Top Banner
Identity 101 Boot Camp Identity North June 15th, 2016 Toronto Kaliya “Identity Woman”
76

Identity 101: Boot Camp for Identity North 2016

Apr 15, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Identity 101: Boot Camp for Identity North 2016

Identity 101 Boot Camp Identity North

June 15th, 2016 Toronto

Kaliya “Identity Woman”

Page 2: Identity 101: Boot Camp for Identity North 2016

Internet Identity Workshop

Co-Founded in 2005

Born in Vancouver

Played Water Polo

UC Berkeley

Planetwork

Identity Commons

Identity Gang

Canada

Founded in 2010 ECOSYSTEM

CONSORTIUM

PERSONAL DATA

Today Independent Identity Consulting

Who is

Page 3: Identity 101: Boot Camp for Identity North 2016

1. Big Picture - What is Identity? 2. Digital Identity - Key Terms

3. ID in Context of Society Enterprise, Government, Commons

4. User-Centric/Self-Sovereign Identity 5. Spectrum of Identity

6. Big Picture - ID Resources 7. Questions and Answers

Outline

Page 4: Identity 101: Boot Camp for Identity North 2016

Identity is socially constructed and contextual.

Page 5: Identity 101: Boot Camp for Identity North 2016

Who I am

Who I present myself to be

How I am seen

In a given

context

Page 6: Identity 101: Boot Camp for Identity North 2016

Contexts Roles (Persona)

FamilyParent, Child Brother, Sister

Religious Life

Hobbies

Professional Work

Congregant Religious Leader

Creator, Maker Teacher

Employee, Employer Contractor

Professionally Licensed

Page 7: Identity 101: Boot Camp for Identity North 2016
Page 8: Identity 101: Boot Camp for Identity North 2016

Atoms

Bits

Easy to move physically between contexts.

To Present Different Selves

Movement Between Different Contexts

Requires Different Non-Correlated Identifiers

Page 9: Identity 101: Boot Camp for Identity North 2016

Persona 1 Persona 2

Context 1 Context 2

Page 10: Identity 101: Boot Camp for Identity North 2016

Persona 1

Persona 2 Context

Page 11: Identity 101: Boot Camp for Identity North 2016

Context 1 Context 2

Persona

Page 12: Identity 101: Boot Camp for Identity North 2016

Understanding Key Digital Identity Terms

Enrollment Proofing/Verification

Attributes/Claims Identifiers - Directed, End-Points

Credentials Authentication - AuthN

Multi-Factor Authentication - MFA Authorization - AuthZ

Page 13: Identity 101: Boot Camp for Identity North 2016

Enrollment Technology Thing

Process Policy

Procedures &

Enrollment: The processes that an institution/organization uses to ‘onboard”and create an identity for a particular individual.

Enrollment —> Credential Issuance

Page 14: Identity 101: Boot Camp for Identity North 2016

Proofing / Verification Triangulation

Identity Proofing or Verification: The processes used to check the veracity of identity claims about a person. This is often done in an enrollment process.

Page 15: Identity 101: Boot Camp for Identity North 2016

Attributes ClaimsAttributes and Claims can be both self asserted by a

person or ascribed to a person by an institution.

IdentifierIdentifies are pointers at people.

Within institutional or network systems these are often numbers that point particular people.

Page 16: Identity 101: Boot Camp for Identity North 2016

Identifiers ClaimsSingle String Pairs

Identifiers link things together and enable correlation.

They can be endpoints on the internet.

A claim is by one party about another or itself.

It does not have to be linked to an identifier.

Proving you are over 18 for example and not giving your real name.

Page 17: Identity 101: Boot Camp for Identity North 2016

Directed IdentifierThese is a types of identifies enable individuals to use different identifiers for different contexts.

The BC Citizen Services card is “one card” but when one uses it in a Healthcare content it has a different identifier then when used within the context of a drivers license. So the identifier is “directed” and only used in one context.

Page 18: Identity 101: Boot Camp for Identity North 2016

Network End-Point Identifier

Identifiers that are also Network End-Points include Phone numbers

e-mail addresses

Authentication can be performed with the end-point. That is you can prove you are in position of the end-

point with a challenge - such as a being sent code to a phone and then entering it into the site asking to confirm

that you are in control of it.

Page 19: Identity 101: Boot Camp for Identity North 2016

Authentication AuthN

What you Know (A Password, OneTime Password)

What you Have (A Credential)

What you Are (Biometric)

Emerging: What you Do (Behavior)

Page 20: Identity 101: Boot Camp for Identity North 2016

Multi-Factor Authentication MFA

What you Have (a bank card) and What you know (The PIN #)

What you Know (Password and What you Are (A Biometric shared at Enrollment)

Using more then one form of Authentication.

Page 21: Identity 101: Boot Camp for Identity North 2016

Authorization AuthZ

This is very different then Authentication which is just checking that an individual is the same one who

presented themselves with the credentials before.

What are you permitted (authorized) to do in a system?

Page 22: Identity 101: Boot Camp for Identity North 2016

Enterprise Mountains

ID in Context of Society

Page 23: Identity 101: Boot Camp for Identity North 2016

Employers

Have Employees

Enterprise Identity

Enterprise Single Sign On

Provisioning

Authentication - AuthN

[Power Relationship]

Page 24: Identity 101: Boot Camp for Identity North 2016

Employers

Have Employees Contractors

Business Partners

Enterprise Identity

Page 25: Identity 101: Boot Camp for Identity North 2016

Provisioning

Termination

Enterprise Identity

Access ControlAuthorization - AuthZ

Roles Attributes

Authentication - AuthN

Page 26: Identity 101: Boot Camp for Identity North 2016

Enterprise Identity

Customers Enrollment Claims/Attributes

But its Different…….More on that later

Page 27: Identity 101: Boot Camp for Identity North 2016

Enterprise Mountains

Government FootHills

Page 28: Identity 101: Boot Camp for Identity North 2016

Civic Records

Citizen Identity

Birth

Death

Marriage

DivorceParent

Drivers License

Voting

Other Licensing

Health Care

Social InsuranceTaxation

Page 29: Identity 101: Boot Camp for Identity North 2016

Citizen Identity The power relationship between the citizen / subject and government entities is NOT the same as the power relationship between the employer and their employee.

The systems used for enterprise identity management CAN NOT be picked up and plopped down on citizen <—> government identity management contexts. It has to work differently.

Enterprise provisioning and termination is clearly not the same as the government issuance of a birth certificate and death certificate.

Page 30: Identity 101: Boot Camp for Identity North 2016

Enterprise Mountains

Government FootHills

Valley of the Commons

Page 31: Identity 101: Boot Camp for Identity North 2016

Big Co.

Web 1.0 Web 2.0

User-Centric Identity Self-Sovereign Identity

Valley of the Commons

Page 32: Identity 101: Boot Camp for Identity North 2016

User-Centric / Self-Sovereign Identity

Page 33: Identity 101: Boot Camp for Identity North 2016

The Identity DogRepresents 2 things:

* Freedom to be who you want to be

* Freedom to share more specific info about yourself that is validated

User-Centric / Self-Sovereign Identity

Page 34: Identity 101: Boot Camp for Identity North 2016

User-Centric / Self-Sovereign Identity

Page 35: Identity 101: Boot Camp for Identity North 2016

Freedom to Aggregate

User-Centric / Self-Sovereign Identity

Page 36: Identity 101: Boot Camp for Identity North 2016

XFreedom to Disaggregate

User-Centric / Self-Sovereign Identity

Page 37: Identity 101: Boot Camp for Identity North 2016

XUser-Centric / Self-Sovereign Identity

We are not all “vanilla”

Page 38: Identity 101: Boot Camp for Identity North 2016
Page 39: Identity 101: Boot Camp for Identity North 2016
Page 40: Identity 101: Boot Camp for Identity North 2016
Page 41: Identity 101: Boot Camp for Identity North 2016

Why James Chartrand Wears Women’s Underpants

http://www.copyblogger.com/james-chartrand-underpants/

Page 42: Identity 101: Boot Camp for Identity North 2016
Page 43: Identity 101: Boot Camp for Identity North 2016
Page 44: Identity 101: Boot Camp for Identity North 2016
Page 45: Identity 101: Boot Camp for Identity North 2016
Page 46: Identity 101: Boot Camp for Identity North 2016
Page 47: Identity 101: Boot Camp for Identity North 2016

Custodianship?

http://www.flickr.com/photos/seektan/2582803300/sizes/z/in/photostream/

Children

Elders

Page 48: Identity 101: Boot Camp for Identity North 2016

Custodianship?

FAMILIES

Page 49: Identity 101: Boot Camp for Identity North 2016

Custodianship?

http://www.flickr.com/photos/jeanlouis_zimmermann/8752148306/sizes/o/in/photostream/

Page 50: Identity 101: Boot Camp for Identity North 2016

How do people “get” User Centric Digital Identity today?

Google profilesYahoo! profiles

FacebookLinkedIn

Hack it together with handles from web mail providers or on a service like Twitter

Challenge with e-mail addresses as identitiesthe communications token is the “ID”

User-Centric / Self-Sovereign Identity

Page 51: Identity 101: Boot Camp for Identity North 2016

What are our rights in these commercial spaces governed by Terms of Service?

How are we “citizens” in private space?

In physical life we have protection of our physical self - people will be prosecuted for harming us. What is the equivalent in online spaces?

Freedom to not be “erased” under TOS

User-Centric / Self-Sovereign Identity

Page 52: Identity 101: Boot Camp for Identity North 2016

Identifier side:

Own their own domain name.

Have a blog?Run an openID server?

Claims based side:

Almost impossible.

Little relying party adoption(Places where 3rd partyor self generated claims

will be accepted)

Little client side app adoption

How do people “get” User Centric Digtial Identity?

User-Centric / Self-Sovereign Identity

Page 53: Identity 101: Boot Camp for Identity North 2016

Identifier side: Claims based side:

Emerging Today: How do people “get” Self-Sovereign Digital Identity today?

User-Centric / Self-Sovereign Identity

Proposed: Distributed IDentity -> DID

Distributed Ledger Technology

Emerging Networks for their Exchange

ID/DataWeb

W3C: Verified Claims Working Group

Personal Data Banks / Stores / Vaults / etc….

Page 54: Identity 101: Boot Camp for Identity North 2016

What is the context for people gathering?

“We’re trying to build a social layer for everything.”

- Mark Zuckerburg

User-Centric / Self-Sovereign Identity

Page 55: Identity 101: Boot Camp for Identity North 2016

Freedom to Peer-to-Peer Link

Freedom to determine how the link is seen by others

User-Centric / Self-Sovereign Identity

Page 56: Identity 101: Boot Camp for Identity North 2016

Freedom to group and cluster outside commercial silos& business contexts.

Freedom of Movement and Assembly

User-Centric / Self-Sovereign Identity

Page 57: Identity 101: Boot Camp for Identity North 2016

• Freedom to Aggregate

• Freedom to Disaggregate

• Freedom to not be “erased” under TOS

• Freedom of Movement and Assembly

• Freedom to Peer-to-Peer link & the Freedom to determine if the link is seen by others

• Custodianship is Possible

User Centric Digital Identity is the:User-Centric / Self-Sovereign Identity

Page 58: Identity 101: Boot Camp for Identity North 2016

Isn’t just a technical problem

TECHNOLOGY

LEGAL

SOCIAL BUSINESS?

User-Centric / Self-Sovereign Identity

Page 59: Identity 101: Boot Camp for Identity North 2016

Why have we have yet to succeed? It is a REALLY hard problem set to solve for,User Centric Digital Identity that is:

1. open standards based2. the scale of the internet + other digital systems3. that people find usable4. that they understand 5. that is secure6. it requires emergence of new social behavior7. and changes business models & norms

User-Centric / Self-Sovereign Identity

Page 60: Identity 101: Boot Camp for Identity North 2016

Why have we have yet to succeed? It is a REALLY hard problem set to solve for,User Centric Digital Identity that is:

1. open standards based2. the scale of the internet + other digital systems3. that people find usable4. that they understand 5. that is secure6. it requires emergence of new social behavior7. and changes business models & norms

User-Centric / Self-Sovereign Identity

CAUSE IT IS

REALLY HARD…

Page 61: Identity 101: Boot Camp for Identity North 2016

We are still working on making the vision real

The Internet Identity Workshop Continues & New Efforts that Complement

* Rebooting Web of Trust * Personal Data Ecosystem

* Re-Decentralize * Personal Data 2016 …

Many protocols emerging - OpenID, OAuth, SCIM,Frameworks To Believe Veracity Exchange of Attributes and Identifiers

User-Centric / Self-Sovereign Identity

Page 62: Identity 101: Boot Camp for Identity North 2016
Page 63: Identity 101: Boot Camp for Identity North 2016

Enterprise Mountains

Government FootHills

Valley of the Commons

Page 64: Identity 101: Boot Camp for Identity North 2016

?Anonymous

?

?

? ?Per-Post Per-Session

Anonymous

Page 65: Identity 101: Boot Camp for Identity North 2016

?Anonymous

✓Verified

✓ ✓ ✓

Verified

✓ ✓✓Documentation In Person

VerificationBiometric Capture

Page 66: Identity 101: Boot Camp for Identity North 2016

?Anonymous

One Site Multi-SiteSelf-Asserted VerifiedSocially

Validated

✓Pseudonymous

Page 67: Identity 101: Boot Camp for Identity North 2016

?Anonymous

One Site Multi-SiteSelf-Asserted Socially

ValidatedVerified

✓Pseudonymous

?

✓Verified

Anonymity

Page 68: Identity 101: Boot Camp for Identity North 2016

?Anonymous

One Site Multi-SiteSelf-Asserted Socially

ValidatedVerified

✓Pseudonymous

?

✓Verified

Anonymity

Over 18 years Woman Voter

CA Congressional District 9

Ms.Sue Donna DOB = 1/21/1982 1823 6th Ave. Alameda, CA

Page 69: Identity 101: Boot Camp for Identity North 2016

?Anonymous

One Site Multi-SiteSelf-Asserted Socially

ValidatedVerified

✓Pseudonymous

Page 70: Identity 101: Boot Camp for Identity North 2016

?Anonymous

One Site Multi-SiteSelf-Asserted Socially

ValidatedVerified

✓Pseudonymous

Page 71: Identity 101: Boot Camp for Identity North 2016

?Anonymous

One Site Multi-Site

Self-Asserted SociallyValidated

Verified

✓Pseudonymous

http://www.identitywoman.net

Page 72: Identity 101: Boot Camp for Identity North 2016

?Anonymous

One Site Multi-SiteSelf-Asserted Socially

ValidatedVerified

✓Pseudonymous

✓✓

Limited Liability Persona

Page 73: Identity 101: Boot Camp for Identity North 2016

Big Picture ID Resources

Page 74: Identity 101: Boot Camp for Identity North 2016

Identity is social. Identity is subjective. Identity is valuable. Identity is referential. Identity is composite. Identity is consequential. Identity is dynamic. Identity is contextual. Identity is equivocal.

OECD Paper At a Crossroads: "Personhood” and the Digital Identity in the Information Society

Properties of Identity

Page 75: Identity 101: Boot Camp for Identity North 2016

1. User Control and Consent 2. Limited Disclosure for Limited Use 3. The Law of Fewest Parties 4. Directed Identity 5. Pluralism of Operators and Technologies 6. Human Integration 7. Consistent Experience Across Contexts

by Kim Cameron - https://www.identityblog.com/?p=354

Laws of Identity

Page 76: Identity 101: Boot Camp for Identity North 2016

Questions & Answers

Conclusion

Kaliya “Identity Woman” Young

kaliya [at] identitywoman.net