SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Landscape of
 Web Identity Management
                                                                       Surveillance




                                                                                                                                                                                    User-centric
Data Protection
                                                                       RFID
                                                                                                                 Authentication                                                                                                                                         Credentials
                                                                                                                                                                                                         Aggregation




                                                                                                                                                                                                                                                                                    Data Protection
     Identity Theft




                                                                                                                                                                                                                                                                                             Transparency
            Claims




                      Tracking Confidentiality                                                                                                                                                        Access Control




                                                                                                                                    LBS
                      Attributes                                                Smartcards                                                                                                         Anonymity
                      Context-awareness




                                                                                                                                                                                                                 GPS
                                                                                                                                                                                                                              Loyalty
          Personalisation
          Cyber Security
                                                                                                                                                         Biometry                                                                       CRM
                                                                                                                                                         Policies                                                                       Privacy
                                                                                                                                                                  Profiling                                        Interoperability



                                                                                                                                                                               Technologies
                                                                                                                                                              Authorizing
                                                                                                                                                                 User



                                                            Use Ca
                                                              e Cases                                                                  Manage
                                                                                                                                       Ma

                                                                                                                                                                    Control
                                                                                                                                                                                                         Kantara - UMA 2012
                                                                                                                                                                                                         User-Managed Access is a protocol designed to give a web
                                                                                                                                                                                                         user a unified control point for authorizing who and what
                                                                                                                             Host                                                                        can get access to their online personal data (such as identity
                                                                                                                                             Protect         Authorization
                                                                                                                                       PEP             PDP                                    Delegate
                                                                                                                                                                                                         attributes), content (such as photos), and services
                                                                                                                                                               Manager
                                                                                                                           Protected                                                                     (such as viewing and creating status updates).
                                                                                                                           Resource                                                                                                                                            Shibboleth is an
                                                                       eGov
                                                                       eGov
                                                                        G       nt
                                                                       eGovernment                                                                                                                                                                                        Internet2 Middleware
                                                       ess
                                                       ess
                                                 eBusiness                                                                                                                                                                                                          Initiative project that has
                                                                                                                                                                                                                                                               created an architecture and
                                                                                                                                                                   Authorize
                                                                                                                                                                                                                                                          open-source implementation for
                                                                                                                                       Access                                                                                                              Identity management and federated
                                                                                                                                                                                                                                                            identity-based authentication and
                                                                                                                                                                                                                                                             authorization (or Access control)
                                                                                                                                                                                                                                                             infrastructure based on SAML.
                                                                                   mar
                                                                                   ma t
                                                                                    art
                                                                                 Smart                                                                                                                                              h
                                                                                                                                                                                                                           Shibbolet
                                                                                                                                                              Requester


                                                                                  ronments
                                                                                  ronments
                                                                                    nm
                                                                                     m
                                                                              Environments
                                               eHealth
                                                                                                                                                                             2.0 ect
                                                                                                             The OAuth 2.0 authorization proto-                                                                                                                  Identity Mixer (idemix) is an anonymous
                                                                                                             col enables a third-party application
                                                                                                                                                                                                                                 Ide                            credential system developed at IBM
                                                                                                             to obtain limited access to an HTTP
                                                                                                             service, either on behalf of a resource                    u th        n                                                    mix                    Research that enables strong authentica-

                                                                                                                                                                     OA          on
                                                                                                              owner by orchestrating an approval                                                                                                               tion and privacy at the same time. With
                                                           Social & Business                                                                                                   C                                                                              identity mixer, users can obtain from an
                                                                                                                                                                                                              C rd p
                                                                                                                                                                                                              CardSp




                                                                                                              interaction between the resource
                                                                                                                                                                                                              Hi




                                                                                                               owner and the HTTP service, or by                                                                                                             issuer a credential containing all the
                                    Corporate
                                            e
                                           te                  Networks                                                                                                              ID
                                                                                                                                                                                                               ig
                                                                                                                                                                                                         ve




                                                                                                               allowing the third-party application to                                                                                                     information the issuer is ready to attest
                                       IdM                                                                      obtain access on its own behalf.
                                                                                                                                                                                  en                                                                       about them. When a user later wants to
                                                                                                                                                                                                                  gi
                                                                                                                                                                                                                  gi




                                                                                                                                                                               Op
                                                                                                                 (The OAuth 2.0 Authoriza-                                                                                                                        prove to a service provider a state-
                                                                                                                                                                                                   U-Pro



                                                                                                                                                                                                                     ns




                                                                                                                  tion Protocol draft-ietf-                                                                                                                           ment about her, she employs
                                                                                                                                                                                                                      s




                                                                                                                   oauth-v2-25,                                                                                                                    Higgins –               identity mixer to securely
                                                                                                                    March 8,                    OpenID Connect                                                                                                                  transform the
                                                                                                                                                                                                                                                initiated 2003 – is
                                                                                                                                                                                                                        a e
                                                                                                                                                                                                                        ac e




                                                                                                                     2012)                 OpenID Connect (based
                                                                                                                                       on the OAuth 2.0 protocol) is                                                                         a framework that                        issued creden-
                                                                                                                                  a suite of lightweight specifications                                                                   enables users and enterprises to                 tial.
                                                                                                                             that provide a framework for identity                                                                      integrate identity, profile, and

                                         User Empowerment                                                                interactions via RESTful APIs. The simp-                                                                         relationship information across multi-
                                                                                                                           lest deployment of OpenID Connect                U-Prove is a                      Windows CardSpace            ple systems. Applications can use Higgins
                                                                                                                             allows for clients of all to request          cryptographic tech-                is Microsoft's client          to create a unified, virtual view of
                                                                                                                               and receive information about             nology that enables                  software for the Identity       identity, profile and relationship
                                                                                                                                 identities and currently               the issuance and pre-                 Metasystem (canceled in           information. A key focus of
                                                                                                                                    authenticated sessions.           sentation of cryptogra-                 Feb 2011). CardSpace                Higgins is providing a founda-
                                                                                                                                      (Implementer’s Draft,          phically protected claims                stores references to users'          tion for new "user-centric
                                                                              Privacy by Design                                          Feb. 14, 2012)            in a manner that provides
                                                                                                                                                                 multi-party security. The goal
                                                                                                                                                                                                              digital identities for them.
                                                                                                                                                                                                              Resistance to phishing attacks
                                                                                                                                                                                                                                                     identity" and personal
                                                                                                                                                                                                                                                       information
                                                                                                                                                               is to enable the exchange of                   and adherence to Kim                       management
                                                                                                                                                              verified identity information                    Cameron's "7 Laws of Identity”              applica-
                                                                              User-centric Services                                                         from sources (Claims Provider),
                                                                                                                                                           under the user’s control (via the
                                                                                                                                                                                                              were goals in its design. Windows
                                                                                                                                                                                                              CardSpace 2.0 will be extended to
                                                                                                                                                                                                                                                           tions.
                                                                                                                                                            U-Prove Agent), to the recipients                 use the U-Prove protocol.
                                                                                                                                                                 (Relying Party).
                                                                              Data Protection
                                                                              Context-awareness
                                                                              Identity Management                                                                             Threats
                                                                              Usable Security                                                            Identity Theft
                                                                                                                                                                                                         tamper
                                                                                                                                                         Surveillance

                                                                                                  In the future internet users
                                                                                                                                                         Profiling                                    misinform
                                                                                                 will be downloaded as apps.
                                                                                        en
                                                                                        t




                                                                             s    sm                                                                   deny                                 misuse
                                  Privacy Impact A                       sse                 Virtual identities
                                                                                           will be created dynamically
                      Compliance                                                                and context-aware.                                                              spy
                                                                                     The
                        to data protec-                                      users master                                                                                       out
                           tion laws and securi- Authorised Confirmed           their identity life
                               ty policies will subscribers    subscribers        cycle securely
                                   be built     are up-to-date are authorised       and confidentially.
                                        in.    at any time.     to access partial
                                                                 profiles.


7 Laws of Identity
                                                                                                                                                                                                    Contact:
1. User Control and Consent                                              5. Pluralism of Operators and Technologies                                                                                 Mario Hoffmann
2. Minimal Disclosure for a Constrained Use                              6. Human Integration                                                                                                       mario.hoffmann@aisec.fraunhofer.de
3. Justifiable Parties                                                    7. Consistent Experience Across Contexts                                                                                   www.identity‐competence‐center.de
4. Directed Identity                                                     Kim Cameron (http://www.identityblog.com/stories/2004/12/09/thelaws.html)

Mais conteúdo relacionado

Semelhante a Landscape of Web Identity Management

A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...Vishy Poosala
 
M2M Billing - Comarch M2M Projects
M2M Billing - Comarch M2M ProjectsM2M Billing - Comarch M2M Projects
M2M Billing - Comarch M2M ProjectsComarch
 
Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6OracleIDM
 
Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex Corporation
 
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance SystemsTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systemssipcworkshop
 
Reference architecture for community clouds
Reference architecture for community cloudsReference architecture for community clouds
Reference architecture for community cloudsJonathan Spindel
 

Semelhante a Landscape of Web Identity Management (7)

A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
 
M2M Billing - Comarch M2M Projects
M2M Billing - Comarch M2M ProjectsM2M Billing - Comarch M2M Projects
M2M Billing - Comarch M2M Projects
 
Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6
 
Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex OneCommand Management Framework
Emulex OneCommand Management Framework
 
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance SystemsTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
 
Getting Started In The Cloud
Getting Started In The CloudGetting Started In The Cloud
Getting Started In The Cloud
 
Reference architecture for community clouds
Reference architecture for community cloudsReference architecture for community clouds
Reference architecture for community clouds
 

Mais de Fraunhofer AISEC

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer AISEC
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteFraunhofer AISEC
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Fraunhofer AISEC
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidFraunhofer AISEC
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition Fraunhofer AISEC
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitFraunhofer AISEC
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityFraunhofer AISEC
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITFraunhofer AISEC
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidFraunhofer AISEC
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsFraunhofer AISEC
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFraunhofer AISEC
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftFraunhofer AISEC
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthFraunhofer AISEC
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungFraunhofer AISEC
 

Mais de Fraunhofer AISEC (20)

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vorn
 
Internet of (Every)Thing
Internet of (Every)ThingInternet of (Every)Thing
Internet of (Every)Thing
 
App Ray: 10000 Apps
App Ray: 10000 AppsApp Ray: 10000 Apps
App Ray: 10000 Apps
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische Geräte
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-Sicherheit
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for Security
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der IT
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic Products
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
 
Infografik Produktschutz
Infografik ProduktschutzInfografik Produktschutz
Infografik Produktschutz
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der Wissenschaft
 
Produktschutz Infografik
Produktschutz InfografikProduktschutz Infografik
Produktschutz Infografik
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealth
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht Forschung
 
Alan Turing
Alan Turing Alan Turing
Alan Turing
 
Sicherheit im Smart Grid
Sicherheit im Smart GridSicherheit im Smart Grid
Sicherheit im Smart Grid
 

Último

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Landscape of Web Identity Management

  • 1. Landscape of Web Identity Management Surveillance User-centric Data Protection RFID Authentication Credentials Aggregation Data Protection Identity Theft Transparency Claims Tracking Confidentiality Access Control LBS Attributes Smartcards Anonymity Context-awareness GPS Loyalty Personalisation Cyber Security Biometry CRM Policies Privacy Profiling Interoperability Technologies Authorizing User Use Ca e Cases Manage Ma Control Kantara - UMA 2012 User-Managed Access is a protocol designed to give a web user a unified control point for authorizing who and what Host can get access to their online personal data (such as identity Protect Authorization PEP PDP Delegate attributes), content (such as photos), and services Manager Protected (such as viewing and creating status updates). Resource Shibboleth is an eGov eGov G nt eGovernment Internet2 Middleware ess ess eBusiness Initiative project that has created an architecture and Authorize open-source implementation for Access Identity management and federated identity-based authentication and authorization (or Access control) infrastructure based on SAML. mar ma t art Smart h Shibbolet Requester ronments ronments nm m Environments eHealth 2.0 ect The OAuth 2.0 authorization proto- Identity Mixer (idemix) is an anonymous col enables a third-party application Ide credential system developed at IBM to obtain limited access to an HTTP service, either on behalf of a resource u th n mix Research that enables strong authentica- OA on owner by orchestrating an approval tion and privacy at the same time. With Social & Business C identity mixer, users can obtain from an C rd p CardSp interaction between the resource Hi owner and the HTTP service, or by issuer a credential containing all the Corporate e te Networks ID ig ve allowing the third-party application to information the issuer is ready to attest IdM obtain access on its own behalf. en about them. When a user later wants to gi gi Op (The OAuth 2.0 Authoriza- prove to a service provider a state- U-Pro ns tion Protocol draft-ietf- ment about her, she employs s oauth-v2-25, Higgins – identity mixer to securely March 8, OpenID Connect transform the initiated 2003 – is a e ac e 2012) OpenID Connect (based on the OAuth 2.0 protocol) is a framework that issued creden- a suite of lightweight specifications enables users and enterprises to tial. that provide a framework for identity integrate identity, profile, and User Empowerment interactions via RESTful APIs. The simp- relationship information across multi- lest deployment of OpenID Connect U-Prove is a Windows CardSpace ple systems. Applications can use Higgins allows for clients of all to request cryptographic tech- is Microsoft's client to create a unified, virtual view of and receive information about nology that enables software for the Identity identity, profile and relationship identities and currently the issuance and pre- Metasystem (canceled in information. A key focus of authenticated sessions. sentation of cryptogra- Feb 2011). CardSpace Higgins is providing a founda- (Implementer’s Draft, phically protected claims stores references to users' tion for new "user-centric Privacy by Design Feb. 14, 2012) in a manner that provides multi-party security. The goal digital identities for them. Resistance to phishing attacks identity" and personal information is to enable the exchange of and adherence to Kim management verified identity information Cameron's "7 Laws of Identity” applica- User-centric Services from sources (Claims Provider), under the user’s control (via the were goals in its design. Windows CardSpace 2.0 will be extended to tions. U-Prove Agent), to the recipients use the U-Prove protocol. (Relying Party). Data Protection Context-awareness Identity Management Threats Usable Security Identity Theft tamper Surveillance In the future internet users Profiling misinform will be downloaded as apps. en t s sm deny misuse Privacy Impact A sse Virtual identities will be created dynamically Compliance and context-aware. spy The to data protec- users master out tion laws and securi- Authorised Confirmed their identity life ty policies will subscribers subscribers cycle securely be built are up-to-date are authorised and confidentially. in. at any time. to access partial profiles. 7 Laws of Identity Contact: 1. User Control and Consent 5. Pluralism of Operators and Technologies Mario Hoffmann 2. Minimal Disclosure for a Constrained Use 6. Human Integration mario.hoffmann@aisec.fraunhofer.de 3. Justifiable Parties 7. Consistent Experience Across Contexts www.identity‐competence‐center.de 4. Directed Identity Kim Cameron (http://www.identityblog.com/stories/2004/12/09/thelaws.html)