Portable Identity Information and Interoperable Credentials: How will we shift the burden of complexity away from your mom’s keyboard?

Often-cited target states for federated identity and credential solutions include statements like: "Credentials must be interoperable"; "Identity Information must be portable"; "Users must have choice in number, type and source of credential"; "User must have control over disclosure and use of identifying information"; "Usage of credential must not be traceable back to the user, if … Continue reading Portable Identity Information and Interoperable Credentials: How will we shift the burden of complexity away from your mom’s keyboard?

ID Information Originators and Aggregators – If an RP can sue, should they care about Certification?

Warning: this post is loaded with jargon! Read at your own risk! In the Kantara Initiative Identity Assurance Working Group today, we were discussing elements and patterns needed in the model for the credential-identity separation. Spent lots of time discussing the idea of a "Information Originator" versus a "Identity Aggregator" (not in the sense of … Continue reading ID Information Originators and Aggregators – If an RP can sue, should they care about Certification?

Evolution of a Trusted Identity Model

In the Fall of 2012, I led the development and publication of a discussion paper for the Kantara Initiative Identity Assurance Working Group. The paper explored the concept of a general model for the Credential Provider - Identity Provider - Online Service Provider architecture. I identified several abstract Roles, Actors, Functions and Relationships that appeared … Continue reading Evolution of a Trusted Identity Model