1.0 Higgins 1.0
  • 28.
  • 29.
  • 30.
  • 31. Architecture Interoperability Points Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
  • 32. Interoperability Event Participants RSA 2008 Copyright © 2008 Parity. Made available under EPL 1.0
  • 33. Interoperability Event Participants RSA 2008 Copyright © 2008 Parity. Made available under EPL 1.0
  • 34. Section Two: Higgins 1.1 June 2009 Copyright © 2008 Parity. Made available under EPL 1.0
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Relationship Cards Relationship Card What you and Best Buy say about you Copyright © 2008 Parity. Made available under EPL 1.0
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Selector as an OpenID Service OpenID Provider Identity Provider Relying Website I-Card Web Service Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector OpenID 2.0 OP with associated Higgins Selector Service User
  • 45.
  • 46. IdAS Client Component (maybe) Higgins Identity Selector Local App Higgins I-Card Service Banking Site eCommerce or Community Site SAML Enterprise Directory Social Network Site Social Networks RDF Semantic Web Repository Social Network Site STS IdP RP STS IdP RP SAML2 IdP I dAS Client LDAP Server Linked Data Server OpenSocial OpenID Provider I dAS Client IdAS Client Other Local Apps & Bots IdAS Client Internet Extension Browser Key: K ey: O ther… R DF O pen Social L DAP Enterprise Directories Enterprise Directories Enterprise Directories Social Networks Linked Data Linked Data Linked Data Higgins 1.0 H iggins X.X 3 rd Party I dAS RDF Data Source LDAP Directory Browser Computer or mobile device LDAP Identity Providers Web apps CP XDI Service XDI4J Selector Selector RDF CP Personal Data Services Web 2.0 and Enterprise Apps Higgins Extension Data Contexts Identity Attribute Service
  • 47. Section Three: Beyond Higgins 1.1 Mobile Higgins Higgins project is seeking project funding and/or contributions to develop a Higgins selector for mobile platforms Copyright © 2008 Parity. Made available under EPL 1.0
  • 48.
  • 49. Project Co-leads http://higgins-project.org Paul Trevithick Mary Ruddy [email_address] [email_address] +1.617.513.7924 +1.617.290.8591 Copyright © 2008 Parity. Made available under EPL 1.0
  • 50. Appendix Original Project Goals Copyright © 2008 Parity. Made available under EPL 1.0
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.