thank you bob for the clarifications and the history lesson. for the first time in the long mailing list discussion i got the impression that i understand what people want to accomplish ...

John Merrells wrote:

Bob's thoughts....

Begin forwarded message:

From: "RL 'Bob' Morgan" <[EMAIL PROTECTED]>
Date: November 9, 2005 3:05:14 PM PST (CA)
To: IETF DIX list <[email protected]>
Subject: [dix] thoughts on "identity" and IETF


I have been somewhat involved in recent discussions regarding "identity" (see http://www.identitygang.org/ and a zillion other blogs and links), as well as a long-time IETF participant, so let me toss out a brief personal view of what's going on here in hopes it may provide context useful for some folks.

Let me say up front that I don't necessarily agree with all the positions I describe below, but am trying to express what many people are saying and thinking.

Many protocols developed in the IETF have served the needs of what Dick Hardt calls "Identity 1.0", which might be characterized less flamboyantly as "enterprise identity management". This term includes several rather different technologies and processes, all in support of the ability for the owners of services to control who does what with their computing resources. I use the word "enterprise" above intentionally, to reflect the fact that traditionally the parties with interest and ability to control access to resources have been organizations, usually large ones.

So, for example, the domain of use of the IETF's LDAP protocol is large directories containing entries for many users, operated by IT staff in organizations that have an interest in the users whose info is in those entries, and the applications that use those directories. The domain of use of the IETF's Kerberos protocol is similarly organizations with an interest in secure authentication to a set of apps relying on an organizational KDC. Similar broad- brush characterizations could be made of PKIX, TLS, SASL, features like HTTP Basic/Digest authentication, probably other protocols and features.

Note that the scope of "identity" here includes several things. One is maintenance of information about a person (or other entity), including not just userid and password but potentially lots of other information relevant to authorization, contact, perhaps other purposes. Another is authentication, ie how a service knows "the identity" of a client. Another is exchange of identity information between parties, both at authentication time and at other times.

Out in the world most people's experience of the Internet is of course the Web, and most people's experience of "Identity 1.0" has been via account setup and login to a vast array of web-based services managed by organizations large (mostly) and small. There have been some non-IETF standard/spec activities that attempt to address the widely-observed usability problem of people having too damn many usernames/passwords to remember, as well as security problems based on that stuff. Perhaps the main one is the OASIS- published SAML standard, which specifies how to do web sign-on and attribute exchange. A somewhat similar activity is WS-Federation, part of the WS-* spec set. These have been called "Identity 1.5" because they permit some organizations to rely on other organizations' identity management services, but the use cases driving the designs are still organization-oriented.

So is there something missing in the above stuff, some new requirements requiring new stuff, ie "Identity 2.0"? I think the people who say there is are motivated by the huge number of new things that have happened on the web in the last few years. The center of this is the blogging phenomenon. Maybe 20 million people are now blogging. They're doing other things like putting lots of photos online at Flickr, keeping their bookmarks on del.icio.us, tracking tags on technorati, and zillions of other examples. They are composing these services in myriad ways to create new services. In sociological terms they are creating online identities for themselves that they feel much more attachment to than their organizational account, even their "my.foo.com" page at one of the traditional portal sites. In Identity 1.0 terms they are all becoming, or have an interest in becoming, both service providers and identity providers, that is, they have an interest in protecting their resources (in the canonical case of reducing blog spam), and in leveraging their personal info to their millions of peers.

So now in addition to the tens or hundreds of thousands of institutions with identity interest, there are tens of millions of individuals. Many people are trying to figure out what they need and respond to it. The SXIP technology is one among those, others are OpenID, LID, Passel, and no doubt many others. For the most part these approaches reject traditional identity management protocols and systems; whether they should or should not is one of the big questions. A key point is that the individual interest in identity is much more about expression, ie ease of sharing and discovery, than it is in control (ie, fancy security). Another key point is individual control, the same sort of control people feel over their personal domain name and its site, or their blog. Even people who aren't radically anti-corporate like to feel in charge of their own stuff.

That's all I have time for now ...

 - RL "Bob"


_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix




_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix




_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to