On 25-Jan-06, at 9:25 PM, Hallam-Baker, Phillip wrote:

I think that there are two separate types of identity information that
need to be considered here:

1) Self asserted information (nickname, photo, email etc.)
2) Third party assertions (reputation, spamminess, star alliance gold
etc.)

The first type of information is not difficult to manage, the relying
party understands that the data is self asserted. Attribute value pairs
in any standard format work as well as anything.

The second type of information requires the reputation of the
information provider to be considered by the relying party.

I generally agree Phillip.

In the identity gang discussions we have called these claims instead of identity information. Identity having a vague meaning.

I see (2) requiring not only a trust relationship with the asserting party by the relying party (something that is social, not technical), but also a mechanism for the relying party to know it is a valid assertion, which requires some verification mechanism such as PKI.

-- Dick

_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to