Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department of Commerce, National Institute of Standards.
Your Technology Is Connected. Are You? Your technology doesn’t exist in a vacuum. Welcome to the networked and interconnected technology ecosystem where.
Open Identity for Open Government and the Open Identity Exchange (OIX): A Market Solution to Online Trust June 2010.
Kantara Initiative Identity Assurance Framework Overview and Value Proposition March 8, 2011.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
International City/County Management Association, 2001 September 23, 2001 Develop new models of how things work. Reinvent service delivery from the customer.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
1 Enabling Open Government Using the OIDF/ICF Open Trust Framework OASIS Identity Management 2009 September 29, 2009 Don Thibeau, ED, OpenID Foundation.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
The 4BF The Four Bridges Forum Higher Education Bridge Certificate Authority.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
Citi REO Strategy & Community Relations September 15, 2009.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
Atif Iqbal, R. K. Bagga.  Appropriate mechanism for good governance with the involvement of Information Technology in the system of the government and.
Identity Management Report By Jean Carreon and Marlon Gonzales.
The Open Identity Framework Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GC Credential Management Evolution for the OASIS/World Bank eGov Workshop 17 th April, 2009For information, please contact:
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Development Plans for the Deployment of Smartcards in the North East Region Conn Crawford (NERSC)
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
STANDARDS COORDINATION COMMITTEE PLENARY BREAKOUT 18 SEPTEMBER 2014 Interoperability Requirements.
Openid Connect
Overview of Issues and Interests in Standards and Interoperability Mary Saunders Chief, Standards Services Division NIST.
GFIPM FICAM Status Update GFIPM Delivery Team Meeting November 2011.
Federated Authentication at NIH: Trusting External Credentials at Known Levels of Assurance Debbie Bucci and Peter Alterman November, 2009.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
| 1 Open Access Advancing Text and Data Mining Libraries & Publishers working together to support Researchers What is Text Mining?
Scalable Trust Community Framework STCF (01/07/2013)
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Kantara Initiative Privacy Framework Overview and Value Proposition 13 May 2011.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Federated Identity Fundamentals Ann Harding, SWITCH Cambridge July 2014.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
OpenID Connect Working Group May 10, 2016 Mike Jones Identity Standards Architect – Microsoft.
1 David C. Kibbe, MD MBA DirectTrust Collaborating to Build the Security and Trust Framework for Direct Exchange June 20, 2013.
OpenID Certification June 7, 2016 Michael B. Jones Identity Standards Architect – Microsoft.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Cross-sector and user-centric AAI
Payment card industry data security standards
Data and Applications Security Developments and Directions
InCommon Steward Program: Community Review
Identity Standards Architect – Microsoft
Federated Identity Management for Researchers (FIM4R)
Evdokia Moise OECD Trade Directorate
Identity Standards Architect – Microsoft
NextGen Access Control Platform
HIMSS National Conference New Orleans Convention Center
Dashboard eHealth services: actual mockup
Electronic Services from a School's Perspective PESC Annual Conference on Standards in Higher Education Judith Nemerovski Flink Director of Student Financial.
ATIS Software-Defined Networking/ Network Functions Virtualization
Daniel Jacobson Rob Harles Jonathan Coffman
Baseline Expectations for Trust in Federation
The Use of Open Identity Technologies in Government
Presentation transcript:

Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)

2 Background The Open Identity Framework How the OIF will drive adoption Next steps

3 Most are closed ◦Visa, MasterCard, AMEX credit card networks ◦Phone networks ◦ATM networks Some are open ◦Political, social, religious organizations Some are explicit (legal agreements) Some are implicit (social contracts)

4 In April, the U.S. government asked the OIDF and ICF to create a trust framework for OpenID and Information Cards ◦This would enable U.S. government websites to begin accepting OpenID and Information Card credentials GSA ICAM relying party requirements: ◦Open (not just US citizens) ◦Explicit (legal documentation of certification to NIST levels of assurance) ◦Internet scale

5 See the first set of deliverables at IDmanagement.gov ◦Identity Scheme Adoption Process (ISAP) ◦Trust Framework Provider Adoption Process (TFPAP) Two open identity scheme profiles completed under the ISAP process

6 OpenID LOA 1 profile is now implemented across tens of millions of OpenID accounts ◦Test/pilot infrastructure built ◦Multiple IdP implementations tested ◦Pilot customer (National Institute of Health) with test site IMI Information Cards 1.0 profile covers LOA 1, 2, and non-PKI 3

7 How to best implement the profiles How to best implement the trust framework Identity Providers (IdPs) Relying Parties (RPs) Policy interop Technical interop

8 In August, OIDF and ICF published a joint white paper saying an open, Internet-scale approach to trust frameworks must be: ◦Open to any trust framework authority ◦Open to all IdPs and RPs ◦Open to any qualified assessor/auditor ◦Open to any qualified certification process (including self- certification) ◦Open to evolution and adaptation to market forces

9 An open Internet-scale trust framework must also: ◦Offer both Levels of Assurance (LOA) for IdPs and Levels of Protection (LOP) for RPs ◦Provide a means for dealing with liability ◦Provide a simple, useful, scalable listing service ◦Be open and transparent in its dealings, use public documents written in plain language, and provide frequent reports on all activities

10 The following slide shows the basic design reflecting the OIF principles It illustrates the relationships between the four parties connected by OIF legal agreements ◦The OIF TFP itself ◦Auditors/assessors ◦Identity providers ◦Relying parties

Trust framework agreements Optional direct agreements Identity Providers (IdPs) Relying Parties (RPs) Users Trust Framework Provider (the Open Identity Framework) auditors/assessors trust framework authorities

12 The OIF design explicitly supports at two levels of interoperability ◦Technical certification listings drive adoption before the trust layer is required ◦Policy certification listings drives adoption where explicit trust is required Self-certification and third-party certification is supported at both layers Technical and policy requirements (“profiles”) can be reused at both layers

Identity Providers (IdPs) Relying Parties (RPs) Trust Framework Provider (the Open Identity Framework) auditors/assessors trust framework authorities Technical Certification Listings Technical Interop Requirements

Identity Providers (IdPs) Relying Parties (RPs) Trust Framework Provider (the Open Identity Framework) auditors/assessors trust framework authorities Technical Certification Listings Policy Certification Listings Policy Interop Requirements

Efficiency Openness/Transparency Credibility/Accountability User experience 15

The OIF makes it easy for anyone of any size to ensure technical or policy interop with their choice of profiles Eliminates the n-squared problem of multi-lateral interop testing or trust agreements ◦Quickly become unwieldy for even a small number of IdPs and RPs Grows the market for everyone ◦The “network effect for trust” 16

17 Properly implemented, the OITF provides an open, transparent process for trusted identity transactions ◦Both within and between communities Helps protect participants from collusion or anti- trust concerns Anticipates cross-border data protection issues

18 Each participant (policy authority, IdP, RP, assessor/auditor) reinforces the credibility of the entire model Mutual accountability of all participants Enhanced by government participation ◦Gov’ts serve as the initial “trust anchors”

19 Increased interoperability of Internet identity across websites More consistent ceremony leads to lower login or transaction abandonment at RPs Consistent trust mark raises user confidence

20 Cost efficiency ◦Lower legal, design, and operations costs ◦Lower overhead for assessors/auditors, IdPs, and RPs who need certification Process efficiency ◦Single entity for negotiation of MOAs with policy authorities Effectiveness ◦1+1=3

21 Please contact either foundation with questions or comments Let us know if your organization is interested