EID Summer Summit 28 June 2005 EAP’s Sponsored and in Partnership with 7 Laws of Identity Kim Cameron Chief Architect of Identity and Access MS Corp, Redmond.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

The Laws of Identity Kim Cameron Architect of Identity and Access Microsoft Corporation.
InfoCard and the Identity Metasystem Kim Cameron, Chief Architect of Identity Microsoft.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
OPSEC Awareness Briefing Man-In-The-Middle Attacks (MITM)
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Windows CardSpace and the Identity Metasystem Glen Gordon Developer Evangelist, Microsoft
Next Steps toward More Trustworthy Interfaces Burt Kaliski, RSA Laboratories 1 st Workshop on Trustworthy Interfaces for Passwords and Personal Information.
OASIS Reference Model for Service Oriented Architecture 1.0
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Using Digital Credentials On The World-Wide Web M. Winslett.
The Laws of Identity and Cardspace Charles Young Solidsoft.
Security and Policy Enforcement Mark Gibson Dave Northey
The Identity Metasystem Caspar Bowden, Chief Privacy Advisor EMEA EMEA Technology Office on behalf of: Kim Cameron, Architect of Identity and Access Microsoft.
All Organizations Need to Share and Communicate Information...
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Design Choices Underlying the Identity Metasystem Proposal Kim Cameron and Mike Jones Microsoft.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Understanding Active Directory
By Bob Bunson  Simulation of software development project  Fictitious system from Concept to Code  Oriented around the.
Private Cloud: Application Transformation Business Priorities Presentation.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Phishing Rising to the challenge Amy Marasco Microsoft.
Who are you? From Directories and Identity Silos to Ubiquitous User-Centric Identity Mike Jones, Microsoft and Dale Olds, Novell.
What is Enterprise Architecture?
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
A Claims Based Identity System Steve Plank Identity Architect Microsoft UK.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Purpose of study A high-quality computing education equips pupils to use computational thinking and creativity to understand and change the world. Computing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Windows Azure Dave Glover Developer Evangelist Microsoft Australia Tel:
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 09. Review Introduction to architectural styles Distributed architectures – Client Server Architecture – Multi-tier.
Distributed Systems: Concepts and Design Chapter 1 Pages
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Ins and Outs of Authenticating Users Requests to IIS 6.0 and ASP.NET Chris Adams Program Manager IIS Product Unit Microsoft Corporation.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Web Services Security Patterns Alex Mackman CM Group Ltd
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
The Future of Licensing Facing Global, Programmatic and Technological Challenges Jason Kap Senior Director, Worldwide Licensing and Pricing Microsoft Corporation.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Dr. Ir. Yeffry Handoko Putra
Principles Identified - UK DfT -
The time to address enterprise mobility is now
Chapter 6: Securing the Cloud
Tactic 1: Adopt Least Privilege
Introduction to Windows Azure AppFabric
Deployment Planning Services
Storage Virtualization
Phase 4: Compelling Case for Change
The Laws of Identity Kim Cameron
Microsoft Virtual Academy
Laws for Secure Credentialing
An Identity on the Internet
Office 365 Identity Management
Building "One Size Fits All" Identity Systems Possible or Fantasy
Presentation transcript:

eID Summer Summit 28 June 2005 EAP’s Sponsored and in Partnership with 7 Laws of Identity Kim Cameron Chief Architect of Identity and Access MS Corp, Redmond Microsoft and e-ID

Microsoft Confidential The Laws of Identity Kim Cameron Architect of Identity and Access Microsoft Corporation

Problem Statement The Internet was built without a way to know who and what you are connecting to Everyone offering an internet service has had to come up with a workaround Patchwork of identity one-offs We have inadvertently taught people to be phished and pharmed No fair blaming the user – no framework, no cues, no control We are “Missing the identity layer” Digital identity currently exists in a world without synergy because of identity silos

Criminalization of the Internet Greater use and greater value attract professionalized international criminal fringe Understand ad hoc nature of identity patchwork Phishing and Pharming (Phraud) at 1000% CAGR Combine with “stash attacks” reported as “identity losses”… Unwinding of acceptance where we should be seeing progress. Opportunity of moving beyond “public-ation” Need to intervene so web services can get out of the starting gate The ad hoc nature of internet identity cannot withstand the growing assault of professionalized attackers We can predict a deepening public crisis

An Identity Metasystem Diverse needs of players mean integrating multiple constituent technologies Not the first time we’ve seen this in computing Think back to things as basic as abstract display services made possible through device drivers Or the emergence of sockets and TCP/IP Unified Ethernet, Token Ring, Frame Relay, X.25 and even the uninvented wireless protocols We need a “unifying identity metasystem” Protect applications from complexities of systems Allow digital identity to be loosely coupled Avoid need to agree on dominant technologies a priori – they will emerge from the ecosystem

The role of “The Laws”… We must be able to structure our understanding of digital identity We need a way to avoid returning to the Empty Page every time we talk about digital identity We need to inform peoples’ thinking by teasing apart the factors and dynamics explaining the successes and failures of identity systems since the 1970s We need to develop hypotheses – resulting from observation – that are testable and can be disproved The Laws of Identity offer a “good way” to express this thought Beyond mere conversation, the Blogosphere offers us a crucible. The concept has been to employ this crucible to harden and deepen the laws.

1. User Control and Consent Digital identity systems must only reveal information identifying a user with the user’s consent Relying parties can require authentication The user can choose to comply or “walk away” The system should appeal by means of convenience and simplicity and win the user’s trust Put the user in control of what identities are used and what information is released Protect against deception (destination and misuse) Inform user of auditing implications Retain paradigm of consent across all contexts

2. Minimal Disclosure for Limited Use The solution that discloses the least identifying information and best limits its use is the most stable long term solution Consider Information breaches to be inevitable To mitigate risk, acquire and store information on a “need to know” and “need to retain” basis Less information implies less value implies less attraction implies less risk “Least identifying information” includes reduction of cross-context information (universal identifiers) Limiting information hoarding for unspecified futures

3. Justifiable Parties Digital identity systems must limit disclosure of identifying information to parties having a necessary and justifiable place in a given identity relationship Justification requirements apply both to the subject and to the relying party Example of Microsoft’s experience with Passport In what contexts will use of government identities succeed and fail? Parties to a disclosure must provide a statement about information use

4. Directed Identity A unifying identity metasystem must support both “omni-directional” identifiers for public entities and “unidirectional” identifiers for private entities Digital identity is always asserted with respect to some other identity or set of identities Public entities require well-known “beacons” Examples: web sites or public devices Private entities (people) require the option to not be a beacon Unidirectional identifiers used in combination with a single beacon: no correlation handles Example of Bluetooth and RFID – growing pushback Wireless was also mis-designed in light of this law

5. Pluralism of Operators and Technologies A unifying identity metasystem must channel and enable the inter-working of multiple identity technologies run by multiple identity providers Characteristics that make a system ideal in one context disqualify it in another Example of government versus employer versus individual as consumer and human being Craving for “segregation” of contexts Important new technologies currently emerging – must not glue in a single technology or require “fork- lift” upgrade Convergence can occur, but only when there is a platform (identity ecology) for that to happen in

6. Human Integration A unifying identity metasystem must define the human user as a component integrated through protected and unambiguous human-machine communications We’ve done a good job of securing the first 5,000 miles but allowed penetration of the last 2 feet The channel between the display and the brain is under attack Need to move from thinking about a protocol to thinking about a ceremony Example of Channel 9 on United Airlines How to achieve highest levels of reliability in communication between user and rest of system

7. Consistent Experience Across Contexts A unifying identity metasystem must provide a simple consistent experience while enabling separation of contexts through multiple operators and technologies Make identities “things” on the desktop so users can see them, inspect details, add and delete What type of digital identity is acceptable in given context? Properties of potential candidates specified by the relying party User selects one and understands information associated with it. Single relying party may accept more than one type of identity Facilitate “Segregation Of Contexts”

Identity Metasystem An identity metasystem is framework that unifies the world of multiple identity technologies multiple operators and multiple implementations An identity metasystem enables users to manage identity in a heterogeneous world

© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

EAP’s Sponsored and in Partnership with Joeri Van Herreweghe 15 year old eID Wizard First encounter eID InfoSessions Erpe-Mere Selected as a finalist in Microsoft’s World- Wide You Can Make a Difference scholarship program eID Project for Simon & Odil

EAP’s Sponsored and in Partnership with

Joeri Van Herreweghe “We received many qualified applications from all over the world, and the judging panel was particularly impressed with your technology proposal. We at Microsoft look forward to working with you to turn your project proposal into a reality.” Mario Jobbe Technical Product Manager Academic & Developer Community Group Servers & Tools Business Microsoft Corporation, Redmond

EAP’s Sponsored and in Partnership with Joeri Van Herreweghe Small Ceremony Get in contact with Kim Cameron Some travel equipment as present Please give a strong applause for Joeri !

EAP’s Sponsored and in Partnership with © 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.