Landscape of
 Web Identity Management
                                                                       Surveillance




                                                                                                                                                                                    User-centric
Data Protection
                                                                       RFID
                                                                                                                 Authentication                                                                                                                                         Credentials
                                                                                                                                                                                                         Aggregation




                                                                                                                                                                                                                                                                                    Data Protection
     Identity Theft




                                                                                                                                                                                                                                                                                             Transparency
            Claims




                      Tracking Confidentiality                                                                                                                                                        Access Control




                                                                                                                                    LBS
                      Attributes                                                Smartcards                                                                                                         Anonymity
                      Context-awareness




                                                                                                                                                                                                                 GPS
                                                                                                                                                                                                                              Loyalty
          Personalisation
          Cyber Security
                                                                                                                                                         Biometry                                                                       CRM
                                                                                                                                                         Policies                                                                       Privacy
                                                                                                                                                                  Profiling                                        Interoperability



                                                                                                                                                                               Technologies
                                                                                                                                                              Authorizing
                                                                                                                                                                 User



                                                            Use Ca
                                                              e Cases                                                                  Manage
                                                                                                                                       Ma

                                                                                                                                                                    Control
                                                                                                                                                                                                         Kantara - UMA 2012
                                                                                                                                                                                                         User-Managed Access is a protocol designed to give a web
                                                                                                                                                                                                         user a unified control point for authorizing who and what
                                                                                                                             Host                                                                        can get access to their online personal data (such as identity
                                                                                                                                             Protect         Authorization
                                                                                                                                       PEP             PDP                                    Delegate
                                                                                                                                                                                                         attributes), content (such as photos), and services
                                                                                                                                                               Manager
                                                                                                                           Protected                                                                     (such as viewing and creating status updates).
                                                                                                                           Resource                                                                                                                                            Shibboleth is an
                                                                       eGov
                                                                       eGov
                                                                        G       nt
                                                                       eGovernment                                                                                                                                                                                        Internet2 Middleware
                                                       ess
                                                       ess
                                                 eBusiness                                                                                                                                                                                                          Initiative project that has
                                                                                                                                                                                                                                                               created an architecture and
                                                                                                                                                                   Authorize
                                                                                                                                                                                                                                                          open-source implementation for
                                                                                                                                       Access                                                                                                              Identity management and federated
                                                                                                                                                                                                                                                            identity-based authentication and
                                                                                                                                                                                                                                                             authorization (or Access control)
                                                                                                                                                                                                                                                             infrastructure based on SAML.
                                                                                   mar
                                                                                   ma t
                                                                                    art
                                                                                 Smart                                                                                                                                              h
                                                                                                                                                                                                                           Shibbolet
                                                                                                                                                              Requester


                                                                                  ronments
                                                                                  ronments
                                                                                    nm
                                                                                     m
                                                                              Environments
                                               eHealth
                                                                                                                                                                             2.0 ect
                                                                                                             The OAuth 2.0 authorization proto-                                                                                                                  Identity Mixer (idemix) is an anonymous
                                                                                                             col enables a third-party application
                                                                                                                                                                                                                                 Ide                            credential system developed at IBM
                                                                                                             to obtain limited access to an HTTP
                                                                                                             service, either on behalf of a resource                    u th        n                                                    mix                    Research that enables strong authentica-

                                                                                                                                                                     OA          on
                                                                                                              owner by orchestrating an approval                                                                                                               tion and privacy at the same time. With
                                                           Social & Business                                                                                                   C                                                                              identity mixer, users can obtain from an
                                                                                                                                                                                                              C rd p
                                                                                                                                                                                                              CardSp




                                                                                                              interaction between the resource
                                                                                                                                                                                                              Hi




                                                                                                               owner and the HTTP service, or by                                                                                                             issuer a credential containing all the
                                    Corporate
                                            e
                                           te                  Networks                                                                                                              ID
                                                                                                                                                                                                               ig
                                                                                                                                                                                                         ve




                                                                                                               allowing the third-party application to                                                                                                     information the issuer is ready to attest
                                       IdM                                                                      obtain access on its own behalf.
                                                                                                                                                                                  en                                                                       about them. When a user later wants to
                                                                                                                                                                                                                  gi
                                                                                                                                                                                                                  gi




                                                                                                                                                                               Op
                                                                                                                 (The OAuth 2.0 Authoriza-                                                                                                                        prove to a service provider a state-
                                                                                                                                                                                                   U-Pro



                                                                                                                                                                                                                     ns




                                                                                                                  tion Protocol draft-ietf-                                                                                                                           ment about her, she employs
                                                                                                                                                                                                                      s




                                                                                                                   oauth-v2-25,                                                                                                                    Higgins –               identity mixer to securely
                                                                                                                    March 8,                    OpenID Connect                                                                                                                  transform the
                                                                                                                                                                                                                                                initiated 2003 – is
                                                                                                                                                                                                                        a e
                                                                                                                                                                                                                        ac e




                                                                                                                     2012)                 OpenID Connect (based
                                                                                                                                       on the OAuth 2.0 protocol) is                                                                         a framework that                        issued creden-
                                                                                                                                  a suite of lightweight specifications                                                                   enables users and enterprises to                 tial.
                                                                                                                             that provide a framework for identity                                                                      integrate identity, profile, and

                                         User Empowerment                                                                interactions via RESTful APIs. The simp-                                                                         relationship information across multi-
                                                                                                                           lest deployment of OpenID Connect                U-Prove is a                      Windows CardSpace            ple systems. Applications can use Higgins
                                                                                                                             allows for clients of all to request          cryptographic tech-                is Microsoft's client          to create a unified, virtual view of
                                                                                                                               and receive information about             nology that enables                  software for the Identity       identity, profile and relationship
                                                                                                                                 identities and currently               the issuance and pre-                 Metasystem (canceled in           information. A key focus of
                                                                                                                                    authenticated sessions.           sentation of cryptogra-                 Feb 2011). CardSpace                Higgins is providing a founda-
                                                                                                                                      (Implementer’s Draft,          phically protected claims                stores references to users'          tion for new "user-centric
                                                                              Privacy by Design                                          Feb. 14, 2012)            in a manner that provides
                                                                                                                                                                 multi-party security. The goal
                                                                                                                                                                                                              digital identities for them.
                                                                                                                                                                                                              Resistance to phishing attacks
                                                                                                                                                                                                                                                     identity" and personal
                                                                                                                                                                                                                                                       information
                                                                                                                                                               is to enable the exchange of                   and adherence to Kim                       management
                                                                                                                                                              verified identity information                    Cameron's "7 Laws of Identity”              applica-
                                                                              User-centric Services                                                         from sources (Claims Provider),
                                                                                                                                                           under the user’s control (via the
                                                                                                                                                                                                              were goals in its design. Windows
                                                                                                                                                                                                              CardSpace 2.0 will be extended to
                                                                                                                                                                                                                                                           tions.
                                                                                                                                                            U-Prove Agent), to the recipients                 use the U-Prove protocol.
                                                                                                                                                                 (Relying Party).
                                                                              Data Protection
                                                                              Context-awareness
                                                                              Identity Management                                                                             Threats
                                                                              Usable Security                                                            Identity Theft
                                                                                                                                                                                                         tamper
                                                                                                                                                         Surveillance

                                                                                                  In the future internet users
                                                                                                                                                         Profiling                                    misinform
                                                                                                 will be downloaded as apps.
                                                                                        en
                                                                                        t




                                                                             s    sm                                                                   deny                                 misuse
                                  Privacy Impact A                       sse                 Virtual identities
                                                                                           will be created dynamically
                      Compliance                                                                and context-aware.                                                              spy
                                                                                     The
                        to data protec-                                      users master                                                                                       out
                           tion laws and securi- Authorised Confirmed           their identity life
                               ty policies will subscribers    subscribers        cycle securely
                                   be built     are up-to-date are authorised       and confidentially.
                                        in.    at any time.     to access partial
                                                                 profiles.


7 Laws of Identity
                                                                                                                                                                                                    Contact:
1. User Control and Consent                                              5. Pluralism of Operators and Technologies                                                                                 Mario Hoffmann
2. Minimal Disclosure for a Constrained Use                              6. Human Integration                                                                                                       mario.hoffmann@aisec.fraunhofer.de
3. Justifiable Parties                                                    7. Consistent Experience Across Contexts                                                                                   www.identity‐competence‐center.de
4. Directed Identity                                                     Kim Cameron (http://www.identityblog.com/stories/2004/12/09/thelaws.html)

More Related Content

PDF
Infographic: Continuous Improvement
PDF
2011 Game Changer Presentation Agenda
PDF
OpenSDRM Panel
PDF
Workshop on Identity & Access Management.
PPTX
Identity and Access Management Introduction
PDF
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
PDF
IDM & IAM 2012
PPTX
Defending the Data Center: Managing Users from the Edge to the Application
Infographic: Continuous Improvement
2011 Game Changer Presentation Agenda
OpenSDRM Panel
Workshop on Identity & Access Management.
Identity and Access Management Introduction
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IDM & IAM 2012
Defending the Data Center: Managing Users from the Edge to the Application

Similar to Landscape of Web Identity Management (20)

PPT
Tech Executives Risk Mgmt And It Gov Frm Iam Persp Nov13
PDF
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
PPTX
Presentatie peter vink back to the future, TASS technology solutions
PDF
Getting Started In The Cloud
PPT
Information management strategy
PDF
Pbmr Ea Meta Model Poster V01.03
PDF
Csooow12 amit-jasuja-securing-new-experience6
PDF
Nimbula lspe-2012-04-19
PPTX
Private cloud forefront identity manager 2010 (adam bresson)
PPTX
iCode Security Architecture Framework
PPTX
Big Data in Retail
PPTX
Journey to the cloud
PDF
09 q7-itil 2011-overview-diagram-english_1111071
PDF
Week 1 Presentation
PDF
MANTRA Research Data Lifecycle
PDF
ITManager
PDF
Concept Presentation Cumulus
PDF
Reference architecture for community clouds
PPT
4. florence dupre new usagesprivacy legal framework fd
PPTX
Content Architecture
Tech Executives Risk Mgmt And It Gov Frm Iam Persp Nov13
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
Presentatie peter vink back to the future, TASS technology solutions
Getting Started In The Cloud
Information management strategy
Pbmr Ea Meta Model Poster V01.03
Csooow12 amit-jasuja-securing-new-experience6
Nimbula lspe-2012-04-19
Private cloud forefront identity manager 2010 (adam bresson)
iCode Security Architecture Framework
Big Data in Retail
Journey to the cloud
09 q7-itil 2011-overview-diagram-english_1111071
Week 1 Presentation
MANTRA Research Data Lifecycle
ITManager
Concept Presentation Cumulus
Reference architecture for community clouds
4. florence dupre new usagesprivacy legal framework fd
Content Architecture
Ad

More from Fraunhofer AISEC (20)

PDF
Fraunhofer Magazin weiter.vorn
PDF
Internet of (Every)Thing
PDF
App Ray: 10000 Apps
PDF
Produktschutz-Technologien für elektronische Geräte
PDF
Cyber-Sicherheit - Newsletter 2013
PDF
Native Code Execution Control for Attack Mitigation on Android
PDF
An Antivirus API for Android Malware Recognition
PDF
Marktchancen mit IT-Sicherheit
PDF
Cybersecurity 2013 - Design for Security
PDF
Sicherheitsgipfel - Chancen und Risiken der IT
PDF
Tech Report: On the Effectiveness of Malware Protection on Android
PDF
PEP - Protecting Electronic Products
PDF
Firmware Encryption and Secure Remote Update
PDF
Infografik Produktschutz
PDF
Cyber Security aus Sicht der Wissenschaft
PDF
Produktschutz Infografik
PDF
IKT-Trends und deren Bedeutung für eHealth
PDF
Innovation braucht Sicherheit - Sicherheit braucht Forschung
PDF
Alan Turing
PDF
Sicherheit im Smart Grid
Fraunhofer Magazin weiter.vorn
Internet of (Every)Thing
App Ray: 10000 Apps
Produktschutz-Technologien für elektronische Geräte
Cyber-Sicherheit - Newsletter 2013
Native Code Execution Control for Attack Mitigation on Android
An Antivirus API for Android Malware Recognition
Marktchancen mit IT-Sicherheit
Cybersecurity 2013 - Design for Security
Sicherheitsgipfel - Chancen und Risiken der IT
Tech Report: On the Effectiveness of Malware Protection on Android
PEP - Protecting Electronic Products
Firmware Encryption and Secure Remote Update
Infografik Produktschutz
Cyber Security aus Sicht der Wissenschaft
Produktschutz Infografik
IKT-Trends und deren Bedeutung für eHealth
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Alan Turing
Sicherheit im Smart Grid
Ad

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
STKI Israel Market Study 2025 version august
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
August Patch Tuesday
PPTX
The various Industrial Revolutions .pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Getting Started with Data Integration: FME Form 101
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
STKI Israel Market Study 2025 version august
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Web Crawler for Trend Tracking Gen Z Insights.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A novel scalable deep ensemble learning framework for big data classification...
August Patch Tuesday
The various Industrial Revolutions .pptx
A review of recent deep learning applications in wood surface defect identifi...
Module 1.ppt Iot fundamentals and Architecture
O2C Customer Invoices to Receipt V15A.pptx
Getting started with AI Agents and Multi-Agent Systems
Benefits of Physical activity for teenagers.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
NewMind AI Weekly Chronicles – August ’25 Week III
Getting Started with Data Integration: FME Form 101
Zenith AI: Advanced Artificial Intelligence
WOOl fibre morphology and structure.pdf for textiles
Final SEM Unit 1 for mit wpu at pune .pptx

Landscape of Web Identity Management

  • 1. Landscape of Web Identity Management Surveillance User-centric Data Protection RFID Authentication Credentials Aggregation Data Protection Identity Theft Transparency Claims Tracking Confidentiality Access Control LBS Attributes Smartcards Anonymity Context-awareness GPS Loyalty Personalisation Cyber Security Biometry CRM Policies Privacy Profiling Interoperability Technologies Authorizing User Use Ca e Cases Manage Ma Control Kantara - UMA 2012 User-Managed Access is a protocol designed to give a web user a unified control point for authorizing who and what Host can get access to their online personal data (such as identity Protect Authorization PEP PDP Delegate attributes), content (such as photos), and services Manager Protected (such as viewing and creating status updates). Resource Shibboleth is an eGov eGov G nt eGovernment Internet2 Middleware ess ess eBusiness Initiative project that has created an architecture and Authorize open-source implementation for Access Identity management and federated identity-based authentication and authorization (or Access control) infrastructure based on SAML. mar ma t art Smart h Shibbolet Requester ronments ronments nm m Environments eHealth 2.0 ect The OAuth 2.0 authorization proto- Identity Mixer (idemix) is an anonymous col enables a third-party application Ide credential system developed at IBM to obtain limited access to an HTTP service, either on behalf of a resource u th n mix Research that enables strong authentica- OA on owner by orchestrating an approval tion and privacy at the same time. With Social & Business C identity mixer, users can obtain from an C rd p CardSp interaction between the resource Hi owner and the HTTP service, or by issuer a credential containing all the Corporate e te Networks ID ig ve allowing the third-party application to information the issuer is ready to attest IdM obtain access on its own behalf. en about them. When a user later wants to gi gi Op (The OAuth 2.0 Authoriza- prove to a service provider a state- U-Pro ns tion Protocol draft-ietf- ment about her, she employs s oauth-v2-25, Higgins – identity mixer to securely March 8, OpenID Connect transform the initiated 2003 – is a e ac e 2012) OpenID Connect (based on the OAuth 2.0 protocol) is a framework that issued creden- a suite of lightweight specifications enables users and enterprises to tial. that provide a framework for identity integrate identity, profile, and User Empowerment interactions via RESTful APIs. The simp- relationship information across multi- lest deployment of OpenID Connect U-Prove is a Windows CardSpace ple systems. Applications can use Higgins allows for clients of all to request cryptographic tech- is Microsoft's client to create a unified, virtual view of and receive information about nology that enables software for the Identity identity, profile and relationship identities and currently the issuance and pre- Metasystem (canceled in information. A key focus of authenticated sessions. sentation of cryptogra- Feb 2011). CardSpace Higgins is providing a founda- (Implementer’s Draft, phically protected claims stores references to users' tion for new "user-centric Privacy by Design Feb. 14, 2012) in a manner that provides multi-party security. The goal digital identities for them. Resistance to phishing attacks identity" and personal information is to enable the exchange of and adherence to Kim management verified identity information Cameron's "7 Laws of Identity” applica- User-centric Services from sources (Claims Provider), under the user’s control (via the were goals in its design. Windows CardSpace 2.0 will be extended to tions. U-Prove Agent), to the recipients use the U-Prove protocol. (Relying Party). Data Protection Context-awareness Identity Management Threats Usable Security Identity Theft tamper Surveillance In the future internet users Profiling misinform will be downloaded as apps. en t s sm deny misuse Privacy Impact A sse Virtual identities will be created dynamically Compliance and context-aware. spy The to data protec- users master out tion laws and securi- Authorised Confirmed their identity life ty policies will subscribers subscribers cycle securely be built are up-to-date are authorised and confidentially. in. at any time. to access partial profiles. 7 Laws of Identity Contact: 1. User Control and Consent 5. Pluralism of Operators and Technologies Mario Hoffmann 2. Minimal Disclosure for a Constrained Use 6. Human Integration mario.hoffmann@aisec.fraunhofer.de 3. Justifiable Parties 7. Consistent Experience Across Contexts www.identity‐competence‐center.de 4. Directed Identity Kim Cameron (http://www.identityblog.com/stories/2004/12/09/thelaws.html)