SlideShare a Scribd company logo
Author: Guy Huntington, President, Huntington Ventures Ltd.
Date: October 2017
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 2
Table of Contents
Executive Summary ..................................................................................................................................................3	
Introduction................................................................................................................................................................4	
The Foundational Piece – Identity Verification ..........................................................................................................5	
Identity Authentication ...............................................................................................................................................9	
Authorization Consent .............................................................................................................................................11	
Security ...................................................................................................................................................................14	
Operational Availability............................................................................................................................................22	
Summary .................................................................................................................................................................24	
About the Author .....................................................................................................................................................25
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 3
Executive Summary
An economic revolution is quietly occurring. It is built upon creating new, rapid interdependencies
between enterprises, devices, and people. This allows us to analyze, optimize, prophesize, customize,
digitize, and automate services. What most people and enterprises don’t understand are the requirements
to be successful in this new world. That is what this paper addresses.
It is built upon trust. This paper identifies the foundational pieces required to create trust for an
interdependent world:
• Identity verification
• Identity authentication
• Authorization consent
• Security
• Operational availability
Requirements for each piece are stated from the following perspectives:
• Users
• Third party (e.g. banks, telco’s, insurance companies, small businesses, et al.)
• Government (municipal, regional, state, and national)
• Identity verification and authentication service
The underlying infrastructure required for this interdependent world is complex. The paper illustrates
this by examining the three main protocols required: OpenID Connect, OAuth, and User Managed
Access.
It also discusses a potential downside of creating an interdependent world – creating a single point of
enterprise and/or economic failure. A disturbing trend is the increasing size of botnet distributed denial
of service attacks. The paper uses Estonia’s 2007 attack to illustrate this problem on a national scale.
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 4
Introduction
In a recent column, the noted NY Times Columnist Thomas Friedman stated1
:
“We’re going through a change in the “climate” of globalization — going from an
interconnected world to an interdependent one, from a world of walls where you build your
wealth by hoarding the most resources to a world of webs where you build your wealth by
having the most connections to the flow of ideas, networks, innovators, and entrepreneurs. In this
interdependent world, connectivity leads to prosperity and isolation leads to poverty. We got rich
by being “America Connected” not “America First.”
Finally, we are going through a change in the “climate” of technology and work. We’re moving
into a world where computers and algorithms can analyze (reveal previously hidden patterns);
optimize (tell a plane which altitude to fly each mile to get the best fuel efficiency); prophesize
(tell you when your elevator will break or what your customer is likely to buy); customize (tailor
any product or service for you alone); and digitize and automatize more and more products and
services. Any company that doesn’t deploy all six elements will struggle, and this is changing
every job and industry.”
This begs the question: “What is required to enable myself or my enterprise to prosper in this
revolution?” The answer lies in the word “trust”.
In an interdependent economy, trust for each party to a transaction is dependent upon:
• Identity verification
• Identity authentication
• Authorization consent
• Security
• Operational availability
1
https://www.nytimes.com/2017/09/27/opinion/globalization-trump-american-
progress.html?rref=collection%2Fcolumn%2Fthomas-l-
friedman&action=click&contentCollection=opinion&region=stream&module=stream_unit&version=latest&contentPlaceme
nt=1&pgtype=collection
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 5
The Foundational Piece – Identity Verification
Who are you? How do I know you are who you attest to be? The answers to these questions depends on
risk.
For many transactions, the risk is low, requiring little or no identity verification. As risk rises, the
foundational documents that attest to the identity need to be viewed and/or verified.
The old way of identity verification for high risk was the birth registry. It is no longer a valid test due to
the low cost of forgery of birth certificates. Mitigating this risk requires the ability to attach a physical
attribute of the person to the birth registry.
A verification service will need to be accessed at various times in an identity’s life to verify they are
who they claim to be (e.g. name and gender changes, marriage, and death). It will become foundational,
and other more widely used credentials (such as driver’s licenses, passports, identity cards, and voting
registries) can then be built upon it.
As this paper describes “Identity Federation: Biometrics and Governments”
(https://www.slideshare.net/ghuntington/identity-federation-biometrics-and-governments-sept-2017-
80192336), accomplishing this requires governments to create new laws and regulations protecting the
biometrics used to identify a person (fingerprints, iris, and DNA). It also requires the national identity
verification service to be run separately from other traditional government ministries responsible for
things like drivers’ licenses and passports.
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 6
Requirements
Users
Users are rightfully concerned about their privacy in an “interdependent world”. They should be
demanding that governments create and/or modify laws and regulations adhering to the principles laid
out in the “Biometrics and Governments” paper.
Third Parties
In an “interdependent world,” third parties will be entering into legal agreements with many other
enterprises and/or governments where there is potential risk and liabilities. As the risk rises, third parties
need to have a secure, legal way of verifying the identity of the person they are conducting business
with.
One of the effects of an interdependent world is fast speed of service. For example, the “Biometrics and
Government” paper illustrates this by stating that in some countries creating a bank account can be
created online in less than 18 minutes. This requires identity trust. Thus, third parties need a low cost,
secure, trusted way of doing this.
Third party requirements:
• Lobby governments to:
o Create laws and regulations offering an identity verification service that is secure and
always available
o Create digital signatures for citizens to use after verifying their identity
o Create standard levels of identity assurance which can be referred to in any federation
legal agreement
• OpenID Connect should be used to federate with:
o The national identity verification and authentication service (see the Security and
Operations section of this paper for more details), or
o Third parties who are the authoritative source for an identity
• For the Identity Provider, federation contracts should include:
o Identity assurance levels, notification processes to Relying Parties when the identity
changes, identity termination processes, archival policies, privacy breach processes, etc.
• For a party consuming the identity (Relying Party), federation contracts should include:
o The identity assurance levels required, agreement to the notification, privacy breach
processes
o The assignment of legal liability to the Identity Provider when the identity isn’t whom
they claim to be and damages occur to the Relying Party
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 7
Governments
All levels of governments need to know who they are dealing with based on risk with varying levels of
trust. The identity may or may not be required to comply with laws. Many may be willing to provide
their consent to join an optional government-offered key contact service. The citizen would update their
address and phone numbers with the updated information is instantly sent out to different levels of
governments and third parties.
Therefore, all levels of governments need to:
• Agree on the creation of an identity verification service which is authoritative for the identity
• Create and/or amend laws and regulations protecting the identity’s privacy and their biometrics
• Agree to consume identities from the identity verification service
• Agree on identity assurance standards
• Create memorandums of understanding which agree on terms and conditions regarding how the
identities will be used
• In addition, OpenID Connect should be used to federate with the identity verification and
authentication service (see the Security and Operations section of this paper for more details)
Government Agencies
Government departments and ministries responsible for things like driver’s licenses, passports, national
ID cards, and voting registries should:
• Consume the identity verification from the national identity verification service
• NOT be authoritative for the identity. This is the responsibility of the national identity
verification service
• Get citizen consent to obtain biometrics used in driver’s licenses, passports, etc.
• Be notified by the national identity verification service when an identity undergoes changes to
their name, address, or gender as well as when they die
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 8
Identity Verification and Authentication Service
Should meet the following requirements:
• Protect the biometrics used to verify the identity by adhering to laws and regulations.
• Should NEVER:
o Export any biometrics out of their service to any other government agency or third party
o Use the biometrics for any other purpose other than identity verification
• Should be responsible for:
o Securely collecting citizen biometrics when a citizen is born
o Attaching biometrics to the citizen’s birth record as well as to their national e-identity
o Creating standards and operating procedures for any device used to obtain a biometric
and for sending it to the national identity verification service
• Should offer an optional service for citizens where they can update their address and phone
number and then have the updated information automatically sent out to government agencies
and third parties which the citizen specifies
• Should run the identity verification service on a separate secure network that is accessible via the
Internet to different levels of governments and third parties
• Be legally liable for high levels of identity assurance
• After identity verification, issue digital certificates to citizens
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 9
Identity Authentication
One of the consequences of an interdependent economy is that many of the transactions will occur
electronically. Authentication is either one or a combination of:
• Something you know
• Something you have
• Something you are
The type of authentication used should be based on risk. Low risk is something like a user name and
password. Higher risk is something you carry physically or electronically with you, e.g. a PIN sent to
your phone. Highest risk is usually a combination of all three, i.e. including one or more biometrics.
In today’s world, the increasing use of biometrics to authenticate is now occurring. Biometrics
authentication is now becoming a standard part of cell phone operating systems. What is missing are the
laws and regulations protecting the user’s biometrics.
The “Biometrics and Government” paper referred to in the previous section lays out the principles for
biometrics used for authentication. New laws and regulations are needed which require a citizen’s
consent to use their biometrics. Additionally, these laws and regulations would protect how the
biometrics will be used and stored as well as providing processes for an identity to request that the
biometrics no longer be used.
In an interdependent world, the way an identity is verified and authenticated is by using a protocol called
OpenID Connect. About one billion people use OpenID Connect daily without realizing it when they log
on to Google, Facebook, or PayPal. This occurs when a user clicks on links to other parties, gaining
access to services without having to re-authenticate or be authorized for them.
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 10
Requirements
Users
Users should demand that laws and regulations be created to:
• Require their consent for biometrics to be used for authentication
• Safely protect their biometrics
• Require their consent if the biometric is to be used for another purpose
• Ensure their biometrics can’t be transferred between enterprises
• Offer processes for the citizen to revoke use of their biometrics
Third Parties
Third parties will want to authenticate the identity based on risk. They should:
• Either use a national identity authentication service to authenticate the identity, or
• Comply with government laws and regulations allowing them to collect and use biometrics as a
form of authentication
• Be aware of:
o Equal error rates (ERR) for different types of authentication (the rate where a false
positive equals a false negative).
§ I.e., all biometrics are not equal or as reliable
o How device readers can be fooled, thereby allowing a person to masquerade as another
• If available, OpenID Connect should be used to federate with:
o The national identity verification and authentication service (see the Security and
Operations section of this paper for more details), or
o A trusted third party, which will be used as the identity and authentication provider
• Mitigate their potential risks and liabilities for false identities by assigning risk in federation
agreements to the identity and authentication provider
Governments
Different levels of government should:
• Standardize their authentication across all levels of government by using a central government
identity verification and authentication service
• Assign liability for authentication to the national identity and verification service in the
memorandums of understanding between the various levels of governments
• Use OpenID Connect to federate with the national identity verification and authentication service
(see the Security and Operations section of this paper for more details)
National Identity Verification and Authentication Service
Should meet the following requirements:
• Offer an optional national citizen identity authentication service
• Protect the forms of authentication by complying with laws and regulations associated with the
principles described in the “Biometrics and Government” paper
• Ensure the service is secure and highly available (see the Security and Operations section of this
paper for more details)
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 11
Authorization Consent
A few years ago, the authoritative source for an identity was also the provider of identity attributes. An
example could be a user logging on to an enterprise, Acme Inc. When the user clicks on a link to another
third party’s service, Acme Inc. sends both the identity and authorization attributes to the other party.
The other party trusts the identity as well as accepting authorization attributes. They use these to provide
customized services to the identity.
However, in today’s interdependent world, an enterprise might be authoritative for an identity while
other enterprises are authoritative for authorization.
With the rise of the Internet of Things, a user may own hundreds of devices. Each device will have
owner consent requirements pertaining to who can use the device and/or the data it produces. If a user
has to sign on to each device to provide their consent, it will become unmanageable.
There is a technological solution for this – a protocol called “User Managed Access.” It allows a user to
centrally manage all their consents from one console, regardless of where each device consent
management resides.
What’s missing is a regulatory framework providing citizens with protection on how their consent is
obtained, used, stored, and transferred. Please refer to “Consent and the Internet of Things”
(https://www.slideshare.net/ghuntington/identity-federation-citizen-consent-and-the-internet-of-things-
october-2017), which lays out principles to construct new laws and regulations.
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 12
Requirements
Users
In an interdependent world, users want to:
• Ensure:
o Their authorization consents are obtained
o That no one can masquerade as them to provide false authorization consents
• Have the option of centrally managing all their consents from one place
• Have processes where they can securely transfer from one centrally managed authorization
service provider to another
• Be able to see their history of consents
Third Parties
Third parties offering end user services, producing smart devices requiring consent and/or consuming
data from these devices should:
• Lobby governments to provide a regulatory framework for authorized consent using the
principles laid out in the paper “Consent and the Internet of Things”
• Create legal agreements with both end users as well as enterprises offering the centrally managed
user authorization consent service, which:
o Assigns potential risks and legal liability to the appropriate party
o Defines terms of service including:
§ Time frames from when a consent is given/changed and then implemented
§ Identity and credential assurance levels required to make or change a consent,
§ Archival policies of the consent, and
§ Chain of custody of the consents as required by laws, regulations, and legal
agreements based on risk
o Consider joining or creating common trust frameworks
Third Parties and/or Governments Offering Central User Authorization Consent Services
Third parties and/or governments offering users a central user authorization consent service should:
• Adhere to any laws or regulations pertaining to authorization consent
• Have legal agreements with the end user:
o Specifying potential risks and legal liability to the appropriate party
o Notification processes if and when the user wants to leave the service
o Specify how long the records will be archived
o Consider joining or creating common trust frameworks
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 13
Governments
• Create a regulatory framework for authorized consent using the principles laid out in the paper
“Consent and the Internet of Things”
• Ensure that citizen consent for government services is able to be integrated with User Managed
Access and OpenID Connect
National Identity Verification and Authentication Service
• Offers a national citizen identity authentication service, where required, for consent
• Offers optional citizen authentication services, where required, for consent
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 14
Security
Protocols:
There are three types of protocols used regarding identity to create an interdependent world:
• OpenID Connect
• OAuth 2.0
• User Managed Access (UMA)
2
2
http://kantarainitiative.org/confluence/download/attachments/17760302/Venn+infographics.pdf
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 15
There is a large challenge in securing the underlying business and identity processes in an
interdependent world transaction – they are fragmented. Why? Because the network traffic flows
between multiple enterprises.
When I have led large identity teams in the past, to explain this to the team, I tell there we are going “to
follow the electrons for a single transaction”. It usually results in diagrams showing between 40-100
steps per transaction as it flows between the user, Identity Provider, the Relying Party, Certificate
Authorities and then through the Relying Party’s infrastructure to the service the user wants to access.
To illustrate this, let’s take a high-level look at the traffic flow for UMA:
3
Each arrow, i.e. step, is governed by the protocol. Why should you care?
There are different ways the protocols can be configured. To illustrate this, let’s look at protocols used
to configure OpenID Connect:
3
https://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0ahUKEwj4y4uS6efWAhVHwlQKHYLODP
wQFgguMAE&url=http%3A%2F%2Fkantarainitiative.org%2Fconfluence%2Fdownload%2Fattachments%2F17760302%2F
UMA%2520webinar%25202015-05-16.pdf%3Fapi%3Dv2&usg=AOvVaw1oJfaOHNVkdakPPgYjrI-D
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 16
4
Each of the boxes above contains different ways it can be configured. Thus, dependent upon the
configuration, each of the arrows depicting a communication between the parties may or may not be
secure. Therefore, an identity transaction might be in jeopardy of being successfully attacked.
Does it matter? The answer depends on risk. Enterprises participating in low risk federation won’t likely
care. HOWEVER, many transactions are medium to high risk. Potential liabilities arise to the
participating parties if the transaction isn’t secure.
This leads to the next question – “How can we mitigate our risk?” There are three ways risk can be
mitigated:
• Business processes
• Technology
• Legal agreements
This paper “Enterprise Federation: Mitigating Risks and Liabilities”
(https://www.slideshare.net/ghuntington/identity-federation-mitigating-risks-and-liabilities-79942481)
lays out the many considerations that are required to mitigate risk and liabilities.
4
http://openid.net/connect/
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 17
Requirements
User
Users, often wrongly, assume that their communications and transfer of identity information, are secure.
They require:
• Laws and regulations protecting their identity and consent as they interact with services and
devices
• Notification processes when security fails and their identity and/or consent information is
breached
The type of device they are using to access a service, its underlying operating systems, and what is been
deployed on the device, all affect a user’s identity and authorization security. Their requirements are
based on risk.
If the risk is low, then the security requirements from a federated service on the user’s device and
associated software might be minimal. Thus, the user is free to do as they choose and may or may not
pay a price if they have malware on their device.
HOWEVER, for high risk transactions, the user might be required by laws, regulations and/or legal
agreements to access the service from a device that has certain specifications to reduce the risk of
malware attacks.
Third Parties
Security requirements vary depending on the role the third party is playing AND the risk involved.
When acting as an Identity and/or Authorization Provider
• Mitigate risk by specifying in federation agreements the time it takes for an identity and/or
authorization to be created, modified, or terminated and when/how the Relying Parties will be
notified
• Use stronger identity verification and/or authentication assurance to verify/authenticate an
identity depending on risk and then state this in legal agreements
• Usually the communication between the federated enterprises in legal agreements specifies:
o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved
o Use of digital certificates (included Certificate Authorities) used to:
§ Digitally sign a JSON token
§ Encrypt the identity information within the JSON Token
o Notification processes when a digital certificate is about to expire
o Testing processes used to update the digital certificate
o Attack vectors, how they will be mitigated technically, and assignment of potential
liability to the federation partners
o The number of environments the Identity Providers offer
o If external penetrations test will be done by parties to the federation to ensure the
configurations have been properly implemented
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 18
o Session management settings with assignment of potential liability to federation partners
based on the settings
o Notification processes for security and/or privacy breaches
When acting as a Relying Party
• Mitigate risk by specifying in federation agreements the agreed to times it will take for identity
and authorization information provided by the authoritative parties to then be implemented into
their systems/services
• Assign liability to the Identity and/or Authorization Provider if they accept an identity that is no
longer valid or, a person is able to successfully masquerade as another
• Usually the communication between the federated enterprises in legal agreements specifies:
o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved
o Use of digital certificates (included Certificate Authorities) used to:
§ Digitally sign a JSON token
§ Encrypt the identity information within the JSON Token
o Notification processes when a digital certificate is about to expire
o Testing processes used to update the digital certificate
o Attack vectors, how they will be mitigated technically, and assignment of potential
liability to the federation partners
o If external penetration tests will be done by parties to the federation to ensure the
configurations have been properly implemented and the frequency of ongoing tests.
o Notification processes for security and/or privacy breaches
When acting as a Central Authorization Consent Service
• Mitigate risk by specifying in federation agreements the agreed to times it will take for a consent
to be received by the consent service and how fast it will be communicated to the other parties
• Assign liability to the consent service if a consent change is made by the user and the consent
service didn’t properly notify the associated parties
• Usually the communication between the federated enterprises in legal agreements specifies:
o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved
o Use of digital certificates (included Certificate Authorities) used to:
§ Digitally sign a JSON token
§ Encrypt the authorization information within the JSON Token
o Notification processes when a digital certificate is about to expire
o Testing processes used to update the digital certificate
o Attack vectors, how they will be mitigated technically, and assignment of potential
liability to the federation partners
o If external penetration tests will be done by parties to the federation to ensure the
configurations have been properly implemented and the frequency of ongoing tests.
o Notification processes for security and/or privacy breaches
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 19
Governments
• Should use OpenID Connect, OAuth, and User Managed Access protocols configured to mitigate
potential attack vectors
• Ensure:
o Citizen consent for government services is able to be integrated with User Managed
Access and OpenID Connect
o Any change to the core citizen identity is immediately sent out from the national identity
verification service to departments and ministries, required by law, to mitigate the risk of
people masquerading as others
• Specify in memorandums of understanding between different government agencies:
o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved
o Use of digital certificates (included Certificate Authorities) used to:
§ Digitally sign a JSON token
§ Encrypt the authorization information within the JSON Token
o Notification processes when a digital certificate is about to expire
o Testing processes used to update the digital certificate
o Attack vectors, how they will be mitigated technically and assignment of potential
liability to the federation partners
o If external penetration tests will be done by parties to the federation to ensure the
configurations have been properly implemented and the frequency of ongoing tests
o Notification processes for security and/or privacy breaches
• If governments are participating in federation with third parties, then they sign legal agreements,
which are separate from memorandums of understanding specifying:
o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved
o Use of digital certificates (included Certificate Authorities) used to:
§ Digitally sign a JSON token
§ Encrypt the authorization information within the JSON Token
o Notification processes when a digital certificate is about to expire
o Testing processes used to update the digital certificate
o Attack vectors, how they will be mitigated technically, and the assignment of potential
liability to the federation partners
o If external penetration tests will be done by parties to the federation to ensure the
configurations have been properly implemented and the frequency of ongoing tests.
o Notification processes for security and/or privacy breaches
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 20
National Identity Verification and Authentication Service
• Offer a national citizen identity verification service, where required, for consent
• Offer optional citizen authentication services, where required, for consent
• Create a regulatory framework for authorized consent using the principles laid out in the paper
“Consent and the Internet of Things” and “Biometrics and Governments”
• Specify in memorandums of understanding between different government agencies and
federation legal agreements with third parties:
o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved
o Use of digital certificates (included Certificate Authorities) used to:
§ Digitally sign a JSON token
§ Encrypt the authorization information within the JSON Token
o Notification processes when a digital certificate is about to expire
o Testing processes used to update the digital certificate
o Attack vectors, how they will be mitigated technically, and assignment of potential
liability to the federation partners
o If external penetration tests will be done by parties to the federation to ensure the
configurations have been properly implemented and the frequency of ongoing tests.
o Notification processes for security and/or privacy breaches
• Operate the identity verification and authentication service on a separate network
• Continually schedule regular penetration tests on the service
• Ensure that administrators are strictly monitored with high levels of identity and credential
assurance to make any changes to the underlying architecture
• Any change to the underlying biometrics MUST be to legal laws and regulations with public
reporting of the actions
• All biometric data stored within the identity verification service MUST NEVER leave the
identity verification databases/directories
• Any upgrade to the underlying architecture must be very carefully monitored to ensure that no
malware code is inserted in the upgrade rendering the service susceptible to a malware threat
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 21
Creating a Potential Single Point of Enterprise and Economic Failure
The beginning of this paper used a quote from Thomas Friedman outlining the benefits of an
interdependent world. What wasn’t said is this creates potential points of enterprise and economic
failure. How? Let’s use Estonia as an example.
Estonia offers more than 1,000 online services to their citizens including e-health, e-pharmacy, e-
education, e-voting, e-banking, e-residency, etc. Estonians use government issued digital signatures,
based on trust that the identity is who they claim to be, for their legal transactions. The country therefore
relies upon the infrastructure supporting this.
In 2007, Estonia came under a distributed denial of service attack which effectively shut them down.
They had created a potential point of failure
(https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia). The interdependency relies on trust
between various parties with the government at the heart of it. This begs the obvious question – What
has changed between 2007 and today?
Countries like Estonia have built infrastructure that is more resilient to these types of attacks. NATO has
their “Cyber Defense Center of Excellence” located in Estonia. So, some enterprises are taking steps to
mitigate their risk. What has happened on the attack front?
The attacks have increased. In 2016, distributed denial of service attacks greater than 600 gigabits per
second were documented (https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/).
Most of the non-military and non-large Fortune 500 infrastructure around the world aren’t prepared for
this. It will effectively shut them down.
How are these attacks made? They are usually done by taking control of Internet of Things devices with
poor security and commandeering them into what’s called a “botnet.” With the rise of the Internet of
Things, these types of attacks will likely increase in size.
How hard is it to do this? It’s not hard. In fact young people are learning from others how to do it
https://krebsonsecurity.com/2016/09/israeli-online-attack-service-vdos-earned-600000-in-two-years/ and
https://nakedsecurity.sophos.com/2016/11/03/teen-pleads-guilty-to-creating-ddos-tool-used-in-1-7-
million-attacks/. This article alludes to what “state actors” could do to enterprises and/or governments
from these types of attacks: https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-
mirai-botnet.
There’s yet another risk to consider which could target the identity verification and authentication of a
country – electromagnetic attacks. This type of attack could paralyze the infrastructure. It’s paramount
the underlying identity verification data be able to withstand this attack.
Federation introduces new types of risks that have to be mitigated to be successful in this new type of
economy. All enterprises MUST be aware of the growing risks and potential liabilities from these
types of attacks and mitigate against the risk.
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 22
Operational Availability
In an interdependent world, if any of the Identity Provider, Relying Party, Authorization Provider, or
consent Service Provider systems, are not available then the interdependency can fail. One of the
consequences of this is ensuring that the systems are they are highly available, i.e. 24x7x365.
Historically, this has proven to be costly to implement. Many executives delay the expenditure to focus
their resources instead in other areas where the payback is more readily achieved. Today there are tools
like the cloud, which can be brought to bear to address this. However, “the cloud” is not a panacea for
all operations problems AND there are restrictions on how and when it can be used.
Requirements
Users
Users somewhat naively assume that when they want to do something, the systems will be there for
them to do it. They are increasingly becoming accustomed to services being available 24x7x365. To
access some of the services, based on risk, they might or might not be required to have:
• A certain type of web browser and/or versions
• Certain types of operating systems with appropriate version upgrades
• Certain types of antimalware on the device
• A service that detects malware on their devices
Third Parties
What most third parties don’t realize is that with an increasing interdependency on other parties, be they
government, third parties and/or smart devices, there is a follow-on effect in an increased integration
with their formerly internal infrastructure and security operations support.
Therefore, depending on the degree of risk involved in the federation, third parties may need to state in
the federation legal agreements the following:
• Service level availability
• Peak load
• Integrated incident management ticketing systems
• Integrated incident management responses
• Integrated help desk responses
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 23
• Synthetic transactions once per minute or whatever time frame is agreed upon
• Privacy breach processes
• Disaster recovery processes
• Environments made available to test in
• Emergency code change processes
• Digital certificate renewal processes
• Test users agreed to by the Identity and/or Authorization Provider
• Data standards used for any identity and/or authorization data communicated via the protocols
The legal agreement needs to not only specify the technical processes but also the business notification
processes associated with the above.
The high availability requirements mean that enterprises must now be monitoring most points in a
federated transaction, as determined by mapping the flow of electrons referenced earlier on, on a
frequent basis. The enterprise needs to mitigate risk that a system will go down by seeing early on
component failure. It then needs to alert the central support team to instantly address and remedy the
problem.
As well, depending on degree of risk, automated testing needs to frequently occur to test out attack
vectors. This mitigates risk of potential liabilities from attackers gaining access to a transaction and/or
back end system.
If the operations are cloud based, then consideration needs to be given to where the cloud based servers
are located. Why? Many jurisdictions now require the identity data to stay within their borders.
Therefore, regulations like the upcoming 2018 EU General Data Protection Regulation (GDPR) affect
where cloud based operations might store and/or transfer data.
As referenced above in the security section, operations can now be disrupted via denial of service and
distributed denial of service attacks. Therefore, enterprises need to enter into any federation agreement
with their eyes wide open to the risks associated with this.
Governments
Governments face similar requirements as third parties. Therefore, all the requirements for third parties
also apply to governments.
National Identity Verification and Authentication Service
The national identity verification and authentication service is a potential single point of economic
failure for a country’s economy reliant upon identity verification and authentication services. All the
requirements stated for third parties also applies to this service.
HOWEVER, it needs to be even more resilient. The architecture used to provide these services must
be designed to be resilient to large scale distributed denial of service attacks and potential
electromagnetic attacks. Close attention should be paid to ongoing global attack developments and then
a well thought out mitigation risk response needs to be implemented.
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 24
Summary
Technology is now being widely deployed which dramatically changes the way we live, i.e. creating an
“interdependent world.” All of this is built upon trust.
Trust needs to be attested for the identity without being able to see the person who is digitally interacting
with multiple enterprises. Existing laws and regulations are not keeping up with the technological
changes in identity verification, authentication, and authorization consent.
Creating the identity verification laws and regulations to operate in this world will likely slowly occur.
Without this, it creates higher potential liabilities for enterprises operating in a federated world when
they need higher levels of identity assurance. Therefore, enterprises need to be aware of the risk
associated with identity federation. They need to create contracts with their federation partners
mitigating risk and potential liabilities.
The Internet is both an exciting as well as a dangerous place. Federation requires enterprises to open
themselves up to other parties upon which they become dependent. The number of potential attack
vectors on the transaction is therefore larger.
Enterprises entering into federation need to do so with their legal, business, technology, operations, and
security eyes wide open. If they do so, they will prosper in the new economy.
Huntington Ventures Ltd – The Business of Identity Management
6262 Wellington Avenue, West Vancouver, BC V7W 2H4
1-780-289-2776 www.hvl.net
Page 25
About the Author
Guy Huntington is a veteran identity architect, program and project manager who’s lead as well as
rescued many large identity projects with many of them involving identity federation. His past clients
include Boeing, Capital One, Kaiser Permanente, WestJet, Government of Alberta’s Digital Citizen
Identity and Authentication Program and Alberta Blue Cross. As one of his past clients said “He is a
great find, because he is able to do high quality strategic work, but is also well-versed in project
management and technical details, so he can traverse easily from wide to deep. With Guy, you get skills
that would typically be encompassed in a small team of people.”

More Related Content

What's hot

The Digital Reserve - Whitepaper Draft
The Digital Reserve - Whitepaper DraftThe Digital Reserve - Whitepaper Draft
The Digital Reserve - Whitepaper Draft
Jomari Peterson
 
New money
New moneyNew money
Re-Inventing Finance
Re-Inventing FinanceRe-Inventing Finance
Re-Inventing Finance
Tom Carlson
 
The Future of Cryptocurrency
The Future of Cryptocurrency The Future of Cryptocurrency
The Future of Cryptocurrency
SHarriman1
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
eraser Juan José Calderón
 
All 25 Crypto-Friendly Bank Cards
All 25 Crypto-Friendly Bank CardsAll 25 Crypto-Friendly Bank Cards
All 25 Crypto-Friendly Bank Cards
Vladislav Solodkiy
 
IS BITCOIN DEAD? NOT THE PART THAT MATTERS
IS BITCOIN DEAD? NOT THE PART THAT MATTERSIS BITCOIN DEAD? NOT THE PART THAT MATTERS
IS BITCOIN DEAD? NOT THE PART THAT MATTERS
Steven Rhyner
 
E government a modern phenomenon
E government a modern phenomenon E government a modern phenomenon
E government a modern phenomenon
LiveAdmins DMCC
 
Distributed ledger technology: beyond block chain
Distributed ledger technology: beyond block chainDistributed ledger technology: beyond block chain
Distributed ledger technology: beyond block chain
bis_foresight
 
Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019
LERNER Consulting
 
The+Blockchain+For+Good+Manifesto (1)
The+Blockchain+For+Good+Manifesto (1)The+Blockchain+For+Good+Manifesto (1)
The+Blockchain+For+Good+Manifesto (1)Simon Chan 陳思浩
 
W3coins
W3coinsW3coins
W3coins
W3coins
 
Deloitte - Blockchain and the future of financial infrastructure - fintech cl...
Deloitte - Blockchain and the future of financial infrastructure - fintech cl...Deloitte - Blockchain and the future of financial infrastructure - fintech cl...
Deloitte - Blockchain and the future of financial infrastructure - fintech cl...
Ian Beckett
 
A.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyA.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new money
Vladislav Solodkiy
 
Bitcoin:What is the Future?
Bitcoin:What is the Future?Bitcoin:What is the Future?
Bitcoin:What is the Future?
Bloomberg Briefs
 
Blockchain buzz - getting to the bottom of distributed ledger technology
Blockchain buzz - getting to the bottom of distributed ledger technologyBlockchain buzz - getting to the bottom of distributed ledger technology
Blockchain buzz - getting to the bottom of distributed ledger technology
Lacuna Innovation
 
P5 to blockchain or not to blockchain
P5 to blockchain or not to blockchainP5 to blockchain or not to blockchain
P5 to blockchain or not to blockchain
devid8
 
FinTech_FinRegs_vF
FinTech_FinRegs_vFFinTech_FinRegs_vF
FinTech_FinRegs_vFTudor Jones
 
Discovering the money tree
Discovering the money treeDiscovering the money tree
Discovering the money tree
Chris Mercer
 
The future of cryptofinance: An Empirical Analysis of the Adoption of Bitcoin
The future of cryptofinance: An Empirical Analysis of the Adoption of BitcoinThe future of cryptofinance: An Empirical Analysis of the Adoption of Bitcoin
The future of cryptofinance: An Empirical Analysis of the Adoption of Bitcoin
Niki De Kegel
 

What's hot (20)

The Digital Reserve - Whitepaper Draft
The Digital Reserve - Whitepaper DraftThe Digital Reserve - Whitepaper Draft
The Digital Reserve - Whitepaper Draft
 
New money
New moneyNew money
New money
 
Re-Inventing Finance
Re-Inventing FinanceRe-Inventing Finance
Re-Inventing Finance
 
The Future of Cryptocurrency
The Future of Cryptocurrency The Future of Cryptocurrency
The Future of Cryptocurrency
 
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie KhanLIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
LIBRA: IS IT REALLY ABOUT MONEY? Valerie Khan
 
All 25 Crypto-Friendly Bank Cards
All 25 Crypto-Friendly Bank CardsAll 25 Crypto-Friendly Bank Cards
All 25 Crypto-Friendly Bank Cards
 
IS BITCOIN DEAD? NOT THE PART THAT MATTERS
IS BITCOIN DEAD? NOT THE PART THAT MATTERSIS BITCOIN DEAD? NOT THE PART THAT MATTERS
IS BITCOIN DEAD? NOT THE PART THAT MATTERS
 
E government a modern phenomenon
E government a modern phenomenon E government a modern phenomenon
E government a modern phenomenon
 
Distributed ledger technology: beyond block chain
Distributed ledger technology: beyond block chainDistributed ledger technology: beyond block chain
Distributed ledger technology: beyond block chain
 
Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019
 
The+Blockchain+For+Good+Manifesto (1)
The+Blockchain+For+Good+Manifesto (1)The+Blockchain+For+Good+Manifesto (1)
The+Blockchain+For+Good+Manifesto (1)
 
W3coins
W3coinsW3coins
W3coins
 
Deloitte - Blockchain and the future of financial infrastructure - fintech cl...
Deloitte - Blockchain and the future of financial infrastructure - fintech cl...Deloitte - Blockchain and the future of financial infrastructure - fintech cl...
Deloitte - Blockchain and the future of financial infrastructure - fintech cl...
 
A.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new moneyA.ID: [Digital] Identity is the new money
A.ID: [Digital] Identity is the new money
 
Bitcoin:What is the Future?
Bitcoin:What is the Future?Bitcoin:What is the Future?
Bitcoin:What is the Future?
 
Blockchain buzz - getting to the bottom of distributed ledger technology
Blockchain buzz - getting to the bottom of distributed ledger technologyBlockchain buzz - getting to the bottom of distributed ledger technology
Blockchain buzz - getting to the bottom of distributed ledger technology
 
P5 to blockchain or not to blockchain
P5 to blockchain or not to blockchainP5 to blockchain or not to blockchain
P5 to blockchain or not to blockchain
 
FinTech_FinRegs_vF
FinTech_FinRegs_vFFinTech_FinRegs_vF
FinTech_FinRegs_vF
 
Discovering the money tree
Discovering the money treeDiscovering the money tree
Discovering the money tree
 
The future of cryptofinance: An Empirical Analysis of the Adoption of Bitcoin
The future of cryptofinance: An Empirical Analysis of the Adoption of BitcoinThe future of cryptofinance: An Empirical Analysis of the Adoption of Bitcoin
The future of cryptofinance: An Empirical Analysis of the Adoption of Bitcoin
 

Similar to Requirements for Successful Enterprises in a Federated Economy - October 2017

Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities
Guy Huntington
 
One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017
Guy Huntington
 
Identity federation = Biometrics and Governments Sept 2017
Identity federation = Biometrics and Governments Sept 2017Identity federation = Biometrics and Governments Sept 2017
Identity federation = Biometrics and Governments Sept 2017
Guy Huntington
 
Identity Federation: Citizen Consent and the Internet of Things - October 2017
Identity Federation: Citizen Consent and the Internet of Things - October 2017Identity Federation: Citizen Consent and the Internet of Things - October 2017
Identity Federation: Citizen Consent and the Internet of Things - October 2017
Guy Huntington
 
Studi teknologi blockchain pwc
Studi teknologi blockchain pwcStudi teknologi blockchain pwc
Studi teknologi blockchain pwc
Rein Mahatma
 
Credito whitepaper
Credito whitepaperCredito whitepaper
Credito whitepaper
Narendra Allam
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchain
IT Strategy Group
 
Blockchain: A Potential Game-Changer for Life Insurance
Blockchain: A Potential Game-Changer for Life InsuranceBlockchain: A Potential Game-Changer for Life Insurance
Blockchain: A Potential Game-Changer for Life Insurance
Cognizant
 
Healthcare.gov Rocky Rollout Infographic by Galorath.com
Healthcare.gov Rocky Rollout Infographic by Galorath.comHealthcare.gov Rocky Rollout Infographic by Galorath.com
Healthcare.gov Rocky Rollout Infographic by Galorath.com
Dan Galorath
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
Elizabeth Dimit
 
The Three Waves of Financial Disruption in Fintech
The Three Waves of Financial Disruption in FintechThe Three Waves of Financial Disruption in Fintech
The Three Waves of Financial Disruption in Fintech
Reinventure Group
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
Nitin Patidar
 
Canadian History Essay Topics University
Canadian History Essay Topics UniversityCanadian History Essay Topics University
Canadian History Essay Topics University
Ashley Opokuaa
 
RA_WhitePaper_RisksRewards_Rollins_2 15 16
RA_WhitePaper_RisksRewards_Rollins_2 15 16RA_WhitePaper_RisksRewards_Rollins_2 15 16
RA_WhitePaper_RisksRewards_Rollins_2 15 16Nita Rollins, Ph.D.
 
The Digital Disruption of Financial Services
The Digital Disruption of Financial ServicesThe Digital Disruption of Financial Services
The Digital Disruption of Financial Services
Tony Moroney
 
Handbook Of International Credit Management Third Edition
Handbook Of International Credit Management   Third EditionHandbook Of International Credit Management   Third Edition
Handbook Of International Credit Management Third Edition
cannistra
 
How To Write A Personal Essay For High School - Si
How To Write A Personal Essay For High School - SiHow To Write A Personal Essay For High School - Si
How To Write A Personal Essay For High School - Si
Lakeisha Jones
 
Freeze Your Credit File
Freeze Your Credit FileFreeze Your Credit File
Freeze Your Credit File
- Mark - Fullbright
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
- Mark - Fullbright
 
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
Digital Asset Transfer Authority  Bit license comment letter (21 10-14)Digital Asset Transfer Authority  Bit license comment letter (21 10-14)
Digital Asset Transfer Authority Bit license comment letter (21 10-14)DataSecretariat
 

Similar to Requirements for Successful Enterprises in a Federated Economy - October 2017 (20)

Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities Identity federation – Mitigating Risks and Liabilities
Identity federation – Mitigating Risks and Liabilities
 
One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017One pager - "Trust in an Interdependent World" - October 2017
One pager - "Trust in an Interdependent World" - October 2017
 
Identity federation = Biometrics and Governments Sept 2017
Identity federation = Biometrics and Governments Sept 2017Identity federation = Biometrics and Governments Sept 2017
Identity federation = Biometrics and Governments Sept 2017
 
Identity Federation: Citizen Consent and the Internet of Things - October 2017
Identity Federation: Citizen Consent and the Internet of Things - October 2017Identity Federation: Citizen Consent and the Internet of Things - October 2017
Identity Federation: Citizen Consent and the Internet of Things - October 2017
 
Studi teknologi blockchain pwc
Studi teknologi blockchain pwcStudi teknologi blockchain pwc
Studi teknologi blockchain pwc
 
Credito whitepaper
Credito whitepaperCredito whitepaper
Credito whitepaper
 
David shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchainDavid shrier, weige wu, alex pentland mit blockchain
David shrier, weige wu, alex pentland mit blockchain
 
Blockchain: A Potential Game-Changer for Life Insurance
Blockchain: A Potential Game-Changer for Life InsuranceBlockchain: A Potential Game-Changer for Life Insurance
Blockchain: A Potential Game-Changer for Life Insurance
 
Healthcare.gov Rocky Rollout Infographic by Galorath.com
Healthcare.gov Rocky Rollout Infographic by Galorath.comHealthcare.gov Rocky Rollout Infographic by Galorath.com
Healthcare.gov Rocky Rollout Infographic by Galorath.com
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
The Three Waves of Financial Disruption in Fintech
The Three Waves of Financial Disruption in FintechThe Three Waves of Financial Disruption in Fintech
The Three Waves of Financial Disruption in Fintech
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
 
Canadian History Essay Topics University
Canadian History Essay Topics UniversityCanadian History Essay Topics University
Canadian History Essay Topics University
 
RA_WhitePaper_RisksRewards_Rollins_2 15 16
RA_WhitePaper_RisksRewards_Rollins_2 15 16RA_WhitePaper_RisksRewards_Rollins_2 15 16
RA_WhitePaper_RisksRewards_Rollins_2 15 16
 
The Digital Disruption of Financial Services
The Digital Disruption of Financial ServicesThe Digital Disruption of Financial Services
The Digital Disruption of Financial Services
 
Handbook Of International Credit Management Third Edition
Handbook Of International Credit Management   Third EditionHandbook Of International Credit Management   Third Edition
Handbook Of International Credit Management Third Edition
 
How To Write A Personal Essay For High School - Si
How To Write A Personal Essay For High School - SiHow To Write A Personal Essay For High School - Si
How To Write A Personal Essay For High School - Si
 
Freeze Your Credit File
Freeze Your Credit FileFreeze Your Credit File
Freeze Your Credit File
 
Online Identity Theft: Changing the Game
Online Identity Theft: Changing the GameOnline Identity Theft: Changing the Game
Online Identity Theft: Changing the Game
 
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
Digital Asset Transfer Authority  Bit license comment letter (21 10-14)Digital Asset Transfer Authority  Bit license comment letter (21 10-14)
Digital Asset Transfer Authority Bit license comment letter (21 10-14)
 

More from Guy Huntington

Identity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic GrowthIdentity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic Growth
Guy Huntington
 
National Citizen Target SOA Architecture Sept 2016
National Citizen Target SOA Architecture Sept 2016National Citizen Target SOA Architecture Sept 2016
National Citizen Target SOA Architecture Sept 2016
Guy Huntington
 
Citizen identity lifecycle july 2016
Citizen identity lifecycle july 2016Citizen identity lifecycle july 2016
Citizen identity lifecycle july 2016
Guy Huntington
 
National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud ...
National ICT & Identity Strategy Managing  Illegal Citizens & Identity Fraud ...National ICT & Identity Strategy Managing  Illegal Citizens & Identity Fraud ...
National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud ...
Guy Huntington
 
Global & National Identity Projects Failures and Successes
Global & National Identity Projects Failures and SuccessesGlobal & National Identity Projects Failures and Successes
Global & National Identity Projects Failures and Successes
Guy Huntington
 
Developing Countries National ICT Identity Governance Strategy
Developing Countries  National ICT Identity Governance StrategyDeveloping Countries  National ICT Identity Governance Strategy
Developing Countries National ICT Identity Governance Strategy
Guy Huntington
 
National ICT & Citizen Payments Strategy
National ICT & Citizen Payments StrategyNational ICT & Citizen Payments Strategy
National ICT & Citizen Payments Strategy
Guy Huntington
 
National Identity ICT Defence and Intelligence Strategy
National  Identity ICT Defence and  Intelligence StrategyNational  Identity ICT Defence and  Intelligence Strategy
National Identity ICT Defence and Intelligence Strategy
Guy Huntington
 
National ICT & Healthcare Strategy
 National ICT & Healthcare Strategy National ICT & Healthcare Strategy
National ICT & Healthcare Strategy
Guy Huntington
 
National ICT & Education Strategy July 2016
National ICT & Education Strategy July 2016National ICT & Education Strategy July 2016
National ICT & Education Strategy July 2016
Guy Huntington
 
National identity strategy presentation may 10, 2016
National identity strategy  presentation may 10, 2016National identity strategy  presentation may 10, 2016
National identity strategy presentation may 10, 2016
Guy Huntington
 
National citizen identity strategy
National citizen identity strategyNational citizen identity strategy
National citizen identity strategy
Guy Huntington
 
Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015
Guy Huntington
 

More from Guy Huntington (13)

Identity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic GrowthIdentity Federation: Governments and Economic Growth
Identity Federation: Governments and Economic Growth
 
National Citizen Target SOA Architecture Sept 2016
National Citizen Target SOA Architecture Sept 2016National Citizen Target SOA Architecture Sept 2016
National Citizen Target SOA Architecture Sept 2016
 
Citizen identity lifecycle july 2016
Citizen identity lifecycle july 2016Citizen identity lifecycle july 2016
Citizen identity lifecycle july 2016
 
National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud ...
National ICT & Identity Strategy Managing  Illegal Citizens & Identity Fraud ...National ICT & Identity Strategy Managing  Illegal Citizens & Identity Fraud ...
National ICT & Identity Strategy Managing Illegal Citizens & Identity Fraud ...
 
Global & National Identity Projects Failures and Successes
Global & National Identity Projects Failures and SuccessesGlobal & National Identity Projects Failures and Successes
Global & National Identity Projects Failures and Successes
 
Developing Countries National ICT Identity Governance Strategy
Developing Countries  National ICT Identity Governance StrategyDeveloping Countries  National ICT Identity Governance Strategy
Developing Countries National ICT Identity Governance Strategy
 
National ICT & Citizen Payments Strategy
National ICT & Citizen Payments StrategyNational ICT & Citizen Payments Strategy
National ICT & Citizen Payments Strategy
 
National Identity ICT Defence and Intelligence Strategy
National  Identity ICT Defence and  Intelligence StrategyNational  Identity ICT Defence and  Intelligence Strategy
National Identity ICT Defence and Intelligence Strategy
 
National ICT & Healthcare Strategy
 National ICT & Healthcare Strategy National ICT & Healthcare Strategy
National ICT & Healthcare Strategy
 
National ICT & Education Strategy July 2016
National ICT & Education Strategy July 2016National ICT & Education Strategy July 2016
National ICT & Education Strategy July 2016
 
National identity strategy presentation may 10, 2016
National identity strategy  presentation may 10, 2016National identity strategy  presentation may 10, 2016
National identity strategy presentation may 10, 2016
 
National citizen identity strategy
National citizen identity strategyNational citizen identity strategy
National citizen identity strategy
 
Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015Proposed country identity strategy july 24, 2015
Proposed country identity strategy july 24, 2015
 

Recently uploaded

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 

Recently uploaded (20)

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 

Requirements for Successful Enterprises in a Federated Economy - October 2017

  • 1. Author: Guy Huntington, President, Huntington Ventures Ltd. Date: October 2017
  • 2. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 2 Table of Contents Executive Summary ..................................................................................................................................................3 Introduction................................................................................................................................................................4 The Foundational Piece – Identity Verification ..........................................................................................................5 Identity Authentication ...............................................................................................................................................9 Authorization Consent .............................................................................................................................................11 Security ...................................................................................................................................................................14 Operational Availability............................................................................................................................................22 Summary .................................................................................................................................................................24 About the Author .....................................................................................................................................................25
  • 3. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 3 Executive Summary An economic revolution is quietly occurring. It is built upon creating new, rapid interdependencies between enterprises, devices, and people. This allows us to analyze, optimize, prophesize, customize, digitize, and automate services. What most people and enterprises don’t understand are the requirements to be successful in this new world. That is what this paper addresses. It is built upon trust. This paper identifies the foundational pieces required to create trust for an interdependent world: • Identity verification • Identity authentication • Authorization consent • Security • Operational availability Requirements for each piece are stated from the following perspectives: • Users • Third party (e.g. banks, telco’s, insurance companies, small businesses, et al.) • Government (municipal, regional, state, and national) • Identity verification and authentication service The underlying infrastructure required for this interdependent world is complex. The paper illustrates this by examining the three main protocols required: OpenID Connect, OAuth, and User Managed Access. It also discusses a potential downside of creating an interdependent world – creating a single point of enterprise and/or economic failure. A disturbing trend is the increasing size of botnet distributed denial of service attacks. The paper uses Estonia’s 2007 attack to illustrate this problem on a national scale.
  • 4. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 4 Introduction In a recent column, the noted NY Times Columnist Thomas Friedman stated1 : “We’re going through a change in the “climate” of globalization — going from an interconnected world to an interdependent one, from a world of walls where you build your wealth by hoarding the most resources to a world of webs where you build your wealth by having the most connections to the flow of ideas, networks, innovators, and entrepreneurs. In this interdependent world, connectivity leads to prosperity and isolation leads to poverty. We got rich by being “America Connected” not “America First.” Finally, we are going through a change in the “climate” of technology and work. We’re moving into a world where computers and algorithms can analyze (reveal previously hidden patterns); optimize (tell a plane which altitude to fly each mile to get the best fuel efficiency); prophesize (tell you when your elevator will break or what your customer is likely to buy); customize (tailor any product or service for you alone); and digitize and automatize more and more products and services. Any company that doesn’t deploy all six elements will struggle, and this is changing every job and industry.” This begs the question: “What is required to enable myself or my enterprise to prosper in this revolution?” The answer lies in the word “trust”. In an interdependent economy, trust for each party to a transaction is dependent upon: • Identity verification • Identity authentication • Authorization consent • Security • Operational availability 1 https://www.nytimes.com/2017/09/27/opinion/globalization-trump-american- progress.html?rref=collection%2Fcolumn%2Fthomas-l- friedman&action=click&contentCollection=opinion&region=stream&module=stream_unit&version=latest&contentPlaceme nt=1&pgtype=collection
  • 5. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 5 The Foundational Piece – Identity Verification Who are you? How do I know you are who you attest to be? The answers to these questions depends on risk. For many transactions, the risk is low, requiring little or no identity verification. As risk rises, the foundational documents that attest to the identity need to be viewed and/or verified. The old way of identity verification for high risk was the birth registry. It is no longer a valid test due to the low cost of forgery of birth certificates. Mitigating this risk requires the ability to attach a physical attribute of the person to the birth registry. A verification service will need to be accessed at various times in an identity’s life to verify they are who they claim to be (e.g. name and gender changes, marriage, and death). It will become foundational, and other more widely used credentials (such as driver’s licenses, passports, identity cards, and voting registries) can then be built upon it. As this paper describes “Identity Federation: Biometrics and Governments” (https://www.slideshare.net/ghuntington/identity-federation-biometrics-and-governments-sept-2017- 80192336), accomplishing this requires governments to create new laws and regulations protecting the biometrics used to identify a person (fingerprints, iris, and DNA). It also requires the national identity verification service to be run separately from other traditional government ministries responsible for things like drivers’ licenses and passports.
  • 6. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 6 Requirements Users Users are rightfully concerned about their privacy in an “interdependent world”. They should be demanding that governments create and/or modify laws and regulations adhering to the principles laid out in the “Biometrics and Governments” paper. Third Parties In an “interdependent world,” third parties will be entering into legal agreements with many other enterprises and/or governments where there is potential risk and liabilities. As the risk rises, third parties need to have a secure, legal way of verifying the identity of the person they are conducting business with. One of the effects of an interdependent world is fast speed of service. For example, the “Biometrics and Government” paper illustrates this by stating that in some countries creating a bank account can be created online in less than 18 minutes. This requires identity trust. Thus, third parties need a low cost, secure, trusted way of doing this. Third party requirements: • Lobby governments to: o Create laws and regulations offering an identity verification service that is secure and always available o Create digital signatures for citizens to use after verifying their identity o Create standard levels of identity assurance which can be referred to in any federation legal agreement • OpenID Connect should be used to federate with: o The national identity verification and authentication service (see the Security and Operations section of this paper for more details), or o Third parties who are the authoritative source for an identity • For the Identity Provider, federation contracts should include: o Identity assurance levels, notification processes to Relying Parties when the identity changes, identity termination processes, archival policies, privacy breach processes, etc. • For a party consuming the identity (Relying Party), federation contracts should include: o The identity assurance levels required, agreement to the notification, privacy breach processes o The assignment of legal liability to the Identity Provider when the identity isn’t whom they claim to be and damages occur to the Relying Party
  • 7. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 7 Governments All levels of governments need to know who they are dealing with based on risk with varying levels of trust. The identity may or may not be required to comply with laws. Many may be willing to provide their consent to join an optional government-offered key contact service. The citizen would update their address and phone numbers with the updated information is instantly sent out to different levels of governments and third parties. Therefore, all levels of governments need to: • Agree on the creation of an identity verification service which is authoritative for the identity • Create and/or amend laws and regulations protecting the identity’s privacy and their biometrics • Agree to consume identities from the identity verification service • Agree on identity assurance standards • Create memorandums of understanding which agree on terms and conditions regarding how the identities will be used • In addition, OpenID Connect should be used to federate with the identity verification and authentication service (see the Security and Operations section of this paper for more details) Government Agencies Government departments and ministries responsible for things like driver’s licenses, passports, national ID cards, and voting registries should: • Consume the identity verification from the national identity verification service • NOT be authoritative for the identity. This is the responsibility of the national identity verification service • Get citizen consent to obtain biometrics used in driver’s licenses, passports, etc. • Be notified by the national identity verification service when an identity undergoes changes to their name, address, or gender as well as when they die
  • 8. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 8 Identity Verification and Authentication Service Should meet the following requirements: • Protect the biometrics used to verify the identity by adhering to laws and regulations. • Should NEVER: o Export any biometrics out of their service to any other government agency or third party o Use the biometrics for any other purpose other than identity verification • Should be responsible for: o Securely collecting citizen biometrics when a citizen is born o Attaching biometrics to the citizen’s birth record as well as to their national e-identity o Creating standards and operating procedures for any device used to obtain a biometric and for sending it to the national identity verification service • Should offer an optional service for citizens where they can update their address and phone number and then have the updated information automatically sent out to government agencies and third parties which the citizen specifies • Should run the identity verification service on a separate secure network that is accessible via the Internet to different levels of governments and third parties • Be legally liable for high levels of identity assurance • After identity verification, issue digital certificates to citizens
  • 9. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 9 Identity Authentication One of the consequences of an interdependent economy is that many of the transactions will occur electronically. Authentication is either one or a combination of: • Something you know • Something you have • Something you are The type of authentication used should be based on risk. Low risk is something like a user name and password. Higher risk is something you carry physically or electronically with you, e.g. a PIN sent to your phone. Highest risk is usually a combination of all three, i.e. including one or more biometrics. In today’s world, the increasing use of biometrics to authenticate is now occurring. Biometrics authentication is now becoming a standard part of cell phone operating systems. What is missing are the laws and regulations protecting the user’s biometrics. The “Biometrics and Government” paper referred to in the previous section lays out the principles for biometrics used for authentication. New laws and regulations are needed which require a citizen’s consent to use their biometrics. Additionally, these laws and regulations would protect how the biometrics will be used and stored as well as providing processes for an identity to request that the biometrics no longer be used. In an interdependent world, the way an identity is verified and authenticated is by using a protocol called OpenID Connect. About one billion people use OpenID Connect daily without realizing it when they log on to Google, Facebook, or PayPal. This occurs when a user clicks on links to other parties, gaining access to services without having to re-authenticate or be authorized for them.
  • 10. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 10 Requirements Users Users should demand that laws and regulations be created to: • Require their consent for biometrics to be used for authentication • Safely protect their biometrics • Require their consent if the biometric is to be used for another purpose • Ensure their biometrics can’t be transferred between enterprises • Offer processes for the citizen to revoke use of their biometrics Third Parties Third parties will want to authenticate the identity based on risk. They should: • Either use a national identity authentication service to authenticate the identity, or • Comply with government laws and regulations allowing them to collect and use biometrics as a form of authentication • Be aware of: o Equal error rates (ERR) for different types of authentication (the rate where a false positive equals a false negative). § I.e., all biometrics are not equal or as reliable o How device readers can be fooled, thereby allowing a person to masquerade as another • If available, OpenID Connect should be used to federate with: o The national identity verification and authentication service (see the Security and Operations section of this paper for more details), or o A trusted third party, which will be used as the identity and authentication provider • Mitigate their potential risks and liabilities for false identities by assigning risk in federation agreements to the identity and authentication provider Governments Different levels of government should: • Standardize their authentication across all levels of government by using a central government identity verification and authentication service • Assign liability for authentication to the national identity and verification service in the memorandums of understanding between the various levels of governments • Use OpenID Connect to federate with the national identity verification and authentication service (see the Security and Operations section of this paper for more details) National Identity Verification and Authentication Service Should meet the following requirements: • Offer an optional national citizen identity authentication service • Protect the forms of authentication by complying with laws and regulations associated with the principles described in the “Biometrics and Government” paper • Ensure the service is secure and highly available (see the Security and Operations section of this paper for more details)
  • 11. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 11 Authorization Consent A few years ago, the authoritative source for an identity was also the provider of identity attributes. An example could be a user logging on to an enterprise, Acme Inc. When the user clicks on a link to another third party’s service, Acme Inc. sends both the identity and authorization attributes to the other party. The other party trusts the identity as well as accepting authorization attributes. They use these to provide customized services to the identity. However, in today’s interdependent world, an enterprise might be authoritative for an identity while other enterprises are authoritative for authorization. With the rise of the Internet of Things, a user may own hundreds of devices. Each device will have owner consent requirements pertaining to who can use the device and/or the data it produces. If a user has to sign on to each device to provide their consent, it will become unmanageable. There is a technological solution for this – a protocol called “User Managed Access.” It allows a user to centrally manage all their consents from one console, regardless of where each device consent management resides. What’s missing is a regulatory framework providing citizens with protection on how their consent is obtained, used, stored, and transferred. Please refer to “Consent and the Internet of Things” (https://www.slideshare.net/ghuntington/identity-federation-citizen-consent-and-the-internet-of-things- october-2017), which lays out principles to construct new laws and regulations.
  • 12. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 12 Requirements Users In an interdependent world, users want to: • Ensure: o Their authorization consents are obtained o That no one can masquerade as them to provide false authorization consents • Have the option of centrally managing all their consents from one place • Have processes where they can securely transfer from one centrally managed authorization service provider to another • Be able to see their history of consents Third Parties Third parties offering end user services, producing smart devices requiring consent and/or consuming data from these devices should: • Lobby governments to provide a regulatory framework for authorized consent using the principles laid out in the paper “Consent and the Internet of Things” • Create legal agreements with both end users as well as enterprises offering the centrally managed user authorization consent service, which: o Assigns potential risks and legal liability to the appropriate party o Defines terms of service including: § Time frames from when a consent is given/changed and then implemented § Identity and credential assurance levels required to make or change a consent, § Archival policies of the consent, and § Chain of custody of the consents as required by laws, regulations, and legal agreements based on risk o Consider joining or creating common trust frameworks Third Parties and/or Governments Offering Central User Authorization Consent Services Third parties and/or governments offering users a central user authorization consent service should: • Adhere to any laws or regulations pertaining to authorization consent • Have legal agreements with the end user: o Specifying potential risks and legal liability to the appropriate party o Notification processes if and when the user wants to leave the service o Specify how long the records will be archived o Consider joining or creating common trust frameworks
  • 13. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 13 Governments • Create a regulatory framework for authorized consent using the principles laid out in the paper “Consent and the Internet of Things” • Ensure that citizen consent for government services is able to be integrated with User Managed Access and OpenID Connect National Identity Verification and Authentication Service • Offers a national citizen identity authentication service, where required, for consent • Offers optional citizen authentication services, where required, for consent
  • 14. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 14 Security Protocols: There are three types of protocols used regarding identity to create an interdependent world: • OpenID Connect • OAuth 2.0 • User Managed Access (UMA) 2 2 http://kantarainitiative.org/confluence/download/attachments/17760302/Venn+infographics.pdf
  • 15. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 15 There is a large challenge in securing the underlying business and identity processes in an interdependent world transaction – they are fragmented. Why? Because the network traffic flows between multiple enterprises. When I have led large identity teams in the past, to explain this to the team, I tell there we are going “to follow the electrons for a single transaction”. It usually results in diagrams showing between 40-100 steps per transaction as it flows between the user, Identity Provider, the Relying Party, Certificate Authorities and then through the Relying Party’s infrastructure to the service the user wants to access. To illustrate this, let’s take a high-level look at the traffic flow for UMA: 3 Each arrow, i.e. step, is governed by the protocol. Why should you care? There are different ways the protocols can be configured. To illustrate this, let’s look at protocols used to configure OpenID Connect: 3 https://www.google.ca/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0ahUKEwj4y4uS6efWAhVHwlQKHYLODP wQFgguMAE&url=http%3A%2F%2Fkantarainitiative.org%2Fconfluence%2Fdownload%2Fattachments%2F17760302%2F UMA%2520webinar%25202015-05-16.pdf%3Fapi%3Dv2&usg=AOvVaw1oJfaOHNVkdakPPgYjrI-D
  • 16. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 16 4 Each of the boxes above contains different ways it can be configured. Thus, dependent upon the configuration, each of the arrows depicting a communication between the parties may or may not be secure. Therefore, an identity transaction might be in jeopardy of being successfully attacked. Does it matter? The answer depends on risk. Enterprises participating in low risk federation won’t likely care. HOWEVER, many transactions are medium to high risk. Potential liabilities arise to the participating parties if the transaction isn’t secure. This leads to the next question – “How can we mitigate our risk?” There are three ways risk can be mitigated: • Business processes • Technology • Legal agreements This paper “Enterprise Federation: Mitigating Risks and Liabilities” (https://www.slideshare.net/ghuntington/identity-federation-mitigating-risks-and-liabilities-79942481) lays out the many considerations that are required to mitigate risk and liabilities. 4 http://openid.net/connect/
  • 17. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 17 Requirements User Users, often wrongly, assume that their communications and transfer of identity information, are secure. They require: • Laws and regulations protecting their identity and consent as they interact with services and devices • Notification processes when security fails and their identity and/or consent information is breached The type of device they are using to access a service, its underlying operating systems, and what is been deployed on the device, all affect a user’s identity and authorization security. Their requirements are based on risk. If the risk is low, then the security requirements from a federated service on the user’s device and associated software might be minimal. Thus, the user is free to do as they choose and may or may not pay a price if they have malware on their device. HOWEVER, for high risk transactions, the user might be required by laws, regulations and/or legal agreements to access the service from a device that has certain specifications to reduce the risk of malware attacks. Third Parties Security requirements vary depending on the role the third party is playing AND the risk involved. When acting as an Identity and/or Authorization Provider • Mitigate risk by specifying in federation agreements the time it takes for an identity and/or authorization to be created, modified, or terminated and when/how the Relying Parties will be notified • Use stronger identity verification and/or authentication assurance to verify/authenticate an identity depending on risk and then state this in legal agreements • Usually the communication between the federated enterprises in legal agreements specifies: o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved o Use of digital certificates (included Certificate Authorities) used to: § Digitally sign a JSON token § Encrypt the identity information within the JSON Token o Notification processes when a digital certificate is about to expire o Testing processes used to update the digital certificate o Attack vectors, how they will be mitigated technically, and assignment of potential liability to the federation partners o The number of environments the Identity Providers offer o If external penetrations test will be done by parties to the federation to ensure the configurations have been properly implemented
  • 18. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 18 o Session management settings with assignment of potential liability to federation partners based on the settings o Notification processes for security and/or privacy breaches When acting as a Relying Party • Mitigate risk by specifying in federation agreements the agreed to times it will take for identity and authorization information provided by the authoritative parties to then be implemented into their systems/services • Assign liability to the Identity and/or Authorization Provider if they accept an identity that is no longer valid or, a person is able to successfully masquerade as another • Usually the communication between the federated enterprises in legal agreements specifies: o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved o Use of digital certificates (included Certificate Authorities) used to: § Digitally sign a JSON token § Encrypt the identity information within the JSON Token o Notification processes when a digital certificate is about to expire o Testing processes used to update the digital certificate o Attack vectors, how they will be mitigated technically, and assignment of potential liability to the federation partners o If external penetration tests will be done by parties to the federation to ensure the configurations have been properly implemented and the frequency of ongoing tests. o Notification processes for security and/or privacy breaches When acting as a Central Authorization Consent Service • Mitigate risk by specifying in federation agreements the agreed to times it will take for a consent to be received by the consent service and how fast it will be communicated to the other parties • Assign liability to the consent service if a consent change is made by the user and the consent service didn’t properly notify the associated parties • Usually the communication between the federated enterprises in legal agreements specifies: o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved o Use of digital certificates (included Certificate Authorities) used to: § Digitally sign a JSON token § Encrypt the authorization information within the JSON Token o Notification processes when a digital certificate is about to expire o Testing processes used to update the digital certificate o Attack vectors, how they will be mitigated technically, and assignment of potential liability to the federation partners o If external penetration tests will be done by parties to the federation to ensure the configurations have been properly implemented and the frequency of ongoing tests. o Notification processes for security and/or privacy breaches
  • 19. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 19 Governments • Should use OpenID Connect, OAuth, and User Managed Access protocols configured to mitigate potential attack vectors • Ensure: o Citizen consent for government services is able to be integrated with User Managed Access and OpenID Connect o Any change to the core citizen identity is immediately sent out from the national identity verification service to departments and ministries, required by law, to mitigate the risk of people masquerading as others • Specify in memorandums of understanding between different government agencies: o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved o Use of digital certificates (included Certificate Authorities) used to: § Digitally sign a JSON token § Encrypt the authorization information within the JSON Token o Notification processes when a digital certificate is about to expire o Testing processes used to update the digital certificate o Attack vectors, how they will be mitigated technically and assignment of potential liability to the federation partners o If external penetration tests will be done by parties to the federation to ensure the configurations have been properly implemented and the frequency of ongoing tests o Notification processes for security and/or privacy breaches • If governments are participating in federation with third parties, then they sign legal agreements, which are separate from memorandums of understanding specifying: o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved o Use of digital certificates (included Certificate Authorities) used to: § Digitally sign a JSON token § Encrypt the authorization information within the JSON Token o Notification processes when a digital certificate is about to expire o Testing processes used to update the digital certificate o Attack vectors, how they will be mitigated technically, and the assignment of potential liability to the federation partners o If external penetration tests will be done by parties to the federation to ensure the configurations have been properly implemented and the frequency of ongoing tests. o Notification processes for security and/or privacy breaches
  • 20. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 20 National Identity Verification and Authentication Service • Offer a national citizen identity verification service, where required, for consent • Offer optional citizen authentication services, where required, for consent • Create a regulatory framework for authorized consent using the principles laid out in the paper “Consent and the Internet of Things” and “Biometrics and Governments” • Specify in memorandums of understanding between different government agencies and federation legal agreements with third parties: o Algorithms on how the secure internet tunnel (Transport Layer Security) will be achieved o Use of digital certificates (included Certificate Authorities) used to: § Digitally sign a JSON token § Encrypt the authorization information within the JSON Token o Notification processes when a digital certificate is about to expire o Testing processes used to update the digital certificate o Attack vectors, how they will be mitigated technically, and assignment of potential liability to the federation partners o If external penetration tests will be done by parties to the federation to ensure the configurations have been properly implemented and the frequency of ongoing tests. o Notification processes for security and/or privacy breaches • Operate the identity verification and authentication service on a separate network • Continually schedule regular penetration tests on the service • Ensure that administrators are strictly monitored with high levels of identity and credential assurance to make any changes to the underlying architecture • Any change to the underlying biometrics MUST be to legal laws and regulations with public reporting of the actions • All biometric data stored within the identity verification service MUST NEVER leave the identity verification databases/directories • Any upgrade to the underlying architecture must be very carefully monitored to ensure that no malware code is inserted in the upgrade rendering the service susceptible to a malware threat
  • 21. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 21 Creating a Potential Single Point of Enterprise and Economic Failure The beginning of this paper used a quote from Thomas Friedman outlining the benefits of an interdependent world. What wasn’t said is this creates potential points of enterprise and economic failure. How? Let’s use Estonia as an example. Estonia offers more than 1,000 online services to their citizens including e-health, e-pharmacy, e- education, e-voting, e-banking, e-residency, etc. Estonians use government issued digital signatures, based on trust that the identity is who they claim to be, for their legal transactions. The country therefore relies upon the infrastructure supporting this. In 2007, Estonia came under a distributed denial of service attack which effectively shut them down. They had created a potential point of failure (https://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia). The interdependency relies on trust between various parties with the government at the heart of it. This begs the obvious question – What has changed between 2007 and today? Countries like Estonia have built infrastructure that is more resilient to these types of attacks. NATO has their “Cyber Defense Center of Excellence” located in Estonia. So, some enterprises are taking steps to mitigate their risk. What has happened on the attack front? The attacks have increased. In 2016, distributed denial of service attacks greater than 600 gigabits per second were documented (https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/). Most of the non-military and non-large Fortune 500 infrastructure around the world aren’t prepared for this. It will effectively shut them down. How are these attacks made? They are usually done by taking control of Internet of Things devices with poor security and commandeering them into what’s called a “botnet.” With the rise of the Internet of Things, these types of attacks will likely increase in size. How hard is it to do this? It’s not hard. In fact young people are learning from others how to do it https://krebsonsecurity.com/2016/09/israeli-online-attack-service-vdos-earned-600000-in-two-years/ and https://nakedsecurity.sophos.com/2016/11/03/teen-pleads-guilty-to-creating-ddos-tool-used-in-1-7- million-attacks/. This article alludes to what “state actors” could do to enterprises and/or governments from these types of attacks: https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn- mirai-botnet. There’s yet another risk to consider which could target the identity verification and authentication of a country – electromagnetic attacks. This type of attack could paralyze the infrastructure. It’s paramount the underlying identity verification data be able to withstand this attack. Federation introduces new types of risks that have to be mitigated to be successful in this new type of economy. All enterprises MUST be aware of the growing risks and potential liabilities from these types of attacks and mitigate against the risk.
  • 22. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 22 Operational Availability In an interdependent world, if any of the Identity Provider, Relying Party, Authorization Provider, or consent Service Provider systems, are not available then the interdependency can fail. One of the consequences of this is ensuring that the systems are they are highly available, i.e. 24x7x365. Historically, this has proven to be costly to implement. Many executives delay the expenditure to focus their resources instead in other areas where the payback is more readily achieved. Today there are tools like the cloud, which can be brought to bear to address this. However, “the cloud” is not a panacea for all operations problems AND there are restrictions on how and when it can be used. Requirements Users Users somewhat naively assume that when they want to do something, the systems will be there for them to do it. They are increasingly becoming accustomed to services being available 24x7x365. To access some of the services, based on risk, they might or might not be required to have: • A certain type of web browser and/or versions • Certain types of operating systems with appropriate version upgrades • Certain types of antimalware on the device • A service that detects malware on their devices Third Parties What most third parties don’t realize is that with an increasing interdependency on other parties, be they government, third parties and/or smart devices, there is a follow-on effect in an increased integration with their formerly internal infrastructure and security operations support. Therefore, depending on the degree of risk involved in the federation, third parties may need to state in the federation legal agreements the following: • Service level availability • Peak load • Integrated incident management ticketing systems • Integrated incident management responses • Integrated help desk responses
  • 23. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 23 • Synthetic transactions once per minute or whatever time frame is agreed upon • Privacy breach processes • Disaster recovery processes • Environments made available to test in • Emergency code change processes • Digital certificate renewal processes • Test users agreed to by the Identity and/or Authorization Provider • Data standards used for any identity and/or authorization data communicated via the protocols The legal agreement needs to not only specify the technical processes but also the business notification processes associated with the above. The high availability requirements mean that enterprises must now be monitoring most points in a federated transaction, as determined by mapping the flow of electrons referenced earlier on, on a frequent basis. The enterprise needs to mitigate risk that a system will go down by seeing early on component failure. It then needs to alert the central support team to instantly address and remedy the problem. As well, depending on degree of risk, automated testing needs to frequently occur to test out attack vectors. This mitigates risk of potential liabilities from attackers gaining access to a transaction and/or back end system. If the operations are cloud based, then consideration needs to be given to where the cloud based servers are located. Why? Many jurisdictions now require the identity data to stay within their borders. Therefore, regulations like the upcoming 2018 EU General Data Protection Regulation (GDPR) affect where cloud based operations might store and/or transfer data. As referenced above in the security section, operations can now be disrupted via denial of service and distributed denial of service attacks. Therefore, enterprises need to enter into any federation agreement with their eyes wide open to the risks associated with this. Governments Governments face similar requirements as third parties. Therefore, all the requirements for third parties also apply to governments. National Identity Verification and Authentication Service The national identity verification and authentication service is a potential single point of economic failure for a country’s economy reliant upon identity verification and authentication services. All the requirements stated for third parties also applies to this service. HOWEVER, it needs to be even more resilient. The architecture used to provide these services must be designed to be resilient to large scale distributed denial of service attacks and potential electromagnetic attacks. Close attention should be paid to ongoing global attack developments and then a well thought out mitigation risk response needs to be implemented.
  • 24. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 24 Summary Technology is now being widely deployed which dramatically changes the way we live, i.e. creating an “interdependent world.” All of this is built upon trust. Trust needs to be attested for the identity without being able to see the person who is digitally interacting with multiple enterprises. Existing laws and regulations are not keeping up with the technological changes in identity verification, authentication, and authorization consent. Creating the identity verification laws and regulations to operate in this world will likely slowly occur. Without this, it creates higher potential liabilities for enterprises operating in a federated world when they need higher levels of identity assurance. Therefore, enterprises need to be aware of the risk associated with identity federation. They need to create contracts with their federation partners mitigating risk and potential liabilities. The Internet is both an exciting as well as a dangerous place. Federation requires enterprises to open themselves up to other parties upon which they become dependent. The number of potential attack vectors on the transaction is therefore larger. Enterprises entering into federation need to do so with their legal, business, technology, operations, and security eyes wide open. If they do so, they will prosper in the new economy.
  • 25. Huntington Ventures Ltd – The Business of Identity Management 6262 Wellington Avenue, West Vancouver, BC V7W 2H4 1-780-289-2776 www.hvl.net Page 25 About the Author Guy Huntington is a veteran identity architect, program and project manager who’s lead as well as rescued many large identity projects with many of them involving identity federation. His past clients include Boeing, Capital One, Kaiser Permanente, WestJet, Government of Alberta’s Digital Citizen Identity and Authentication Program and Alberta Blue Cross. As one of his past clients said “He is a great find, because he is able to do high quality strategic work, but is also well-versed in project management and technical details, so he can traverse easily from wide to deep. With Guy, you get skills that would typically be encompassed in a small team of people.”