the laws of identity and cardspace

20
The Laws of Identity and Cardspace Charles Young Solidsoft

Upload: melvyn

Post on 09-Feb-2016

21 views

Category:

Documents


0 download

DESCRIPTION

The Laws of Identity and Cardspace. Charles Young Solidsoft. CardSpace. Embodies Kim Cameron’s ‘Laws of Identity ’ Universal identity systems Supports the Identity Metasystem. The Identity Meta-what???. The Identity Meta-system - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The Laws of Identity  and  Cardspace

The Laws of Identity and Cardspace

Charles YoungSolidsoft

Page 3: The Laws of Identity  and  Cardspace

The Identity Meta-what???

• The Identity Meta-system– A single identity ‘fabric’ supported by many

different technologies– A system of systems– …so standards are important here!!

Page 4: The Laws of Identity  and  Cardspace

Yes, but what is an identity?

• It’s a list of claims about an entity– Entities….that’s me and you!– My name is Charles– I work for Solidsoft– My email address is….• …well, that would break laws 2 and 3

Page 5: The Laws of Identity  and  Cardspace

Law 1: User Control and Consent

• Only reveal information with the user’s consent– It’s their identity, after all

Page 6: The Laws of Identity  and  Cardspace

Law 2: Minimal disclosure for a defined use

• Disclose as little identifying information as possible

• Limit the use of identifying information as much as possible

• Helps build stable long-term solutions.

Page 7: The Laws of Identity  and  Cardspace

Law 3: Justifiable Parties

• Don’t disclose identifying information to a party that cannot ‘justify’ itself.– All parties must identify themselves– Establish trust relationships

Page 8: The Laws of Identity  and  Cardspace

Law 4: Directional Identity

• Omni-directional–Publicly broadcast your identity – ‘Look at me everyone! Here I am. It’s me.’

• Uni-directional–Privately assert your identity– ‘Psst…It’s me. The password is ‘Cardspace’.

Let me in.’• Identity systems must support both.

Page 9: The Laws of Identity  and  Cardspace

Law 5: Pluralism of operators and technologies

• If it’s Microsoft-only, its useless!• …but seriously…– The Identity meta-system MUST NOT be

bound to proprietary solutions and technologies–Different cultures–Different contexts

Page 10: The Laws of Identity  and  Cardspace

Law 6: Human Integration

• Humans are first-class components if the identity meta-system (duh)

• Unambiguous human-machine communication

• Machines don’t attack you – humans do.

Page 11: The Laws of Identity  and  Cardspace

Law 7: Consistent experience across contexts

• ‘Thingify’ your identities• Consistency shines the spotlight on attackers

Page 12: The Laws of Identity  and  Cardspace

Cardspace Actors: Subjects

SubjectsIndividuals and other entities about whom claims are made

Page 13: The Laws of Identity  and  Cardspace

Cardspace Actors: Relying Parties

Relying PartiesRequire identities

SubjectsIndividuals and other entities about whom claims are made

Page 14: The Laws of Identity  and  Cardspace

Cardspace Actors: Identity Providers

Relying PartiesRequire identities

SubjectsIndividuals and other entities about whom claims are made

Identity ProvidersIssue identities

Page 15: The Laws of Identity  and  Cardspace

• Reason over your identities• Smart selection

The Cardspace Identity Selector

Page 16: The Laws of Identity  and  Cardspace

Service Provider Requests Identity

CardSpace Identity Selector pops up

Token is built by Identity Selector(with Identity Provider)

Token sent to client

Output sent to client

The Cardspace Logon process

Page 17: The Laws of Identity  and  Cardspace

Contains self-asserted claims about meStored locallyUse instead of username/password

SELF - ISSUED

Information Card Types

Page 18: The Laws of Identity  and  Cardspace

Provided by banks, stores, government, clubs, etc.Claims stored at Identity Provider and sent only when card submitted

MANAGED

Information Card Types

Page 19: The Laws of Identity  and  Cardspace

• Cards contain metadata only!• Cardspace can handle any claims tokens– SAML tokens are most common

• Cardspace uses WS-* standards

Cards and standards

Page 20: The Laws of Identity  and  Cardspace

Call to action

• Cardspace-enable your web sites– Relying parties

• Invest in Secure Token Server technology– Identity providers

• Spread the word.