Reworked to take into account the comments received so far. There's
still a
couple of outstanding comments... and am waiting for those threads to
close
out... today I hope :-)
John
----
Proposed Charter for DIX Working Group
Digital Identity Exchange - DIX
Chairs
TBD
Applciations Area Director(s):
Ted Hardie <[EMAIL PROTECTED]>
Scott Hollenbeck <[EMAIL PROTECTED]>
Mailing Lists:
General Discussion: [email protected]
To Subscribe: [EMAIL PROTECTED]
In Body: In Body: subscribe
Archive: http://www.ietf.org/mail-archive/web/dix/
Description of Working Group:
The DIX group will work on the specification of the Digital Identity
Exchange protocol. DIX is an Internet scale protocol for exchanging
identity information between endpoints. The protocol architecture
maintains a separation of control between all parties of the exchange
and supports both compartmentalized and anonymous identities.
Problem Statement
The success of the Internet has led to a multitude of online
information sources and services. A consequence of this has been the
increasing demand for users to identify themselves and to provide
information about them. The user is currently bearing the burden of
managing their authentication credentials and is repeatedly having to
provide their identity information. For example, signing in to web
pages and completing user registration forms.
Goal
The goal of this group is to specify a protocol for moving identity
information between parties and a system architecture that enables
the development of software agents to manage the exchange of a user’s
identity information.
Method
An identity information exchange should involve just three parties:
the user, their agent, and a relying party. The user’s agent is where
they authenticate themselves and a repository where they store their
identity information, and the relying party is an entity requesting
identity information.
The protocol should be both simple and secure. Simple meaning that
minimal modifications should be required to the user’s software and
the relying party’s software to participate in an identity
information exchange. The protocol should be inherently scalable,
requiring no centralized services, beyond those that already exist,
in order to operate.
The security of a protocol is well understood within the IETF to be
the assurance of confidentiality and integrity of any transferred
information. But, in the context of digital identity we wish to also
be assured that user’s agents and relying parties maintain user privacy.
Any solution should support multiple transport layers, including, but
not limited to: HTTP, SOAP, XMPP, and SIP. It is anticipated that
this working group will initially focus on a HTTP based solution.
In moving identity information between parties it is expected that
the messages of the protocol will include elements that bind property
names and values to digital identities. How a digital identity is
referred to is an important consideration. The properties an
identifier could have are that it allows the user to concurrently
maintain multiple personas, that it could allow for a separation
between the digital identity and the identifier and that it allow for
separation between the identifier and the user’s agent. In the
interests of flexibility and interoperability we would suggest that
the identifier be a string of characters. This working group may
consider current best practice of what that string might be. For
example, a URI, a URL or a UUID.
Work In Scope
A user-centric, simple, secure, interoperable protocol for digital
identity information exchange.
An advanced work item for this working group would be consideration
of how this protocol could operate over web services protocols (e.g.
SOAP, XML-RPC, REST), or interoperate with existing web services
protocols for security information (e.g. WS-Trust). The group must be
careful not to preclude interoperation at a later date.
Although the data that represents the identity information is
expected to be opaque it is worth mentioning that the data could be
raw attributes of the digital identity, or could be third party
claims. A third party claim is signed by an authoritative source so
that the relying party can be assured of its authenticity. The
benefit of third party claims, as supported by this protocol, is that
the separation of claim acquisition from claim presentation provides
both scalability and privacy benefits.
Out of Scope
How to federate identity namespaces.
How to manage digital certificates or certification authorities.
The mechanisms by which authentication and authorization are performed.
The schema and type system for identity information.
Internet Drafts
The Working Group anticipates the authoring of at least three
Internet Drafts, two of which are expected to be Standards Track
documents.
DIX Use Cases – A catalogue of DIX protocol use cases to illustrate
the problem being solved and to inform the decision making of the
Working group. For example, an illustrative use case would be a
website that accepts user generated content. A significant problem
exists today that these sites attract the attention of spammers. The
DIX protocol would allow that website to determine the identity of
the submitter. A potential solution to the spam problem would be for
the website to check that the submitter is of good standing in their
community. In other words, the website would request the reputation
of the submitter. The DIX protocol would allow that reputation data
to be built up, aggregated, and moved between around.
DIX Protocol – A description of the DIX protocol.
DIX HTTP Transport Binding – How the DIX protocol will be mapped down
onto HTTP as a transport layer. In this case the user’s software is a
HTTP client, to which no modifications should be required, and the
relying party would be a HTTP server. Continuing with the theme of
simplicity a HTTP server should require minimal changes to support
identity information exchange. For example, a HTML form could receive
information the same way that a user would provide it, as if they
typed it into the form themselves.
Goals and Milestones:
March 2006 – BOF meeting
April 2006 – DIX Use Cases Internet Draft
June 2006 – First DIX Protocol Internet Draft
June 2006 – First DIX HTTP Transport Binding Internet Draft
July 2006 – Working Group meeting
November 2006 – Working Group meeting
December 2006 – Request Last Call for DIX Protocol
December 2006 – Request Last Call for DIX HTTP Transport Binding
March 2007 – Working Group meeting
April 2007 – Submit DIX Protocol to IESG for consideration as
Proposed Standard
April 2007 – Submit DIX HTTP Transport Binding to IESG for
consideration as Proposed Standard
_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix