Warning: this post is loaded with jargon! Read at your own risk! In the Kantara Initiative Identity Assurance Working Group today, we were discussing elements and patterns needed in the model for the credential-identity separation. Spent lots of time discussing the idea of a "Information Originator" versus a "Identity Aggregator" (not in the sense of … Continue reading ID Information Originators and Aggregators – If an RP can sue, should they care about Certification?
Author: Andrew Hughes
I am exploring the world of mobile digital credentials and trusted identity information management. The internet is changing as authentic identity becomes engrained in risk management equations for online services. My background is in IT security, identity information management, Government IT and systems thinking. My goal for the moment is to find patterns and order in the chaos as new paradigms and architectures for privacy-protective solutions evolve. It's going to be a wild ride.
Evolution of a Trusted Identity Model
In the Fall of 2012, I led the development and publication of a discussion paper for the Kantara Initiative Identity Assurance Working Group. The paper explored the concept of a general model for the Credential Provider - Identity Provider - Online Service Provider architecture. I identified several abstract Roles, Actors, Functions and Relationships that appeared … Continue reading Evolution of a Trusted Identity Model
next up: Evernote! ‘the hackers just st
next up: Evernote! 'the hackers just stole the hashes but don't worry they'll never crack them' forced system-wide reset just in case
