SlideShare a Scribd company logo
Online Identity:
          OpenID, OAuth, Information Cards
                                   OCRN Aug 2009

                   Kaliya Hamlin, Identity Woman
                                          @identitywoman
                                         identitywoman.net
                                        skype:identitywoman
                                     AIM/e-mail:kaliya@mac.com

                               co-founder, co-producer and the facilitator of the

                         INTERNET IDENTITY WORKSHOP
                             www.internetidentityworkshop.com
Wednesday, August 19, 2009
I am a community builder.
 This is the technical community around user-centric digital identity that I have helped
   build. We have met since 2005 every 6 months at the Internet Identity Workshop.




Wednesday, August 19, 2009
In mid 2004 Julia Butterfly Hill
                                    launched this website to encourage
                                    people to be active and linked to
                                    40+ organizations. These sites had
                                    about 50 login opportunities - each
                                    one of them each required a new/
                                    different user name and password.

        How were all these groups going to work together –to form a strong
        community - if the citizens they were asking to participate were
        required to create several dozen accounts just to join the related
        efforts and collaborate across them?
        The answer is: with difficulty.
        Just having links to good things is not enough to support a networked
        movement. Activism as Patriotism only lasted until early 2007.

Wednesday, August 19, 2009
My sketches from 2003 for distributed social network
                      platform with user-centric identity.




    How could the people that I knew shared interests and passion in
    community (both facet to face and online), be able to work together
    across boundaries and domains on the web?

    In 2003 I began to sketch out designs for online “social network
    tools” (that term was not yet in widespread use) for face to face communities to
    connect online. I knew user-centric identity technologies were essential
    but others didnʼt see it yet.

Wednesday, August 19, 2009
To cross boundaries and domains on the web people,
         citizens, consumers needed the power to manage their
         own identity information.

         By identity information I specifically mean the identifiers
         and handles that they use across time and in cyber
         space - controlling the ways in which they are “seen” in
         different contexts.

         To do this we need open technical standards to make
         identifiers portable across contexts and we need
         interfaces to make this easy.




Wednesday, August 19, 2009
The good news is that the identity community has
          come a long way in developing identity management
          tools. Three are discussed in this slideshare.




Wednesday, August 19, 2009
The first two technologies I will be covering are OpenID
     and OAuth - the key protocols in the so-called “open stack”




Wednesday, August 19, 2009
openid.net


Wednesday, August 19, 2009
OpenID creates an integrated and wholistic “online life” (identity)
        replacing the fragmentation that is created by maintaining 100-300
        different accounts for different online services and the necessity to
        create a new one at every website that requires a login.




        Can you imagine how much easier and more pleasant community
        life would be if we could reduce the number of identifiers and
        handles to a manageable number – say under ten.

Wednesday, August 19, 2009
Different persona’s for one user that could
                                 each have a different OpenID URL.

Wednesday, August 19, 2009
The user goes to a website




Wednesday, August 19, 2009
Traditionally the user is
                             presented with the
                             opportunity Login with a
                             user-name and password



Wednesday, August 19, 2009
user name/password
                                                                      is replaced with
                                                                     OpenID login box

                                         The user enters a URL they control
                                             - like their blog URL or from a provider.



                             * Newer user interfaces allow user to pick
                             Open ID provider they might have like
                             Google,Yahoo, Myspace, Facebook, AOL etc...

Wednesday, August 19, 2009
The website the
                              user is logging into

                             redirects the user to
                               where their URL


Wednesday, August 19, 2009
The user
        is asked to
       authenticate




Wednesday, August 19, 2009
The user responds
  with a password
     (or other additional
   methods of authentication
         like a token)




Wednesday, August 19, 2009
Authentication is successful!

       The site with the user’s URL
      redirects the user back to the
                                       the user is
      website they are logging into.
                                        logged in




Wednesday, August 19, 2009
Who’s In?
        Corporate Members:
          •   Facebook - Luke Shepard
          •   Google - Eric Sachs
          •   IBM - Nataraj (Raj) Nagaratnam
          •   Microsoft - Michael B. Jones   Community Members:
          •   PayPal - Andrew Nash            • Brian Kissel (JanRain)
          •   VeriSign - Gary Krall           • Chris Messina (independent)
          •   Yahoo! - Raj Mata               • David Recordon (Six Apart)
                                                 • Joseph Smarr (Plaxo)
                                                 • Nat Sakimura (Nomura
                                                   Research Institute)
                                                 • Scott Kveton
                                                 • Snorri Giorgetti (OpenID Europe)
                                                 • Allen Tom (Yahoo)

Wednesday, August 19, 2009
What you can do:



                             * Accept OpenID’s

                             * Issue OpenID’s (to employees)

                             * Issue OpenID’s to your user base




Wednesday, August 19, 2009
Single Sign On isnʼt enough though.
               You also have to empower people to be able to
               share data their own data.




                                 oauth.net

Wednesday, August 19, 2009
The user belongs to two different sites.
Wednesday, August 19, 2009
How can the user move photos from photo site to the
             social network site without giving away the password
                 for the photo site to the social network site?
Wednesday, August 19, 2009
The user asked if they want to share - then
              redirected to the site to give their permission

Wednesday, August 19, 2009
The photo site gives the social network site a token
               to the social network that gives it access to their account.
Wednesday, August 19, 2009
A data tunnel is created between the user’s
                                       accounts on both sites
Wednesday, August 19, 2009
A user posts photos and they can flow from
            one to the other - and they didn’t give away their password.

Wednesday, August 19, 2009
Who’s In?




Wednesday, August 19, 2009
What you can do:

                                END THE
                               PASSWORD
                              ANTI-PATTERN
                STOP Asking users for their password to gain
                   access to another site on their behalf


                        Implement Oauth on your site
                        Ask your partners to implement it.

Wednesday, August 19, 2009
informationcard.net


Wednesday, August 19, 2009
Wednesday, August 19, 2009
Wednesday, August 19, 2009
Wednesday, August 19, 2009
Wednesday, August 19, 2009
Reminders



Wednesday, August 19, 2009
Who’s In?


                             Card Space




Wednesday, August 19, 2009
Who’s In?




Wednesday, August 19, 2009
What you can do:
         *Issue information cards to members of your
         site/organization
         *Accept information cards from netizens to
         collect information you think is important
         *Use it to get third party validation about key
         things important to you - so you donʼt have
         to do identity proofing.



Wednesday, August 19, 2009
Kaliya Hamlin
                                     Identity Woman

                                     @identitywoman
                                    identitywoman.net
                                   skype:identitywoman
                                AIM/e-mail:kaliya@mac.com

                             co-founder, co-producer and the facilitator of the


              INTERNET IDENTITY WORKSHOP .com

Wednesday, August 19, 2009

More Related Content

PPTX
Redbubble User Agreement - Why so Contentious?
PDF
Implementing the Social Web
PDF
A Social Web Intro at the Internet Identity Workshop
PDF
WordPress Policy Primer
PPT
What is web2.0 2003 version
PPT
PPTX
IOER Creative Commons Licenses
PDF
Web 2.0 and New Learning Paradigms
Redbubble User Agreement - Why so Contentious?
Implementing the Social Web
A Social Web Intro at the Internet Identity Workshop
WordPress Policy Primer
What is web2.0 2003 version
IOER Creative Commons Licenses
Web 2.0 and New Learning Paradigms

Similar to Online Identity for Community Managers: OpenID, OAuth, Information Cards (20)

PDF
OpenID DrupalCon 2009
PDF
The Open, Social Web Workshop
PPT
OpenID Progress EEMA Conference
PDF
Us our Organizations and the Evolving Web v2
PDF
web 2.0 Implementing the Social Web
PPT
OpenID Foundation Presentation to CIO Organization of Multnomah County, Oregon
PDF
(Ab)using Identifiers: Indiscernibility of Identity
PDF
2 Conferences in 1 hour
KEY
Easy Testing On Ruby Openid Consumers
PDF
Unconferences & New Web Initiatives
PDF
New Assumptions for Designing for the Social Web
KEY
The Gadget Life: A History of Social Networking
PDF
FOIPOP Presentation Richard Rosenberg
PDF
Our online identity
PPTX
Email and socialnetworking
ZIP
Pragmatic Designer's Guide to Identity on the Web
PDF
Freedom to Aggregate, Freedom to Disaggregate
PDF
The Evolution & Future of Social Networking
OpenID DrupalCon 2009
The Open, Social Web Workshop
OpenID Progress EEMA Conference
Us our Organizations and the Evolving Web v2
web 2.0 Implementing the Social Web
OpenID Foundation Presentation to CIO Organization of Multnomah County, Oregon
(Ab)using Identifiers: Indiscernibility of Identity
2 Conferences in 1 hour
Easy Testing On Ruby Openid Consumers
Unconferences & New Web Initiatives
New Assumptions for Designing for the Social Web
The Gadget Life: A History of Social Networking
FOIPOP Presentation Richard Rosenberg
Our online identity
Email and socialnetworking
Pragmatic Designer's Guide to Identity on the Web
Freedom to Aggregate, Freedom to Disaggregate
The Evolution & Future of Social Networking
Ad

More from Kaliya "Identity Woman" Young (20)

PDF
Verifiable credentials explained by CCI
PDF
History of Identity in Computers
PDF
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
PDF
Aadhaar Identity North Presentation
PDF
Domains of Identity and Self-Sovereign Identity India talk
PDF
The Domains of Identity & Self-Sovereign Identity MyData 2018
PDF
Self-Sovereign Identity for the Decentralized Web Summit
PDF
Domains of Identity
PDF
Ecosystem map Prototype & Future Vision
PDF
InDITA - Understanding Self-Sovereign Identity
PDF
Blockchain v Cryptocurrency: Talk for BridgeSF
PDF
Self-Sovereign Identity: Lightening Talk at RightsCon
PDF
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
PDF
My Identiverse: The Evolution of Digital Identity and Openness
PDF
Identity 101: Boot Camp for Identity North 2016
PDF
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
PPTX
Ethical Market Models in the Personal Data Ecosystem
PPT
Personal Clouds + Augmented Reality
PDF
Identity and Context : People and Personal Data
Verifiable credentials explained by CCI
History of Identity in Computers
Insight analytics: Identity Nexus - The Future of Consumer Personal Information
Aadhaar Identity North Presentation
Domains of Identity and Self-Sovereign Identity India talk
The Domains of Identity & Self-Sovereign Identity MyData 2018
Self-Sovereign Identity for the Decentralized Web Summit
Domains of Identity
Ecosystem map Prototype & Future Vision
InDITA - Understanding Self-Sovereign Identity
Blockchain v Cryptocurrency: Talk for BridgeSF
Self-Sovereign Identity: Lightening Talk at RightsCon
Identity is Changing: The Rise of Self-Sovereign Identity Infrastructure usin...
My Identiverse: The Evolution of Digital Identity and Openness
Identity 101: Boot Camp for Identity North 2016
My Data, My Value: 6 Sense Making Diagrams from the Personal Data Ecosystem.
Ethical Market Models in the Personal Data Ecosystem
Personal Clouds + Augmented Reality
Identity and Context : People and Personal Data
Ad

Recently uploaded (20)

PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Artificial Intelligence
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
project resource management chapter-09.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
A novel scalable deep ensemble learning framework for big data classification...
MIND Revenue Release Quarter 2 2025 Press Release
OMC Textile Division Presentation 2021.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
WOOl fibre morphology and structure.pdf for textiles
A comparative analysis of optical character recognition models for extracting...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1. Introduction to Computer Programming.pptx
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence
SOPHOS-XG Firewall Administrator PPT.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Hindi spoken digit analysis for native and non-native speakers
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
project resource management chapter-09.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
A comparative study of natural language inference in Swahili using monolingua...

Online Identity for Community Managers: OpenID, OAuth, Information Cards

  • 1. Online Identity: OpenID, OAuth, Information Cards OCRN Aug 2009 Kaliya Hamlin, Identity Woman @identitywoman identitywoman.net skype:identitywoman AIM/e-mail:kaliya@mac.com co-founder, co-producer and the facilitator of the INTERNET IDENTITY WORKSHOP www.internetidentityworkshop.com Wednesday, August 19, 2009
  • 2. I am a community builder. This is the technical community around user-centric digital identity that I have helped build. We have met since 2005 every 6 months at the Internet Identity Workshop. Wednesday, August 19, 2009
  • 3. In mid 2004 Julia Butterfly Hill launched this website to encourage people to be active and linked to 40+ organizations. These sites had about 50 login opportunities - each one of them each required a new/ different user name and password. How were all these groups going to work together –to form a strong community - if the citizens they were asking to participate were required to create several dozen accounts just to join the related efforts and collaborate across them? The answer is: with difficulty. Just having links to good things is not enough to support a networked movement. Activism as Patriotism only lasted until early 2007. Wednesday, August 19, 2009
  • 4. My sketches from 2003 for distributed social network platform with user-centric identity. How could the people that I knew shared interests and passion in community (both facet to face and online), be able to work together across boundaries and domains on the web? In 2003 I began to sketch out designs for online “social network tools” (that term was not yet in widespread use) for face to face communities to connect online. I knew user-centric identity technologies were essential but others didnʼt see it yet. Wednesday, August 19, 2009
  • 5. To cross boundaries and domains on the web people, citizens, consumers needed the power to manage their own identity information. By identity information I specifically mean the identifiers and handles that they use across time and in cyber space - controlling the ways in which they are “seen” in different contexts. To do this we need open technical standards to make identifiers portable across contexts and we need interfaces to make this easy. Wednesday, August 19, 2009
  • 6. The good news is that the identity community has come a long way in developing identity management tools. Three are discussed in this slideshare. Wednesday, August 19, 2009
  • 7. The first two technologies I will be covering are OpenID and OAuth - the key protocols in the so-called “open stack” Wednesday, August 19, 2009
  • 9. OpenID creates an integrated and wholistic “online life” (identity) replacing the fragmentation that is created by maintaining 100-300 different accounts for different online services and the necessity to create a new one at every website that requires a login. Can you imagine how much easier and more pleasant community life would be if we could reduce the number of identifiers and handles to a manageable number – say under ten. Wednesday, August 19, 2009
  • 10. Different persona’s for one user that could each have a different OpenID URL. Wednesday, August 19, 2009
  • 11. The user goes to a website Wednesday, August 19, 2009
  • 12. Traditionally the user is presented with the opportunity Login with a user-name and password Wednesday, August 19, 2009
  • 13. user name/password is replaced with OpenID login box The user enters a URL they control - like their blog URL or from a provider. * Newer user interfaces allow user to pick Open ID provider they might have like Google,Yahoo, Myspace, Facebook, AOL etc... Wednesday, August 19, 2009
  • 14. The website the user is logging into redirects the user to where their URL Wednesday, August 19, 2009
  • 15. The user is asked to authenticate Wednesday, August 19, 2009
  • 16. The user responds with a password (or other additional methods of authentication like a token) Wednesday, August 19, 2009
  • 17. Authentication is successful! The site with the user’s URL redirects the user back to the the user is website they are logging into. logged in Wednesday, August 19, 2009
  • 18. Who’s In? Corporate Members: • Facebook - Luke Shepard • Google - Eric Sachs • IBM - Nataraj (Raj) Nagaratnam • Microsoft - Michael B. Jones Community Members: • PayPal - Andrew Nash • Brian Kissel (JanRain) • VeriSign - Gary Krall • Chris Messina (independent) • Yahoo! - Raj Mata • David Recordon (Six Apart) • Joseph Smarr (Plaxo) • Nat Sakimura (Nomura Research Institute) • Scott Kveton • Snorri Giorgetti (OpenID Europe) • Allen Tom (Yahoo) Wednesday, August 19, 2009
  • 19. What you can do: * Accept OpenID’s * Issue OpenID’s (to employees) * Issue OpenID’s to your user base Wednesday, August 19, 2009
  • 20. Single Sign On isnʼt enough though. You also have to empower people to be able to share data their own data. oauth.net Wednesday, August 19, 2009
  • 21. The user belongs to two different sites. Wednesday, August 19, 2009
  • 22. How can the user move photos from photo site to the social network site without giving away the password for the photo site to the social network site? Wednesday, August 19, 2009
  • 23. The user asked if they want to share - then redirected to the site to give their permission Wednesday, August 19, 2009
  • 24. The photo site gives the social network site a token to the social network that gives it access to their account. Wednesday, August 19, 2009
  • 25. A data tunnel is created between the user’s accounts on both sites Wednesday, August 19, 2009
  • 26. A user posts photos and they can flow from one to the other - and they didn’t give away their password. Wednesday, August 19, 2009
  • 28. What you can do: END THE PASSWORD ANTI-PATTERN STOP Asking users for their password to gain access to another site on their behalf Implement Oauth on your site Ask your partners to implement it. Wednesday, August 19, 2009
  • 35. Who’s In? Card Space Wednesday, August 19, 2009
  • 37. What you can do: *Issue information cards to members of your site/organization *Accept information cards from netizens to collect information you think is important *Use it to get third party validation about key things important to you - so you donʼt have to do identity proofing. Wednesday, August 19, 2009
  • 38. Kaliya Hamlin Identity Woman @identitywoman identitywoman.net skype:identitywoman AIM/e-mail:kaliya@mac.com co-founder, co-producer and the facilitator of the INTERNET IDENTITY WORKSHOP .com Wednesday, August 19, 2009