SlideShare a Scribd company logo
STEPPING UP TO NEW
DATA PROTECTION CHALLENGES
USER-MANAGED ACCESS FOR GENUINE CONSENT
Markus Weber
2015 Identity Summit - Stepping Up to New Data Protection Challenges
67% of individuals are willing to share
data with companies.
It drops to 27% if the business is
sharing data with a third party.
- Accenture
The Impending Problem
Management
Management
Management
Data
Authorization
Data
Authorization
Data
Authorization
Copyright © Identity Summit 2015, all rights reserved.
The Impending Problem
Management
Data
Authorization
Data
Authorization
Data
Authorization
Copyright © Identity Summit 2015, all rights reserved.
UMA: User-Managed Access
Copyright © Identity Summit 2015, all rights reserved.
 Is a standard built on OAuth2
 Delivers externalized authorization
 Provides digital consent control to end users
 Allows to share data and revoke access to data
Why the need for UMA?
OAuth2 focuses on authorizing the sharing of my data with me!
OAuth2
OAuth2
Copyright © Identity Summit 2015, all rights reserved.
Why the need for UMA?
UMA allows me to authorize the sharing of my data with me and others
UMA
UMA
UMA
UMA
UMA
Copyright © Identity Summit 2015, all rights reserved.
Why the need for UMA?
UMA extends authorization of share or don’t share
and includes fine-grained controls
OAuth2 UMA – Fine-Grained Controls
Copyright © Identity Summit 2015, all rights reserved.
Why the need for UMA?
UMA extends authorization to include scopes – View, Download, Transmit
Copyright © Identity Summit 2015, all rights reserved.
Why the need for UMA?
Externalizes authorization to a centralized hub!
One place to
rule them all!
Copyright © Identity Summit 2015, all rights reserved.
The
mechanism:
federated
authorization
on top of
OAuth
Copyright © Identity Summit 2015, all rights reserved.
This isn’t just slideware!
We built this technology into our
products – and will demo it
Copyright © Identity Summit 2015, all rights reserved.
ForgeRock is
delivering two key
UMA components
not long from now
(client)
OpenAM 13-based
UMA Provider
OpenIG 4-based
UMA Protector
Copyright © Identity Summit 2015, all rights reserved.
resource server
authorization
server
Demo
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
iSee TV
Angela
Eric
 Child
 Regular
☐ Adult
Copyright © Identity Summit 2015, all rights reserved.
iSee TV
Angela
Zachary
 Child
☐ Regular
☐ Adult
Copyright © Identity Summit 2015, all rights reserved.
iSpy
Camera
Angela
Brittany
 View
 Move
☐ On/Off
Why is it valuable to use a standard for
next-generation digital consent?
Copyright © Identity Summit 2015, all rights reserved.
ForgeRock helps you deliver
customer consent and delegation
capabilities for successful
digital transformation in a
privacy-sensitive world
Copyright © Identity Summit 2015, all rights reserved.
THANKS!
Markus Weber (@MWAtForgeRock)

More Related Content

PPTX
2015 Identity Summit - CTO Innovation Center
PPTX
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
PPTX
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
PPTX
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
PPTX
The Platform Big Picture
PDF
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
PPTX
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
PPTX
McKesson Case Study: Pharmacy Systems & Automation
2015 Identity Summit - CTO Innovation Center
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
The Platform Big Picture
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
McKesson Case Study: Pharmacy Systems & Automation

What's hot (20)

PPTX
Identity Summit 2015: Connect.gov and Identity Management Systems
PPTX
2015 Identity Summit - The Identity Broker as Driver for Growth
PPTX
Digital Consent: Taking UMA from Concept to Reality
PPTX
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
PPTX
2015 Identity Summit - OpenAM: Friends with benefits
PPTX
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
PDF
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
PPTX
Provisioning IoT...Oh Baby You Know Meeee!
PPTX
Webinar: Identity Wars: The Unified Platform Awakens
PPTX
Identity Live Sydney 2017 - Daniel Raskin
PPTX
Identity Summit UK: STATELESS SESSIONS AND MANAGING HIGH-VOLUME DIGITAL SERVICES
PPTX
Identity Summit 2015: 2Keys Canadian Digital Identity
PPTX
Securing Access to SaaS Apps with WSO2 Identity Server
PPTX
9.35am robert humphrey
PDF
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
PPTX
Identity Live London 2017 | Kenneth May
PDF
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
PDF
Go Beyond PSD2 Compliance with Digital Identity
PPTX
Identity and Access Management in the Era of Digital Transformation
PPTX
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Identity Summit 2015: Connect.gov and Identity Management Systems
2015 Identity Summit - The Identity Broker as Driver for Growth
Digital Consent: Taking UMA from Concept to Reality
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
2015 Identity Summit - OpenAM: Friends with benefits
Identity Summit 2015: EnerNOC Case Study: The Transformation of IAM for EnerN...
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Provisioning IoT...Oh Baby You Know Meeee!
Webinar: Identity Wars: The Unified Platform Awakens
Identity Live Sydney 2017 - Daniel Raskin
Identity Summit UK: STATELESS SESSIONS AND MANAGING HIGH-VOLUME DIGITAL SERVICES
Identity Summit 2015: 2Keys Canadian Digital Identity
Securing Access to SaaS Apps with WSO2 Identity Server
9.35am robert humphrey
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Identity Live London 2017 | Kenneth May
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
Go Beyond PSD2 Compliance with Digital Identity
Identity and Access Management in the Era of Digital Transformation
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Ad

Similar to 2015 Identity Summit - Stepping Up to New Data Protection Challenges (20)

PDF
WP-Privacy-IoT-Era - PRODUCTION
PDF
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
PDF
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
PDF
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
PDF
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
PPTX
The state of uma 2014 11-03
PDF
Extending the Power of Consent with User-Managed Access & OpenUMA
PDF
Applying Innovative Tools for GDPR Success
PDF
CIS 2015 User Managed Access - George Fletcher
PDF
Uma webinar 2014 06-19
PDF
Uma webinar 2014 03-20
PPTX
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
PDF
Implications of GDPR in Conjunction with UMA
PDF
UMA for ACE
PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PDF
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
PPTX
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
PPTX
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
PDF
Protecting Personal Data in a IoT Network with UMA
PDF
Protecting Personal Data in a IoT Network with UMA
WP-Privacy-IoT-Era - PRODUCTION
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
The state of uma 2014 11-03
Extending the Power of Consent with User-Managed Access & OpenUMA
Applying Innovative Tools for GDPR Success
CIS 2015 User Managed Access - George Fletcher
Uma webinar 2014 06-19
Uma webinar 2014 03-20
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Implications of GDPR in Conjunction with UMA
UMA for ACE
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
Ad

More from ForgeRock (20)

PPTX
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
PDF
Identity Live Sydney: Identity Management - A Strategic Opportunity
PDF
Identity Live Singapore: Transform Your Cybersecurity Capability
PDF
Identity Live Singapore 2018 Keynote Presentation
PDF
Identity Live Sydney 2018 Keynote Presentation
PDF
Identity Live Singapore: Just Ask 'Em
PDF
Identity Live Singapore: Building Trust & Privacy in a Connected Society
PDF
Identity Live Sydney: Intelligent Authentication
PDF
Identity Live Sydney: Building Trust and Privacy in a Connected Society
PDF
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
PPTX
Get the Exact Identity Solution You Need - In the Cloud - Overview
PDF
Opening Keynote (Identity Live Berlin 2018)
PDF
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
PDF
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
PDF
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
PDF
Shift from GDPR readiness to sustained compliance to improve your business an...
PDF
Intelligent Authentication (Identity Live Berlin 2018)
PDF
Customer Safeguarding, Fraud and GDPR: Manah Khalil
PDF
What the Internet of Things Means for Consumer Privacy: Veronica Lara
PDF
Identity Live in Austin Keynote
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution You Need - In the Cloud - Overview
Opening Keynote (Identity Live Berlin 2018)
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Shift from GDPR readiness to sustained compliance to improve your business an...
Intelligent Authentication (Identity Live Berlin 2018)
Customer Safeguarding, Fraud and GDPR: Manah Khalil
What the Internet of Things Means for Consumer Privacy: Veronica Lara
Identity Live in Austin Keynote

Recently uploaded (20)

PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
Complete Guide to Website Development in Malaysia for SMEs
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
AutoCAD Professional Crack 2025 With License Key
PDF
Cost to Outsource Software Development in 2025
PDF
Autodesk AutoCAD Crack Free Download 2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
Salesforce Agentforce AI Implementation.pdf
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Complete Guide to Website Development in Malaysia for SMEs
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
AutoCAD Professional Crack 2025 With License Key
Cost to Outsource Software Development in 2025
Autodesk AutoCAD Crack Free Download 2025
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Monitoring Stack: Grafana, Loki & Promtail
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
17 Powerful Integrations Your Next-Gen MLM Software Needs
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Digital Systems & Binary Numbers (comprehensive )
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Computer Software and OS of computer science of grade 11.pptx
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Download FL Studio Crack Latest version 2025 ?
Salesforce Agentforce AI Implementation.pdf

2015 Identity Summit - Stepping Up to New Data Protection Challenges

Editor's Notes

  • #2: Abstract: Existing notice-and-consent paradigms of privacy have begun to fail dramatically – and the EU Data Protection regulatory regime is shifting in response. Providing genuine and free choice in consented personal data sharing will no longer be optional – but fortunately, enabling consumer-controlled data sharing from cloud, mobile, and IoT sources is also good for your digitally transformed business. In this session, learn about how ForgeRock’s new solution based on the User-Managed Access (UMA) standard builds trust and strengthens privacy in the digital world.
  • #3: Great, your organization is ready for digital transformation so you can achieve breakthrough growth or other key metrics. Even if you manufacture outdoor clothing, it’s not a world solely of atoms anymore. Bits matter. Your customers want to know how you can enable smart tracking of fitness and location through your products. Your supply chain partners increasingly connect through APIs. Your IT processes shifted off paper long ago. So: Are you ready for all of the implications of digital transformation on your handling of personal data and how this affects both your customer relationships and your mitigation of risk? ---- Image source: https://www.flickr.com/photos/48746111@N04/4466093934 | CC BY-SA 2.0
  • #4: Great, your organization is ready for digital transformation so you can achieve breakthrough growth or other key metrics. Even if you manufacture outdoor clothing, it’s not a world solely of atoms anymore. Bits matter. Your customers want to know how you can enable smart tracking of fitness and location through your products. Your supply chain partners increasingly connect through APIs. Your IT processes shifted off paper long ago. So: Are you ready for all of the implications of digital transformation on your handling of personal data and how this affects both your customer relationships and your mitigation of risk? The Safe Harbor provision just died, demonstrating that… Surveillance – which we can no longer deny exists – overrides traditional permitted bases for data transfer, leaving us to conclude that… Individual consent, in the sense signaled by the forthcoming EU GDPR, will become the only bulletproof basis for international data transfer ---- Image source: https://www.flickr.com/photos/48746111@N04/4466093934 | CC BY-SA 2.0
  • #7: In fact, UMA is built on top of OAuth. But typical profiles of OAuth solve a somewhat simpler problem. Here are some features UMA adds to the picture.OAuth in its typical deployment models solves for person-to-self sharing (that is, Alice is the person using both the client app and the resource server app).  Grants access by consenting to terms at run time You grant access to apps operated by you The authorization function is effectively local to resources
  • #8: In fact, UMA is built on top of OAuth. But typical profiles of OAuth solve a somewhat simpler problem. Here are some features UMA adds to the picture.OAuth in its typical deployment models solves for person-to-self sharing (that is, Alice is the person using both the client app and the resource server app).  Grants access by consenting to terms at run time You grant access to apps operated by you The authorization function is effectively local to resources
  • #9: UMA, in addition, solves for secure person-to-person sharing and person-to-organization sharing. You can grant access to apps operated by anyone You can control access to any type of web resource
  • #10: You can grant access by setting policies and terms ahead of time - OAuth authorizes sharing connections mostly based on simple authentication by the requesting side (client). UMA allows a user to craft policies that drive fine-grained claims-based authorization decisions, including getting the requesting party to make promises or have a third party make attestations on its behalf.
  • #11: You can delegate scope-constrained access
  • #12: The authorization function is standard and centralized Sharing connections can be managed, controlled or revoked Think: http://www.applehealthkit.com/ ***
  • #14: Show recorded video (can be downloaded from here: https://drive.google.com/open?id=0B5Q4evmm_OOCN050RWtGSFhnV3c&authuser=0 )
  • #15: The UMA architecture has these three pieces. ForgeRock will deliver the two key pieces on the top in order to help you protect your API/application (policy enforcement points) and let your users set up sharing preferences (policy decision point).
  • #16: Show recorded video (can be downloaded from here: https://drive.google.com/open?id=0B5Q4evmm_OOCN050RWtGSFhnV3c&authuser=0 )
  • #17: The UMA architecture has these three pieces. ForgeRock will deliver the two key pieces on the top in order to help you protect your API/application (policy enforcement points) and let your users set up sharing preferences (policy decision point).
  • #18: The UMA architecture has these three pieces. ForgeRock will deliver the two key pieces on the top in order to help you protect your API/application (policy enforcement points) and let your users set up sharing preferences (policy decision point).
  • #19: The UMA architecture has these three pieces. ForgeRock will deliver the two key pieces on the top in order to help you protect your API/application (policy enforcement points) and let your users set up sharing preferences (policy decision point).
  • #20: If you’re trying to deliver online financial services, to support small businesses or tax reporting, these scenarios are filled with requirements and opportunities for delegating access to others. An employee wants to give her accountant access to her last year’s earnings statement, or a sole proprietor wants to give his contract bookkeeper selective access to some accounts. Recently we saw a story in the news about Audi enabling package delivery to parked unattended cars. Any car with an API could have that, if car owners could selectively enable access by others. Citizens traveling across borders and those trying to access government services often have reason to authorize access by others to attributes about them, such as their financial status, to enable access to government services. This shouldn’t just be a matter of passive consent; it could be a matter of a long-running relationship. Why is the AirBnB logo here? Imagine that you have a house chock-full of smart light bulbs and kitchen appliances made by different manufacturers. You’ve set them all up to work the way you want. Now you leave for a week, and you rent your place out through AirBnB. You want to give partial access to a partially trusted stranger, but only for a week! And then you want all the entitlements to expire. You’d better be able to do this conveniently from a single console. Patient-centric, RESTful health data sharing is the focus of the demonstration we’ll show next.
  • #21: ForgeRock leads the industry in identity research, development, and solutions that put the customer at the center of your business. We have been moving aggressively to build innovative consumer-focused access management and privacy solutions based on the newly completed User-Managed Access (UMA) Version 1.0 standard, an effort led by our own Eve Maler, VP of Innovation and Emerging Technology in the ForgeRock office of the CTO. UMA was designed to give an individual a unified control point for authorizing who and what can get access to his or her personal data (such as contact information), content (such as health records), and services (such as access to a fitness API), no matter where the data lives online.