The Open Identity Framework Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)

Slides:



Advertisements
Similar presentations
Copyright © 2005 – Clickshare Service Corp. All rights reserved. Payment Aggregation & Affinity Management Clickshare for the Media Industry For more information.
Advertisements

ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
Yukiko Ko Binding Corporate Rules – Global Implications Conference on Cross Border Data Flows and Privacy October 16, 2007.
Digital Identity Group May GIXEL  GIXEL is the professional association of electronic component and system industries in France. It brings together.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
The GSMA July 2014 Restricted - Confidential Information
This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department of Commerce, National Institute of Standards.
Your Technology Is Connected. Are You? Your technology doesn’t exist in a vacuum. Welcome to the networked and interconnected technology ecosystem where.
Open Identity for Open Government and the Open Identity Exchange (OIX): A Market Solution to Online Trust June 2010.
Kantara Initiative Identity Assurance Framework Overview and Value Proposition March 8, 2011.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
OpenStand and Collaborative Communities For innovation, solutions and market growth Kantara Initiative 3 June 2014 Summit Karen McCabe Senior Director,
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
1 Enabling Open Government Using the OIDF/ICF Open Trust Framework OASIS Identity Management 2009 September 29, 2009 Don Thibeau, ED, OpenID Foundation.
2008/04/01The Digital Media in Italia (dmin.it) proposal 1 The creation of a competitive and innovative environment for digital content in Europe A proposal.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Handle with care : Digital marketing and online behavioural advertising Global guidance to help improve consumer trust in practice, techniques and messages.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
What SMS means for an Operator’s relationship with the CAA
Competency Models Impact on Talent Management
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
ADB Project TA 3696-PAK, Regulation for Corporate Governance 1 REGULATION FOR CORPORATE GOVERNANCE IN PAKISTAN CAPITAL MARKETS.
AN INVITATION TO LEAD: United Way Partnerships Discussion of a New Way to Work Together. October 2012.
Authentication and Payments 27 June 2000 Ann Terwilliger Product Director eCommerce Authentication Visa International.
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.
Reform and change in Australian VTE and implications for VTE research and researchers By Aurora Andruska 20 April 2006.
AFFILIATE IN GOOD STANDING COOKBOOK Insights into what it means to be an Affiliate in Good Standing This slide deck is a subset of the obligations and.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
HCPS + HP + UDT Partners in Technology UDT + HP Public Sector CIO Conference October 20, 2009 Jack Davis Executive Director The Center for Technology and.
Reaching the Cloud Era in the European Union EU28 Cloud Security Conference Riga, 16 June 2015 Pearse
1 NHIN Direct + Interoperability Framework = Focused Collaboration Bottom up use case development within a top-down coordination framework CORE PRINCIPLES.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Delivering transparency, choice and control for European citizens.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
State HIE Program Chris Muir Program Manager for Western/Mid-western States.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
PDLN Connect Outline for IFRRO Brussels June 2010.
1 Developing Credit Insurance in Africa and the Mediterranean, Tunis, October, 2000 Developing Credit Insurance in Africa and the Mediterranean basin.
Scalable Trust Community Framework STCF (01/07/2013)
2006/10/19 Designing the foundations of Information Society in Italy 1 L. Chiariglione, G. Cosenza, R. Enni, E. Prosperetti, S. Quintarelli IPDM06, Shanghai,
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
Managed Travel: State and Local Jeanne McDonald Director, Travel Operations Commonwealth of Pennsylvania Welcome.
NREN Trust and Identity Strategy Ann Harding, SWITCH Cambridge July 2014.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
1 David C. Kibbe, MD MBA DirectTrust Collaborating to Build the Security and Trust Framework for Direct Exchange June 20, 2013.
International Standards of Supreme Audit Institutions (ISSAIs) Jennifer Thomson Director OPSPF & Chief Financial Management Officer World Bank.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Making card acceptance work for you
Data and Applications Security Developments and Directions
Making card acceptance work for you
GS1 Industry & Standards Event October 2017 – Brussels, Belgium Transforming business together Session: Distributed Working Groups Time: 12:30.
Simplifying smart solutions
Why the Multistakeholder Approach Works
Understanding Contracts and Statements
IP Principles… First in Australia to launch a set of IP Principles that outline our approach for engaging with industry partners. Now adopted across all.
E-Commerce for Developing Countries (EC-DC)
The Impact of Digitization on Global Alignment of Product Safety Regulations ICPHSO International Symposium November 12, 2018.
ATIS Software-Defined Networking/ Network Functions Virtualization
Daniel Jacobson Rob Harles Jonathan Coffman
Module 4 System and Application Security
The Use of Open Identity Technologies in Government
Presentation transcript:

The Open Identity Framework Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF) V

2 OverviewOverview This presentation introduces the Open Identity Framework, a new open source model for trust frameworks created by the OIDF & ICF It covers: –Why such a model is needed –What principles underlie its design –How the model works –How it will drive adoption of open identity –What next steps the foundations are taking

Third-party identity management Both OpenID and Information Cards address the need for Internet-scale digital identity management Both solve the problem using a third party to assist end- users in identity transactions –Called an “identity service provider” (also “identity provider”, “IdP”, “IP”, “OP”) This sets up the following “trust triangle” for Internet identity transactions 3

4 identity service provider relying party user Terms of Service (TOS) agreement Optional direct trust agreement The “trust triangle”

5 The trust problem The user has a direct trust relationship with both the identity service provider and the relying party The problem is: how can the identity service provider and relying party trust each other? This problem is especially acute: –At Internet scale, where identity service providers and relying parties may not have any pre-existing relationship –With high-value data –With high-assurance transactions

Direct trust agreements do not scale Direct trust agreements are common when an identity service provider and a relying party are close business partners –Airlines and rental car companies They do not scale to large networks, e.g., credit card networks, ATM networks –Requires n 2 trust agreements The solution is often a trust framework –A shared set of policies and agreements 6

7 A trust framework “umbrella” Trust Framework Trust Community identity service provider relying party user

8 Trust framework providers Other industries (credit cards, ATMs) have created global trust frameworks They each use a shared trust framework provider –Visa, Mastercard, AMEX –Cirrus, PLUS The same model can be used for identity

A trust framework for identity 9 Trust framework agreements TOS agreements Trust Framework Provider (TFP) Trust Community (source of a trust framework) assessors & auditors dispute resolvers identity service provider relying party user

Example #1: the US ICAM trust framework 10 Trust Framework Provider US GSA Private-sector identity providers US government websites assessors & auditors dispute resolvers user

US GSA Example #2: the OpenID Society trust framework 11 Trust Framework Provider ? ? user Professional associations Academic publishers assessors & auditors dispute resolvers

12 Websites for PBS shows Example #3: the PBS trust framework Trust Framework Provider US GSA user PBS affiliate stations assessors & auditors dispute resolvers

13 The Open Identity Framework This model is an Internet-scale, open source trust framework model for identity It is a meta-framework where each trust community can specify the requirements of their own trust framework This approach leverages market forces to: –Drive adoption –Drive convergence of specifications for LOA –Introduce specifications for LOP (Levels of Protection) –Engage market pricing for services from assessors, auditors, and dispute resolution service providers

The Open Identity Framework Model 14 Trust framework agreements TOS agreements OIF Trust Framework Provider Identity service providers relying parties Trust Community assessors & auditors 4 4 dispute resolvers 5 5 Trust Community user

15 Range of OIF certification options Self- certification Third-party certification Policy matching  Technical interoperability 

OIF technical interoperability 16 Third-party certification Self-certification identity service providers Technical Certification Listings OIF Trust Framework Provider trust communities relying parties assessors & auditors Technical Interop Requirements

OIF policy matching 17 identity service providers Technical Certification Listings OIF Trust Framework Provider Policy Certification Listings relying parties assessors & auditors trust communities Policy Matching Requirements Third-party certification Self-certification

18 Why will the OIF drive adoption? 1.Efficiency 2.Openness/Transparency 3.Credibility/Accountability 4.Improved user experience

19 Efficiency The OIF makes it easy for anyone of any size to ensure technical interop or policy matching with their choice of profiles Eliminates the n-squared problem of multi-lateral interop or trust agreements Grows the market for everyone –The “network effect for trust”

20 Openness/Transparency Properly implemented, the OIF provides an open, transparent process for trusted identity transactions –Both within and between trust communities Helps protect participants from collusion or anti-trust concerns Anticipates cross-border data protection issues

21 Credibility/Accountability Each participant (trust community, identity service provider, relying party, assessor, auditor, dispute resolver) reinforces the credibility of the entire ecosystem Mutual accountability of all participants Enhanced by government participation –Governments serve as the initial “trust anchors”

22 User experience improvements Increased interoperability of Internet identity across websites More consistent ceremony leads to lower login or transaction abandonment at relying parties Consistent trust mark raises user confidence

Thank you We look forward to working with you 23