OK, I just had a long plane ride, so I dumped all my thoughts about the above into a single message. The problem statement is actually from the most recent draft of the proposed charter. Everything else came from reading through all the DIX messages and from my head. I hope that it represents our collective thoughts... but I'm sure it doesn't and so I'm sure you'll be letting me know. :)

John

----


Problem Statement

The Internet is host to many online information sources and services. There is a growing demand for users to identify, and provide information about themselves. Users bear the burden of managing their own authentication materials and repeatedly providing their identity information. Signing in to web pages and completing user registration forms is an example.

Goals
Benefit Internet Users
Protocol adoption

Benefits

Benefits to the End User
Browsing Efficiency – Reuse of Identity Data and authentication
Browsing Efficiency – Consistency of User Experience for providing data
Reuse of Identity Data – Less data entry
Reuse of Authentication – Single Sign-On
Reuse of an Identifier – Persona and reputation building
Security – Consistent user experience
Security – Stronger authentication more viable
Privacy – Choice over what is stored where and released to whom
Privacy – Choice over the degree of relationship with a site: anonymous, pseudo-anonymous, or public. [todo: see terms in Ben’s referenced document.] Reuse of Verification Processes – By moving third-party claims between authority and site

Benefits to the Website Operator
Data quality, quantity, and richness.
Lower latency in workflows for verifying self asserted data.
Higher conversion rates

Requirements

Requirements for Benefits Goal
Presentation of identity data from user to site
Storage of identity data from site to user
Identifier scheme enables individual to aggregate data
Identifier scheme enables individual to create one-to-one relationships
Authentication that the user owns an identifier
Separation of identifier from information storage
User choice of what information is released to whom
No predetermined relationship between the site and the Identity Agent
No need to provide identifier with the identity data.
No need for the site to store the identity data between sessions
Separation of authentication from resource

Requirements for Adoption Goal
Meets the ‘Seven Laws of an Identity Architecture’
Zero code on the browser at a minimum
Minimal Website code
Works with existing Website code
Secure
Extensibility
Reuses existing technology

Definitions

Beth – Our protagonist and a typical Internet user, but she’s a bit of a geek.

Identity - Ben quotes from ‘Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology’: “An identity is any subset of attributes of an individual which identifies this individual within any set of individuals. So usually there is no such thing as "the identity", but several of them.” http://dud.inf.tu-dresden.de/ Anon_Terminology.shtml

Digital Identity – Kim’s definition from ‘The Identity Gang’. “The digital representation of a set of Claims made by one Party about itself or another Digital Subject.”

Digital Identity – Bob’s rewrite of the above. “The transmission of digital representation of a set of Claims made by one Party about itself or another Digital Subject, to one or more other Parties.”

Identifier – an identifying attribute for a set of attributes.

Identity Data – a set of attributes

Identity Agent – An agent acting on behalf of Beth.

Use Cases

The use cases describe various scenarios to illustrate the benefits of solving this problem. Some use cases are dependant upon others, so should be perused in order.

1) Beth receives an email from a friend introducing her to a new website, geeknews.com, a site that publishes techie news articles. She browses the site and decides to read some articles. She sees an IN button, which she clicks. [Insert step 1.1, called out as it’s reused in many use cases.] Her identity agent displays a screen informing her that geeknews.com is requesting some data, her first name. She enters ‘Beth’ at the prompt, provides consent and the data is sent to the site. [Benefits: Choice of what is stored where and released to whom. Benefits: Consistent User Experience – She sees her agent’s user interface every time she is asked for information.]

1.1) Her identity agent performs an authentication process to ensure that it is representing Beth, and not an imposter. The authentication mechanism used is implementation dependent. The identity agent may provide the benefit of caching the authentication for the duration of Beth’s internet browsing session. [Benefit: Reuse of authentication, when coupled with other aspects provides single sign-on.]

2) Beth browses to geekdate.com, she clicks an IN button. [1.1] Her identity agent displays a screen informing her that geekdate.com is requesting some data, her first name. From [1] her agent already has this data. She provides consent and the data is sent to the site. [Benefit: Less data entry. Benefit: Reuse of identity data. Benefit: Quality data.]

3) Beth decides to create a profile at geekdate.com. Geekdate.com displays a registration form. One field requests a URL of a photo of her. Beside it is a SAVE button. She enters the UTL and clicks the button. [1.1] Her identity agent displays a screen informing her that this data item can be stored. She provides consent and the data is stored by her agent. [Benefit: Reuse of Identity Data. Benefits: Enabled stateless sites that request the data they need for each session. Benefit: Persona building. Benefit: Choice of what is stored where.]

4) Geeknews.com offers Beth the option to build up a readership preferences profile overtime, the benefit being that the site will tailor its content to her interests. She decides to take up the offer, she sees an IN button, which she clicks. [1.1] Her identity agent displays a screen informing her that geeknews.com is requesting some data, an Identifier. See takes options 4.1 or 4.2. She provides consent and the data is sent to the site. [Benefit: Reuse of authentication - Beth doesn’t have to remember account details, such as username and password, for the site. Benefit: Reputation building.]

4.1) Her identity agent creates an identifier specific to her relationship with geeknews.com. [Benefit: Privacy – Choice over degree of relationship. Uni-directional identity guards against the site correlating the data it aggregates about the identifier with other parties beyond this relationship. ]

4.2) She selects an existing identifier that represents a subset of her identity, which is used for a subset of the sites she has a relationship with. [Requirement: Multiple Identifiers for a person. Benefit: Privacy – Choice over degree of relationship. Compartmentalization of identity. Easier management of identity data. Benefit: Persona building.]

5) [Assumptions: Beth has visited geeknews and geekdate before and has informed her identity agent that she consents to a relationship with them.] Beth starts her day with a strong coffee and a perusal of geeknews.com. She starts her computer and authenticates herself to the operating system. By that authentication mechanism she has also authenticated herself to her identity agent, as her vendor of that system has hooked it into the operating system’s authentication system. She browses to geeknews.com and clicks the IN button and is directly shown the content, no further clicks. She then browses to geekdate.com, she clicks the IN button and is directly presented with her profile no further clicks. [Benefits: Separation of authentication from resource and reuse of authentication provides single sign-on across multiple sites.]

6) Beth’s identity agent prompts her to provide a ‘spoken name’. Using the multimedia capabilities of her computer she records her spoken name; an mp3 of Beth saying ‘Beth’. She later browses to voicebox.com, which runs a voicemail service, she opts to create an account and the site requests some properties, amongst which is a request for her spoken name. [Benefits: Richer Data.]

7) Beth purchases a book from an online store, as she’s checking out the store makes her an offer: 10% for completion of a demographic survey. She’s tempted, but how many data fields are there? One hundred! Too many to be worth the effort, but it’s commonly requested data and she has already submitted most of the data during previous exchanges with other sites. She completes the remaining fields, saving them to her identity agent for future reuse. [Benefit Reuse of data. Benefit: More data for the site.]

8) Beth has invested significant effort in building up a persona and reputation around a specific identifier, her ‘home’ identifier. But, she has become dissatisfied with her identity agent and so decides to switch vendors. She establishes the new agent and migrates her identity data from the old one to the new one. She then administers her identifier so that her new identity agent is authoritative for authentication and provision of identity data. [Benefit: Choice of Identity Agent - Separation of identifier from information storage.]

Benefits in Detail

For the End User

The browsing experience is more seamless for the end user as their identity data at their identity agent can be reused for automatic form completion, and the consistent user experience of data entry makes data entry more familiar.

By reusing an identifier across multiple relationships the user can build up a reputation around that identifier, which could be parlayed into preferential treatment and privileged access.

An identity agent can provide for authentication reuse across multiple identifiers and multiple sites, providing the end user with a single sign-on experience.

Security against identity data theft can be provided to the user through a consistent user experience, as the user is less likely to be fooled by a fake site, as is commonly used in phishing attacks.

Security can also be enhanced by identity agents that provide stronger forms of authentication mechanisms, such as two-factor devices. This solution makes these more expensive mechanisms more viable as the cost is amortized across all the sites that consume authentication claims from the agent.

Individual privacy is enhanced in a number of ways. The user has choice over the degree of relationship they have with a site: anonymous, pseudo-anonymous, or public. The user also has choice over what data is stored where and released to whom. The automated presentation of data means that a site need no longer store identity data between sessions, thus reducing the risk of a security breach at the site revealing identity data. [todo – this is probably an essay better written by Ben.]

By supporting the movement of third-party claims between authority sites and a relying party verification processes can be reused. For example, a site could request a claim of verified email, rather than verify the email address themselves, thus introducing latency into the workflow by having to wait or some out-of-band process to complete.

For the Website Operator

When website operators request a user complete a form they introduce a barrier to the user continuing that interaction. By automating data release and reusing identity data a site can ask for common data items without introducing a barrier, thus increasing the quantity of data acquired and improving conversion ratios.

Because the user can reuse their identity data across many sites they are more likely to maintain correct data, thus improving the quality of the data collected.

By not storing identity data between sessions a site can mitigate its risk of losing sensitive identity data and can ensure that the data it is operating with is up to date, rather than stale.

Since data provision is automated identity data items that would not or could not normally be asked of a user can be requested. For example, long URLs, an image, or an audio clip.

By supporting the movement of third-party claims between authority sites and a relying party verification processes can be reused.






_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to