Open Identity for Open Government and the Open Identity Exchange (OIX): A Market Solution to Online Trust June 2010.

Slides:



Advertisements
Similar presentations
Manatt manatt | phelps | phillips New York State Health Information Technology Summit Initiative Overview and Update Rachel Block, Project Director United.
Advertisements

TFTM Interim Trust Mark/Listing Approach Paper Discussion Deck TFTM Committee IDESG Plenary Meeting January 14, IDESG TFTM Committee1.
The GSMA July 2014 Restricted - Confidential Information
Current developments: A View from Social Care Terry Dafter Chair of ADASS Informatics Network November 2014.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Your Technology Is Connected. Are You? Your technology doesn’t exist in a vacuum. Welcome to the networked and interconnected technology ecosystem where.
Kantara Initiative Identity Assurance Framework Overview and Value Proposition March 8, 2011.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
Framework Planning Draft 1 Jack Suess Ian Glazer Peter Alterman Andrew Hughes Michael Garcia.
1 Enabling Open Government Using the OIDF/ICF Open Trust Framework OASIS Identity Management 2009 September 29, 2009 Don Thibeau, ED, OpenID Foundation.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
The topics addressed in this briefing include:
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
Internet 2 Corporate Value Proposition Stuart Kippelman (J&J) Jeff Lemmer (Ford) December 12, 2005.
9/11/ SUPPORT THE WARFIGHTER DoD CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC: V1.0.
The InCommon Federation The U.S. Access and Identity Management Federation
AN INVITATION TO LEAD: United Way Partnerships Discussion of a New Way to Work Together. October 2012.
The Open Identity Framework Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Summary of the U.S. Task Force on United Way’s Economic Model & Growth.
© Copyright 2011, Alembic Foundation. All Rights Reserved. Aurion: Health Information Exchange Technology Today Alembic Foundation OSCON 2011 July 27,
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
Kevin Novak, Chair W3C Electronic Government Interest Group April 17, 2009.
UN CEFACT Single Window Recommendation Simplifying International Trade Gordon Cragge Chair – International Trade Procedures Working Group (TBG 15 of UN.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
GFIPM FICAM Status Update GFIPM Delivery Team Meeting November 2011.
Building trust on the internet Extending Attribute Protocols for Status Management and “Other Things” Patrick Richard, Xcert International.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting The AARC Project I2 Technology Exchange.
Scalable Trust Community Framework STCF (01/07/2013)
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
NSDI Strategic Plan Update January 14, NSDI Strategic Plan High-level Timeline 2 Timeframe Activity Dec - Feb Project Start-up – COMPLETED Feb -
Federations: The New Infrastructure Speaker Name Here Date Here Speaker Name Here Date Here.
Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
PERKINS IV AND THE WORKFORCE INNOVATION AND OPPORTUNITY ACT (WIOA): INTERSECTIONS AND OPPORTUNITIES.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
1 David C. Kibbe, MD MBA DirectTrust Collaborating to Build the Security and Trust Framework for Direct Exchange June 20, 2013.
Jeju, 13 – 16 May 2013Standards for Shared ICT Thomas Goode General Counsel ATIS Alliance for Telecommunications Industry Solutions (ATIS) Update Document.
Vision: Increase regional sharing and collaboration in order to expedite the delivery and adoption of energy efficiency. Conduit is brought to you by NEEA.
Department of Internal Affairs Disrupting Government Service Models Tim Occleshaw Government Chief Technology Officer Service and System Transformation.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Update from the Faster Payments Task Force
Data and Applications Security Developments and Directions
Higher Education’s Role in the Identity Ecosystem
InCommon Steward Program: Community Review
Introduction to TransCelerate
HIMSS National Conference New Orleans Convention Center
ETSI Standardization Activities on Smart Grids
Alliance for Telecommunications Industry Solutions (ATIS) Update
Presentation transcript:

Open Identity for Open Government and the Open Identity Exchange (OIX): A Market Solution to Online Trust June 2010

OIX is an Internet-scale solution to the problem of how open identity credentials can be trusted online

Background OIX was founded by members of the OpenID Foundation (OIDF) and Information Card Foundation (ICF) OIX was born of the US government’s need to accept identity credentials from certified providers at known levels of assurance – The US government did not want to become an identity provider for all citizens – Instead it wanted to consume credentials citizens already had from third-party identity providers

Third-party identity solutions OpenID and Information Cards address the need for Internet-scale digital identity management Both solve the problem using a third party to assist end-users in identity transactions This sets up the following “trust triangle” for Internet identity transactions

identity service provider relying party user Terms of Service (TOS) agreement Optional direct trust agreement The basic “trust triangle”

The trust problem The user has a direct trust relationship with both the identity service provider and the relying party The problem is: how can the identity service provider and relying party trust each other? This problem is especially acute: – At Internet scale, where identity providers and relying parties may not have any pre-existing relationship – With high-value data like personally identifying information – With high-assurance transactions

Direct trust agreements do not scale Direct trust agreements are common when an identity service provider and a relying party are close business partners – Airlines and rental car companies They do not scale to large networks, e.g., credit card networks, ATM networks – Requires n 2 trust agreements The solution is often a trust framework – A shared set of policies and agreements

Trust Framework Trust Community A trust framework “umbrella” identity service provider relying party user

Trust framework providers Other industries (credit cards, ATMs) have created global trust frameworks They each use a shared trust framework provider – Visa, Mastercard, AMEX – Cirrus, PLUS The same model can be used for digital identity assurance

The US government vision Create a program for approving industry non-profits as “trust framework providers” (TFPs) – US ICAM TFP Adoption Process (TFPAP) ( These TFPs in turn certify private industry identity providers against the requirements for different level of assurance (LOA) – TFPAP covers LOA 1 through 4 based on the NIST standard

Trust Framework becomes scalable "architecture" for trusted services Service Providers define "Identity Scheme" to support services in Trust Network model (ISAP) Service Providers and Identity Providers propose model to support services (TFPAP) Users "join" in Trust Networks, learning new security/control model in "context" of service Level 1 Framework allow "individualized interaction" without Personally Identifiable Information Services to be defined at Levels 2-4 can be added "incrementally" and in context "Citizen-facing" Missions (Agencies as "Service Providers") Federal Trust Framework Model (OMB ; eAuthentication; HSPD-12) Government Banks Hospitals, etc Relying Parties (RPs) (Trusted Service Providers) Users Identity Providers (IDPs) (Personal Data Store Providers) Google, Yahoo, Facebook, Citi, Paypal, Verisign "Trust Network"

Timeline for creation of OIX Nov 2009 DecJanFebMarApr May 2010 OIDF/ICF Joint Steering Committe e formed to review options for meeting TFPAP goals JSC recom- mends formatio n of OIX Final approval received from both boards 1. OIX launched at RSA 2. Approved as TFP by US ICAM 3. First 3 IdPs certified 4. Open Identity Trust Framework Model paper published Expanded member- ship docs approved; working groups commence

Industry vision Industry wanted to solve the problem of identity credential trust not just for the US government, but for any trust community So it created the Open Identity Trust Framework Model – Published jointly by OIDF, ICF, and OIX – Allows any trust community to create their own trust framework specification (TF) – Each TF “plugs in” to the OIX certification program

The OITF Model Levels of Assurance Levels of Protection

The US ICAM Trust Framework First official OIX trust framework Approved by ICAM on 2 March 2010 Currently operates at LOA 1 Google, PayPal, Equifax, and Verisign certified; more in process Application for LOA 2 and 3 in development – US ICAM Trust Framework Working Group

Other OIX trust frameworks in development Line Information Database (LIDB) – To safeguard access to telco subscriber data PBS Public Media – To connect public TV stations, users, and sites XAuth – To simplify movement between social sites PDX (Personal Data Exchange) – To support individuals sharing data on their terms

OIX Working Groups Lightweight process designed to support all aspects of trust framework development Open to OIX members and non-members Encourages information sharing and best practices Two general WGs: – Legal WG – Trust Framework Development WG

Legal WG Develop TF Process and Structure – Work with Trust Communities to build TFs and standardize TF design – Target legal rule “best practices” Developing an “ecosystem of obligations” analytical structure Will collaborate and coordinate with related legal standardization initiatives

Trust Framework Development WG Publish OIX Trust Framework Requirements and Guidelines document – Step-by-step template for an OITF-compliant trust framework Hosts governmental TF best practices discussions/workshops Incubates new TFs – assists policymakers with education and early requirements analysis

OIX Listing Service Web service to be hosted by OIX on behalf of all the participants – Both human-readable and machine-readable Will describe what organizations are participating in what trust frameworks at what LOA and LOP using what Technical Profiles Will provide an efficient, near-real time market information feedback loop Can be queried by IdPs, RPs, and user agents

OIX membership

QUESTIONS/DISCUSSION

Great opportunity to align forces to accelerate government mission results Lower Risk Lower Cost Improved mission effectiveness Improved transparency Improved citizen access to government services Improved "citizen experience" across government websites

Leadership and key government initiatives are a driving force Task Force on Identity Management provides focus and vision CIO Council establishes Identity, Credentials and Access Management Subcommittee (ICAM) ICAM consolidates efforts: eAuthentication; OMB ; HSPD-12 – Evolves "federation" model to define process for adopting "Trust Frameworks" (TFPAP) – Creates framework for developing underlying "Identity Schemes" (ISAP) – Establishes OMB Levels of Assurance model as cornerstone for ISAP/TFPAP – Adopts us of "Industry" technology to allow "lightweight" implementation – Reconciles specifications (OpenID and Information Cards) to OMB – Establishes first Trust Framework, referred to as the "Level 1 Trust Framework" Industry embraces Trust Framework model and works to support "Level 1 Communities"

Industry supports Federal efforts to improve "Service Delivery" Industry recognized superiority of "lightweight federation" several years ago – Microsoft develops "Card Space" technology to support rich identity technology – Microsoft "contributes" technology to enable open source "Information Card" technology – Identity "community" consolidates on OpenID as lightweight URL-based identifier – OpenID and Information Card groups form foundations for joint market development

Industry supports Federal efforts to improve "Service Delivery" Industry begins to embrace lightweight federation model – Microsoft supports OpenID and works to help develop "seamless" user experience – AOL, Google, Facebook, Yahoo, VeriSign, JanRain, and others support OpenID  Current estimates on OpenIDs exceed 1 Billion, with 40,000 sites supporting Industry supports Federal Government as the largest "Service Provider" – 500 citizen-facing sites, with massive relevance to existing OpenID "customer base" – Opportunity to increase transparency, access, and experience with Level 1 Communities

Trust Framework becomes scalable "architecture" for trusted services Service Providers define "Identity Scheme" to support services in Trust Network model (ISAP) Service Providers and Identity Providers propose model to support services (TFPAP) Users "join" in Trust Networks, learning new security/control model in "context" of service Level 1 Framework allow "individualized interaction" without Personally Identifiable Information Services to be defined at Levels 2-4 can be added "incrementally" and in context "Citizen-facing" Missions (Agencies as "Service Providers") Federal Trust Framework Model (OMB ; eAuthentication; HSPD-12) Government Banks Hospitals, etc Relying Parties (RPs) (Trusted Service Providers) Users Identity Providers (IDPs) (Personal Data Store Providers) Google, Yahoo, Facebook, Citi, Paypal, Verisign "Trust Network"

Level 1 Services create Tipping Point for Trust Frameworks

Roadmap To Success For Near-Term Goals and Long-Term Needs Opportunity to leverage "mass market" forces to significantly improve security & performance – Move to "Trust Framework" model by achieving Tipping Point with Level 1 services – Move to "Trusted Services" as new Trust Frameworks proposed at Levels 2-4 Claim victory for transparency, access, and service with adoption of Level 1 Communities – Align with current Agency efforts using "publication" sites, to define "communities" – Look for "early winners" to build momentum across 500 citizen-facing sites – Track creation of "citizen accounts," leveraging OpenID technology across all sites

Roadmap To Success For Near-Term Goals and Long-Term Needs Initiate the serious work needed to achieve success with incremental Level 2-4 services – New teams to focus on issues in the Public/Private balance of privacy and security – Immediate focus on "user experience" to support seamless evolution for citizen security – Working groups to seek "normalization" of user-facing security technology for Levels 2-4