Here's a more formal write up the use cases that I posted to the list just before the BOF. They cover all the browser based 'Eliot's Dad' scenarios that have
been on the list in the past week.

I've also written up a set of scenarios from Dick Hardt that cover various kinds
of claims usage. The focus on these is the moving around of the claims,
rather than the claims themselves.

I've not documented Lisa and Rob's non-browser based use cases for DIX
over HTTP and other protocols, as I'm not necessarily familiar enough with
each case to do them justice. I would however encourage the group to
write them up though. Volunteers?

There seem to be strong opinions on whether we should or should not
be considering non-browser based applications. My opinion is that we
have enough of a challenge agreeing on a protocol for browser based
applications. I'd propose that we deal with supporting this over browsers
now and reserve non-browser based applications for future consideration.

Comments/Additions/Deletions for the following draft please.

John





Network Working Group                                        J. Merrells
Internet-Draft                                             Sxip Identity
Expires: September 29, 2006                               March 28, 2006


                 Digital Identity Exchange - Use Cases
                    draft-merrells-use-cases-00.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on September 29, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   This document describes the motivating use cases for DIX, the Digital
   Identity Exchange protocol.










Merrells               Expires September 29, 2006               [Page 1]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Table of Contents

   1.  Requirements notation  . . . . . . . . . . . . . . . . . . . .  3
   2.  Definitions  . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Use Cases  . . . . . . . . . . . . . . . . . . . . . . . . . .  5
     3.1.  UC1  . . . . . . . . . . . . . . . . . . . . . . . . . . .  5
     3.2.  UC2  . . . . . . . . . . . . . . . . . . . . . . . . . . .  5
     3.3.  UC3  . . . . . . . . . . . . . . . . . . . . . . . . . . .  5
     3.4.  UC4  . . . . . . . . . . . . . . . . . . . . . . . . . . .  5
     3.5.  UC5  . . . . . . . . . . . . . . . . . . . . . . . . . . .  5
     3.6.  UC6  . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     3.7.  UC7  . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     3.8.  UC8  . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     3.9.  UC9  . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
     3.10. UC10 . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
     3.11. UC11 . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
     3.12. UC12 . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
     3.13. UC13 . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
     3.14. UC14 . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
     3.15. UC15 . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
     3.16. UC16 . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
     3.17. UC17 . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     3.18. UC18 . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     3.19. UC19 . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     3.20. UC20 . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     3.21. UC21 . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     3.22. UC22 . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     3.23. UC23 . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     3.24. UC24 . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     3.25. UC25 . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     3.26. UC26 . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     3.27. UC27 . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
   4.  Security Considerations  . . . . . . . . . . . . . . . . . . . 10
   5.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 10
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 11
   Intellectual Property and Copyright Statements . . . . . . . . . . 12















Merrells               Expires September 29, 2006               [Page 2]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


1.  Requirements notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].














































Merrells               Expires September 29, 2006               [Page 3]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


2.  Definitions

      Digital Identity - The transmission of digital representation of a
      set of Claims made by one Party about itself or another Digital
      Subject, to one or more other Parties.

      Identity Agent - An agent acting on behalf of the user.

      Identifier - An identifying attribute for a set of attributes.

      Identity Data / Identity Information - A set of attributes.

      Claim - An assertion made by a Claimant of the value or values of
      one or more attributes of a Digital Subject, typically an
      assertion which is disputed or in doubt.

   Definitions drawn from the lexicon of 'The Identity gang'.
   [identitygang].

































Merrells               Expires September 29, 2006               [Page 4]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


3.  Use Cases

   The use cases below describe various scenarios for the Digital
   Identity Exchnage (DIX) protocol [dmd0].  Some use cases are
   dependant upon others, so should be perused in order.  Beth is our
   protagonist throughout; a typical Internet user, but she's a bit of a
   geek.

3.1.  UC1

   Beth receives an email from a friend introducing her to a new
   website, geeknews.com, a site that publishes techie news articles.
   She browses the site and decides to read some articles.  She sees an
   IN button, which she clicks.  Her identity agent performs an
   authentication process to ensure that it is representing Beth, and
   not an imposter.  Her identity agent displays a screen informing her
   that geeknews.com is requesting some data, her first name.  She
   enters 'Beth' at the prompt, provides consent and the data is sent to
   the site.

3.2.  UC2

   Beth browses to geekdate.com, she clicks an IN button.  Her identity
   agent displays a screen informing her that geekdate.com is requesting
   some data, her first name.  Her agent already has this data.  She
   provides consent and the data is sent to the site.

3.3.  UC3

   Beth decides to create a profile at geekdate.com.  She sees an IN
   button, which she clicks.  Her identity agent displays a screen
   informing her that geekdate.com is requesting some data, an
   Identifier.  She instructs her identity agent to create an identifier
   specific to her relationship with geekdate.com.  She provides consent
   and the data is sent to the site.

3.4.  UC4

   Beth decides to flesh out her profile at geekdate.com.  Geekdate.com
   displays a registration form.  One field requests a URL of a photo of
   her.  Beside it is a SAVE button.  She enters the URL and clicks the
   button.  Her identity agent displays a screen informing her that this
   data item can be stored.  She provides consent and the data is stored
   by her agent.

3.5.  UC5

   Geeknews.com offers Beth the option to build up a readership



Merrells               Expires September 29, 2006               [Page 5]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   preferences profile over time, the benefit being that the site will
   tailor its content to her interests.  She decides to take up the
   offer, she sees an IN button, which she clicks.  Her identity agent
   displays a screen informing her that geeknews.com is requesting some
   data, an Identifier.  She selects an existing identifier that
   represents a subset of her identity, which is used for a subset of
   the sites she has a relationship with.  She provides consent and the
   data is sent to the site.

3.6.  UC6

   [Assumptions: Beth has visited geeknews and geekdate before and has
   informed her identity agent that she consents to a relationship with
   them.]  Beth starts her day with a strong coffee and a perusal of
   geeknews.com.  She starts her computer and authenticates herself to
   the operating system.  By that authentication mechanism she has also
   authenticated herself to her identity agent, as her vendor of that
   system has hooked it into the operating system's authentication
   system.  She browses to geeknews.com and clicks the IN button and is
   directly shown the content, no further clicks.  She then browses to
   geekdate.com, she clicks the IN button and is directly presented with
   her profile no further clicks.

3.7.  UC7

   Beth's identity agent prompts her to provide a 'spoken name'.  Using
   the multimedia capabilities of her computer she records her spoken
   name; an mp3 of her saying 'Beth'.  She later browses to
   voicebox.com, which runs a voicemail service, she opts to create an
   account and the site requests some properties, amongst which is a
   request for her spoken name.  She provides consent and the data is
   sent to the site.

3.8.  UC8

   Beth purchases a book from an online store, as she's checking out the
   store makes her an offer: 10% off for completion of a demographic
   survey.  She's tempted, but how many data fields are there?  One
   hundred!  Too many to be worth the effort.  But it happens to be
   commonly requested data, which she has already entered during
   previous exchanges with other sites.  So, she completes the remaining
   fields, saving them to her identity agent for future reuse.  She
   provides consent and the data is sent to the site.

3.9.  UC9

   Beth has invested significant effort in building up a persona and
   reputation around a specific identifier, her 'home' identifier.  But,



Merrells               Expires September 29, 2006               [Page 6]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   she has become dissatisfied with her identity agent and so decides to
   switch vendors.  She establishes the new agent and migrates her
   identity data from the old one to the new one.  She then administers
   her identifier so that her new identity agent is authoritative for
   authentication and provision of identity data.

3.10.  UC10

   Whilst in town Beth stops off at an Internet Cafe to check her email.
   She goes to her webmail account, which requires that she identity
   herself.  Her Identity Agent prompts her for consent and provides her
   identifier so that she can gain access to her email.

3.11.  UC11

   Beth visits a website that requests some identity information.  Her
   Identity Agent warns her that satisfying the request would contravene
   her established privacy policy.

3.12.  UC12

   Beth moves house, so she changes the home address information stored
   by her Identity Agent.  Her Identity Agent offers to notify all
   relying parties to whom she has previously provided her home address.

3.13.  UC13

   Beth is a frequent traveler on Galactic Air, whose site offers a
   claim of membership for use at affiliate sites.  She acquires a
   membership claim, which her Identity Agent stores for her.

3.14.  UC14

   Beth visits a Galactic Air affiliate site that provides discounted
   travel insurance for frequent travelers.  She presents her Galactic
   Air membership claim and receives a discount.

3.15.  UC15

   Beth leaves work and goes to the bus stop.  Whilst waiting for the
   next bus home she uses her smart phone to browse geeknews.com.  Her
   Identity Agent provides her with the same clickless browsing that she
   experiences on her work and home computers.

3.16.  UC16

   Beth is ending her day at work.  She leaves work and waits for the
   next bus home.  Her friend calls and invites her to the movies.  She



Merrells               Expires September 29, 2006               [Page 7]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   uses her phone to browse to the movies.com to find out what's
   playing.  The site requests her current location, which she consents
   to release via her Identity Agent.

3.17.  UC17

   Beth signs up with a financial services site, BigPicture.com, which
   provides an aggregate view of her finances.  She provides the site
   with agency rights over each of her existing bank accounts.

3.18.  UC18

   Beth goes to an auction side, ibay.com.  Her Identity Agent shows a
   signed graphic of ibay.com for releasing data.  Beth knows that she's
   dealing with ibay.com, and not an imposter.

3.19.  UC19

   Beth visits her online bank, which requires the use of a strong
   authentication mechanism.  She authenticates to her Identity Agent
   using a two-factor device indicated by the bank to be an acceptable
   mechanism.

3.20.  UC20

   Adam uses a service to acquire a verified email claim.  With it he
   can prove that he owns his email address, [EMAIL PROTECTED], without
   having to go through a verification process.

3.21.  UC21

   Beth gives her friend, [EMAIL PROTECTED], access to her photos.  Adam
   receives an email from Beth inviting him to view her photos.  He goes
   to the site, which requests a verified email claim.  He presents his
   claim and gains access to the photos Beth has published for him.

3.22.  UC22

   Adam visits a site that requires that he prove he is over 21.  He
   provides the site with a claim that he is over 21 from the government
   of his country of residence, gov.ca.  The site is unable to find out
   who Adam is from gov.ca.

3.23.  UC23

   Adam returns to the same site.  He must again prove that he is over
   21.  He provides a claim, but the site cannot tell that it is Adam
   that has returned again to the site.



Merrells               Expires September 29, 2006               [Page 8]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


3.24.  UC24

   Adam heavily frequents two gambling sites, goldenslots.com and
   luckydice.com.  He uses the same identifier accross both sites, so
   that they know he is the same person.

3.25.  UC25

   Beth's employer has partnered with a local university to provide it's
   staff with access to online courses.  She signs up for some modules
   at the university admissions website acquiring an enrollment claim.
   She then browses to the computer science school website to sign up
   for an advanced programming course.  The site requests claims that
   she is an employee, that she has previously completed some basic
   introductory modules, and that she has been enrolled.

3.26.  UC26

   Beth is shopping online for a new laptop computer.  She visits an
   online site that caters to recently graduated professionals.  She
   selects a machine and investigates the lease options available.  To
   work out the monthly payment the site requests some claims: A claim
   that she's an alumni of a university, so that the site can include an
   appropriately branded tote bag.  A claim that she's a member of
   Galactic Air, so that she can be credited with airmiles for her
   purchase.  And, a claim from a credit scoring agency that she has a
   'good' credit rating.

3.27.  UC27

   Beth is at home checking her work email, she has an email from a
   colleague assigning a customer support issue to her.  The company
   help desk system is provided by helpdesk.com, an on-demand
   application provider.  She clicks through a link in the email to the
   page that describes the issue.  Helpdesk.com requests a claim that
   Beth is an employee of 'Nano Software Inc', which she provides from
   her Identity Agent, and she gains access to the page.














Merrells               Expires September 29, 2006               [Page 9]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


4.  Security Considerations

   None.

5.  References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [dmd0]     Merrells, J., "draft-merrells-dix-00.txt", March 2006.

   [identitygang]
              The Identity Gang, "http://identitygang.org/Lexicon";,
              March 2006.





































Merrells               Expires September 29, 2006              [Page 10]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Author's Address

   John Merrells
   Sxip Identity
   798 Beatty Street
   Vancouver, BC  94110
   Canada

   Email: [EMAIL PROTECTED]
   URI:   http://sxip.com/









































Merrells               Expires September 29, 2006              [Page 11]

Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   [EMAIL PROTECTED]


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Merrells               Expires September 29, 2006              [Page 12]


_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to