22B/ Identity Architecures - Developing a methology to evalueate characteristics

From IIW

Identity Architectures: Developing a Methodology to Evaluate Different Identity Architecture Characteristics


Thursday 22B

Convener: Todd Gehrke, Trev Harmon

Notes-taker(s): Todd Gehrke


Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps: 


Session Context

This was a working session and conversation around developing some key properties of a “good” identity architecture. The goal was to go slightly beyond the simple issuer -> holder -> verifier and represent some of the components of the system

22b1.png

The context of the discussion was for a Non-Enterprise setting because including integration into the backend system made the problem space too complex.

We also want to be considering system that might fit within the ID2020 Alliance Manifesto https://id2020.org/manifesto

The focus was on Public and NGO sector use cases where there were transactional interactions.

Digital Identity Vital Signs

A set of 6 Identity System Characteristics in prioritized order. These items are derived from a much longer list, The goal is to use them as a starting point for a conversation.

Feedback:

  • In the context of the underserved Population Accessibility should be higher on the list.

  • It is best to not order the list. All are equally important

  • Each item needs a clear definition, Security is too vague

  • The meaning of all these words is key to understanding what you mean. Each one could be a 30 min or more conversation.

  • Combining Transparency and Security might be enough to constitute Privacy Preserving

  • James Manger : Usability

  • 1. Fit for purpose. Good digital identities offer a reliable way for individuals to build trust in who they claim to be, to exercise their rights and freedoms, and/ordemonstrate their eligibility to access services.

  • 2. Inclusive. Inclusive identity enable anyone who needs it to establish and use a digital identity, free from the risk of discrimination based on their identity-related data, and without facing authentication processes that exclude them.

  • 3. Useful. Useful digital identities offer access to a wide range of useful services and interactions and are easy to establish and use.

  • 4. Offers choice. Individuals have choice when they can see how systems use their data and are able to choose what data they share for which interaction, with whom and for how long.

  • 5. Secure. Security includes protecting individuals, organizations, devices and infrastructure from identity

  • From John W : From one of my deck’s. A slide on Privacy and Data Autonomy: A person maintains their privacy when they have the ability and power to choose what information about themselves to disclose, to whom, and for what reason. They are autonomous and have agency. When information about a person’s behaviour or performance is recorded by an organization (like at work or at school), an individual’s privacy is protected when they they know what information

Shared Link:

http://www3.weforum.org/docs/WEF_INSIGHT_REPORT_Digital%20Identity.pdf

Final unordered list created by the group:

  • User Autonomy

  • Privacy Preserving

  • Interoperability & Portability

  • Security (Anti-Honeypot)

  • Population Accessibility

  • Transparency

  • Usability

Example architecture 1

The goal of this diagram is to represent multiple issues that issue credentials to a users handset. This is intended to be a starting point, or ideal architecture. We are disregarding fundamental elements such as guardianship and the details of backup and recovery. . .

22b3.png

Feedback:

  • The diagram doesn't show a user (it is implied by the handset)

  • The architecture diagram itself doesn’t tell us enough.

  • We need to talk within the context of specific uses cases

  • We need to talk about both the what and the how

  • Public key and cryptography are part of the how and don’t belong on the diagram.

  • An example of a challenge, here, is that User Control is essential, but has to be balanced against User Burden. (For typical uses of the term Usability, it is actually an additional, separate concern)

  • How is Trust Registry different from the 'Publish Public Key' repository? The trust registry is the list of issuing authorities the verifier will respect. Could be included as part of the verifier . . .

Example architecture 2

This is an example drawn from Mobile Drivers License Initiative and a presentation given by John Wunderlich (Kantara)

https://www.securetechalliance.org/mobile-drivers-license-initiative/

22b2.png

Feedback:

  • Overall the group thought this was an inadequate architecture because of the “phone home” component.

  • The use of an oracle to validate the cradentail doesn’t remove the fact that there is tracing going on even though it’s not the same as going back to the original issuing authority.

  • Dan B pointed out that this is like the approach that is much like the pattern used in Estonia e-Residency program. Using a single government issuer but a decentralized network of verifiers.

Example architecture 3

Credentials held on a cloud agent owned by the holder. User owns and provisions infrastructure provisioned in thor cloud account.

22b4.png

Feedback:

  • Group was OK with this, didn’t have a lot of feedback.

Example architecture 4

Identity provider, government or private company, provides Identity as a service. Holder has control of credentials but may not have control of the infrastructure hosting the agent and storage services.

22b5.png

Feedback:

  • Although this is likely to be the most common model the group did not feel this was a good architecture.