May 6, 2008 Gabe Wachob and Drummond Reed, XRI TC Co-Chairs What do OpenID, Higgins, I-Names, and XDI Have in Common? An OASIS Webinar on XRI and XRDS.

Slides:



Advertisements
Similar presentations
OGSA Security Profile 2.0 (a.k.a. Express Authentication Profile) DUANE MERRILL October 18, 2007.
Advertisements

UDDI v3.0 (Universal Description, Discovery and Integration)
DDI3 Uniform Resource Names: Locating and Providing the Related DDI3 Objects Part of Session: DDI 3 Tools: Possibilities for Implementers IASSIST Conference,
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
By: Ansuya Chauhan.
Experimental OpenID Service for DOEGrids Summer Student Program 2008 Jan Durand ESnet 08/06/08.
What do OpenID, Higgins, I-Names, and XDI Have in Common? An OASIS Webinar on XRI and XRDS May 6, 2008 Gabe Wachob, XRI TC Co-Chair Paul Trevithick, The.
May 6, 2008 Gabe Wachob and Drummond Reed, XRI TC Co-Chairs What do OpenID, Higgins, I-Names, and XDI Have in Common? An OASIS Webinar on XRI and XRDS.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
1 Higgins 1: a species of Tasmanian long-tailed mouse 2: the name of an open source collaboration of IBM, Novell, Oracle, Parity…
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
My Site Collaborative Features. About Me Support Team Leader with Webteksolutions Primary.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
National Smartcard Project Work Package 8 – Security Issues Report.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
OASIS OASIS Digital Signature Services Juan Carlos Cruellas Juan Carlos Cruellas Andreas Kuehne Stefan Drees Ernst Jan van Nigtevecht.
11 REVIEWING MICROSOFT ACTIVE DIRECTORY CONCEPTS Chapter 1.
EPICUR Kathrin Schroeder ERPANET-Workshop „Persistent Identifiers“ (17th June 2004) Uniform Resource Names (URN) – Overview Die Deutsche Bibliothek.
Copyright © 2004, Epok, Inc. Extensible Resource Identifiers (XRIs) XDI Face to Face 28 April 2004.
Locating objects identified by DDI3 Uniform Resource Names Part of Session: Concurrent B2: Reports and Updates on DDI activities 2nd Annual European DDI.
CNRI Handle System and its Applications
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The XDI Graph: An Overview of the Proposed XDI Schema XDI TC Face-to-Face Meeting OASIS Symposium April 29, 2004 Drummond Reed CTO, Cordance Corporation.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
The Open Identity Framework Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
IIW 2008b Report November , Mountain View Abbie Barbir Nortel OASIS IDtrust Steering.
Windows Azure Dave Glover Developer Evangelist Microsoft Australia Tel:
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
OASIS Week of ebXML Standards Webinars June 4 – June 7, 2007.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Physical & Logical Address COMP 315. MAC Address A media access control address (MAC address) is a unique identifier assigned to network interfaces for.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
XDI Graph Patterns OASIS XDI TC Submission Drummond Reed This document contains illustrations of basic XDI graph patterns: 1.I-names, i-numbers,
XDI Graph Patterns OASIS XDI TC Submission Drummond Reed This document contains illustrations of basic XDI graph patterns: 1.I-names, i-numbers,
International Telecommunication Union ENUM Implementation Robert Shaw ITU Internet Strategy and Policy Advisor International Telecommunication Union ICANN.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Physical Logical Type Instance Data The XDI Graph Basics The XDI Universal Graph is the logical data model by which resources and their associated data.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Kemal Baykal Rasim Ismayilov
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
BEA position on W3C ‘Web Services’ Standards Jags Ramnarayan 11th April 2001.
Claims-based security with Windows Identity Foundation.
Integrating the Healthcare Enterprise The IHE Process: Developing Standards-based Solutions Kevin O’Donnell Co-chair, IHE Radiology Planning Committee.
Overview of XRI, XDI, I-Names, and OpenID Collaborative Expedition Workshop: Exploring the Potentials and Realities of the Identity Management Landscape.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
OASIS Webinar, May 6, 2008 Gabe Wachob, XRI TC Co-Chair Drummond Reed, XRI TC Co-Chair XRI and XRDS: Key Building Blocks of the Internet Identity Layer.
OASIS IDtrust Member Section June Leung Chair, OASIS IDtrust Member Section Steering Committee
Access Policy - Federation March 23, 2016
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Relationship Cards: Security + Society
OASIS Week of ebXML Standards Webinars
Presentation transcript:

May 6, 2008 Gabe Wachob and Drummond Reed, XRI TC Co-Chairs What do OpenID, Higgins, I-Names, and XDI Have in Common? An OASIS Webinar on XRI and XRDS

Welcome to the OpenID, Higgins, i-names, and XDI Webinar Attendee tips: n To reduce/expand your dashboard – click on ‘Grab Tab’ arrow located on left side of dashboard. n To send a question – type question in question box and send to organizer or presenter. Questions will be answered at the end of the presentation. n Reduce presentation window to see your open browsers – click on square on ‘Grab Tab’ or Select View in top tab, then choose Windows. Whether you are an end-user, public, or private organization, we invite you to become part of the Standards process. For informa- tion about OASIS membership, go to:

What do OpenID, Higgins, i-names, and XDI have in common? They all use two new OASIS technologies you’ve probably never heard of. How have these two new specifications become key building blocks of the Internet identity layer? What problems do they solve? Where do they fit with the work of other OASIS Technical Committees? That’s what we’ll cover today.

OASIS XRI Technical Committee Opened January 2003

XRI (Extensible Resource Identifier) n A new type of Internet identifier (URI) designed expressly for digital identity n An open standard for abstract structured identifiers l Abstract, i.e., identifiers upon which discovery can be performed l Structured, i.e., a syntactic framework for expressing identifiers – “XML for identifiers”

XRDS (Extensible Resource Descriptor Sequence) n A simple, extensible service discovery format for XRIs or URLs n The logical equivalent of a DNS resource record at the XRI layer of identification n The discovery format used by OpenID 2.0, OAuth, and Higgins

Local Path/Query IP Address Domain Name URI/IRI Abstract Identifier Layer Reassignable XRI “i-name(s)” Persistent XRI “i-numbers” XRDS Docu- ment XRDS Resolution TN (Tele- phone Number) Other concrete identifier types Concrete Identifier Layer Synonyms

Examples of XRI i-names n Human-friendly reassignable identifiers =gmw +flower $xml

Examples of XRI i-numbers n Persistent identifiers (never reassigned) =!7a42.cd93.40f4.18e5 +!3792 +!3792!14

Examples of XRI cross-references n Identifiers reused across +flower*(

Examples of XRIs transformed into URIs n XRI Syntax 2.0 defines a strict trans- formation of an XRI into an IRI and URI xri://=drummond.reed xri://=%E7%94%A8%E4%BE%8B

*example T09:30:10Z xri://= xri://=example.name xri://=!7c4.58ff.7c9a.e285 xri://$res*auth*($v*2.0) openid Query and synonyms Service #1 Service #2 Example XRDS document

The XRI 2.0 specifications n XRI Syntax 2.0 l Explicit syntax for reassignable and persistent identifiers l Global context symbols l Cross-references for identifier reuse across contexts l Flexible delegation at all levels of hierarchy l Lossless transformation into IRI and URI forms n XRI Resolution 2.0 l HTTP(S)-based resolution protocol l XRDS: simple XML discovery document format l Synonym management and verification l Service endpoint selection logic l Redirect and Ref processing

Why have XRI and XRDS already become key building blocks of the Internet identity layer?

Not only have XRI and XRDS become an integral part of OpenID 2.0, but the XRI technical community is now a strong part of the OpenID community. — Bill Washburn Executive Director, OpenID Foundation

XRI and XRDS have become essential elements of the Higgins Project. Without them, we couldn’t fully implement the abstract data model that is the heart of Higgins and the key to user-controlled identity and data sharing. — Paul Trevithick Higgins Project Lead

Where are XRI and XRDS being used today? n OpenID 2.0 n OAuth Discovery n Higgins Project n XDI.org i-name/i-number registries n XDI data sharing

Case Study: the top 3 problems XRI/XRDS solved for OpenID 2.0 n Extensible service discovery n OpenID recycling n Automatic secure resolution

What is OpenID? n An open community specification for user-centric Internet authentication l Based on the concept that users have their own globally-resolvable identifiers and OpenID authentication providers n Primary use case: eliminate the need for different usernames and passwords at every website

Relying Party (RP) User Discovery OpenID Provider (OP) XRDS Document

Problem #1: Extensible service discovery n OpenID 2.0 need to describe what versions an OpenID identifier supports n Also what OpenID extensions it supports (SREG, AX, PAPE, etc.) n And what other services may be available (e.g., OAuth, SAML, XDI) n And it needed redundant, prioritized OpenID provider endpoint URLs

Solution: XRDS documents n Simple, standard discovery format n Can be hosted on any blog, web server, IdM system, etc. n Easily extensible using new URIs or XRIs to define service types n Can be extended with elements from any other namespace

*example T09:30:10Z xri://= xri://=!7c4.58ff.7c9a.e285 xri://$res*auth*($v*2.0) 7c4.58ff.7c9a.e285/ +openid

Problem #2: OpenID recycling n With usernames/passwords, usernames can be recycled l The service provider controls the binding with the credential n With OpenID, that’s no longer true l The user controls the binding to the credential! l Losing control of the identifier = losing control of the credential

Solution: persistent synonyms n Bind a recyclable OpenID identifier with a non-recyclable (persistent) identifier, e.g., an XRI i-number n Authenticate based on the persistent i-number n Treat the recyclable identifier as only a temporary handle for the i-number n The user always stays protected

*example T09:30:10Z xri://= xri://=!7c4.58ff.7c9a.e285 xri://$res*auth*($v*2.0) openid

Problem #3: Automatic secure resolution n OpenID could not specify HTTPS resolution for all OpenID URLs l Too many users do not have access to HTTPS certs or infrastructure l Thus the default had to be HTTP l This forces users with HTTPS URLs to type the entire string, e.g.,

Solution: XRI secure resolution n As abstract identifiers, XRIs always map to concrete identifiers n This mapping process - XRI resolution - offers three trusted modes: l HTTPS, SAML, or both n So XRI i-names used as OpenIDs can use HTTPS resolution as the default l No need for users to know/do anything

XRI and XRDS are also building blocks for other identity solutions n OAuth l XRDS discovery format n Higgins Project l Context discovery and resolution n XDI.org XRI registries l i-name/i-number registries & resolution n SAML and Information Cards l Privacy-protected identifier claims

What is the relationship of XRI and XRDS with other OASIS TCs and the IDtrust Member Section?

XDI (XRI Data Interchange) n The XDI controlled data sharing protocol is based entirely on XRI l A globally addressable RDF graph where the address of every node is an RDF statement structured as an XRI subject-xri / predicate-xri / object-xri l Enables a simple portable authorization format called XDI link contracts

ORMS (Open Reputation Management Services) n Newest TC in the OASIS IDtrust member section n Will define neutral, vendor-independent specs for exchanging reputation data n XRI and XDI TC members participating l XRI for durable subject identifiers l XDI for controlled data sharing

PKI-Related TCs n Digital Signature Services eXtended (DSS-X) Advancing new profiles for the DSS OASIS Standard n Enterprise Key Management Infrastructure (EKMI) Defining symmetric key management protocols n Public Key Infrastructure (PKI) Adoption Advancing the use of digital certificates as a foundation for managing access to network resources and conducting electronic transactions

Conclusion n OpenID, OAuth, Higgins, i-names, XDI are just the start of what can now be built on XRI and XRDS n The XRI TC and the IDtrust Member Section look forward to developing more key building blocks of the Internet identity layer

Contact us n Gabe Wachob, XRI TC Co-Chair l l n Drummond Reed, XRI TC Co-Chair l l n Wikipedia l l

n Learn through the IDtrust Knowledgebase of educational materials and background on the standards n Share news, events, presentations, white papers, product listings, opinions, questions, and recommendations through postings, blogs, forums, and directories. n Collaborate with others online through a wiki interface

FAQs

What is the relationship of XRI to URNs? n Uniform Resource Names are specified by IETF RFC 2141 n They are persistent (non-recyclable) identifiers n XRI combines both URNs and HFNs (human-friendly names) in one syntax and resolution protocol

What is the relationship of XRI to the Handle System? n Handle is a persistent object identifier system developed by CNRI n Specified in RFCs 3650, 3651, 3652 n Handle does not include HFNs or other structured identifier features of XRI n Handle does not use XML or HTTP for resolution

Does XRI introduce new Internet namespaces? n Yes. Although it can describe and reuse many types of existing identifiers, it also includes four formal namespaces at the XRI level of identification = for personal for organizational identifiers + for generic tags $ for specific tags

Does the XRI TC specify public registry services? n No, the scope of the XRI TC is limited to the technical specifications for XRI and specified XRIs (the $ space) n XDI.org, a member of the XRI TC, offers XRI registry services n XDI.org is a completely separate non- profit organization