An Identity on the Internet Steve Plank Identity Architect Microsoft UK
topics phishing, phraud identity layer Identity metasystem 7 laws human integration consistent experience across contexts Identity metasystem ip rp user identity selector
**************** web server www.identitytheft.com www.mybank.com.net.iwill.take.over.your.life.com/dodgy.php gullible@hotmail.com under the control of somebody else **************** bad person’s database
Application Error: IIS Custom Solution Credentials database FormsAuthentication.SetLoginCookie() Custom Solution www.newcorp.com Application Error: Cross-domain cookie. A cookie has been received from a security domain other than the one to which this web server is a member. This is a potential security breach. Please consult the application or web server administrator. Custom Solution www.megacorp.com
Identity no consistency DNS Naming Connectivity IP
User control and consent Minimal disclosure for a defined use Justifiable parties Directional identity Pluralism of operators and technologies Human integration Consistent experience across contexts
Human integration Consistent experience across contexts Planky’s Card Card Collection
Locally installed software: not under somebody else’s control Identity Provider First name Last name Email ....... Steve Plank planky@a.com ...... Bob Smith Bsmith@a.com Locally installed software: not under somebody else’s control Identity Selector 1:1 relationship between cards and identity providers Subject
Intentionally left blank First name Last name Email ....... Steve Plank planky@a.com ...... Bob Smith Bsmith@a.com Identity Provider digital signature Metadata: URI of the Identity Provider Claims you can get from the IP givenname: lastname: email: user-id: etc: Intentionally left blank
Identity Provider cryptographic binding between the card and the IP digital signature
OR There will be many Identity Providers each running its own technology stack OR Pluralism of operators and technologies Human integration Consistent experience across contexts
Web Site Web Service HTML WS-* WS-* Identity Metasystem WS-* HTML Identity Provider Relying Party Web Site Web Service <sp:IssuedToken ...> ... <sp:RequestSecurityTokenTemplate> <wst:Claims wst:Dialect=”http://schemas.microsoft.com/ws/2005/05/identity”> <ic:Claim URI=”http://.../ws/2005/05/identity/claims/givenname”/> URI=”http://.../ws/2005/05/identity/claims/surname” URI=”http://.../ws/2005/05/identity/claims/email”/> URI=”http://.../ws/2005/05/identity/claims/privatepersonalidentifier” </wst:Claims> </sp:RequestSecurityTokenTemplate> </sp:IssuedToken> HTML WS-* WS-* Identity Metasystem Microsoft Identity MetaSystem <object type="application/x-informationcard" name="_xmlToken"> <param name="tokenType" value="urn:oasis:names:tc:SAML:1.0:assertion" /> <param name="requiredClaims" value="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier" /> </object> WS-* HTML Subject
Identity Selector’s Built-in Identity Provider Relying Party Identity Selector’s Built-in Identity Provider 2 degrees of store protection: System Key Password Key Identity Metasystem Personal Cards: fixed schema Subject
what claims another party makes about me personal cards what claims i make about myself fixed schema (protect the users from themselves!) managed cards what claims another party makes about me flexible schema
elvis presley only 1 of them is real probably
SECURITY TOKEN SAML Token XrML License X.509 Certificate Kerberos ticket . ...others Steve Plank Over 18 Over 21 Under 65 image
security token service give it something SECURITY TOKEN Steve Plank Over 18 Over 21 Under 65 image DIFFERENT SECURITY TOKEN Username Password Biometric Signature Certificate
[ ] [ ] e s click login button get policy authenticate RST policy: identity provider relying party e [ ] [ ] s click login button get policy authenticate RST RSTR policy: authn reqs token types ... policy: uri of ip required claims optional claims token type identity.provider.com requires username and password to validate this request. Enter the information below subject
[ ] [ ] identity provider relying party token decryption [ ] [ ] token decryption *givenname: Steve *surname: Plank *emailaddress: planky@plankytronixx.com *privatepersonalidentitifer: planky123 Do you want to send this card to: ip.sisa.com ip.sisa.com token authentication real token display token subject
topics phishing, phraud identity layer Identity metasystem 7 laws human integration consistent experience across contexts Identity metasystem ip rp user identity selector