This is another compelling vision of the future by David Siegel, author of Pull. (If you haven’t read it, you should.)  Check out the two MSFT Labs videos. Think about what it would take for an identity ecosystem to support these worlds.

There were several other items of interest to the identity community:


  • John Fontana: W3C moves Do Not Track to showdown phase
    “The showdown over Do Not Track technology and standardization continues today at the kickoff of the three-day long meeting of the World Wide Web Consortium’s Tracking Protection Working Group. At stake is how sharp the teeth will be in the W3C working group’s emerging Web Tracking Protection specification and how much more contentious the clash will become between privacy advocates on one side, and owners of social web sites and digital advertising industry leaders, who have a Do Not Target preference that leaves data collection decisions out of the hands of consumers.”
  • Bill Nelson: The Most Complete History of Directory Services You Will Ever Find
    “I started working with Directory Servers back in 1997 when Netscape was but a fledging company. Over the past 15 years a lot has changed. Companies have come and gone and code has changed hands more times than I care to remember. But one thing remains the same – that little effort started by Tim Howes, Mark Smith, and Gordon Good at the University of Michigan is as important today as it was almost two decades ago.”
    [Thanks for Brad Tumy for finding this post.]
  • Martin Kuppinger: EIC 2012 – what I will talk about
    “EIC 2012 (European Identity and Cloud Conference) will take place in Munich (April 17-20). The conference will again grow significantly, and we will have a mass of interesting sessions there, ranging from keynote sessions to panels, best practices, and several workshops and roundtables. You definitely shouldn’t miss that conference.”
  • Mark Diodati: OTP Systems And Mobile Devices: Don’t Make The Biggest Implementation Mistake
    “Many organizations make the classic distribution mistake; they couple a weak identity proofing mechanism with the deployment of stronger authentication systems.”
  • Anil John: Electronic Authentication, Mobility and Mistakes
    “Over at Gartner, Mark Diodati had a recent blog post regarding issues that are surfacing as part of Gartner's research into mobility. … This brought to mind some discussions that I've been part of regarding the use of tokens at varying levels of assurance and assurance level escalation mechanisms. “
  • Andre Durand: Prepare for BYOD or Get Caught Flat-Footed
    “A recent study from JP Morgan found that global tablet shipments will reach 72 million by the end of 2012, compared to 52 million in 2011. It’s not surprising, then, that over the past 12 months, BYOD (Bring Your Own Device) shot to the top of IT departments’ list of headaches. As this trend continues to accelerate, IT can no longer deny access to employees looking to bring their personal devices onto the corporate network.”
  • Dave Kearns: User-centric Identity – the Ethernet of identity protocols?
    “But there’s a new lightweight, user-oriented identity protocol rising, and it’s called “OpenID Connect”! And OpenID Connect bears a relationship to OpenID similar to Gigabit Ethernet’s relationship to Metcalfe’s Ethernet. That is, they share a name.”
  • SCIMming the Surface
    “SCIM seems to be a new specification with ambition to succeed where SPML failed. The effort of SCIM seems to be more realistic and practical, yet it is still struggling with similar issues as SPML. As an architect of midPoint, I'm looking at SCIM from the point of view of a potential implementer and also partially as a researcher. Here is a list of issues that immediately stuck me when I was reading the core schema specification of SCIM:”
  • Travis Spencer: Update on SCIM
    “The SCIM crew descended on Paris two weeks ago for the IETF 83 meeting. “
  • Mike Jones: April 10, 2012 OpenID Connect Update Release
    “The OpenID Connect working group has released an update to the OpenID Connect specifications that continues incorporating significant developer feedback received, while maintaining as much compatibility with the implementer’s drafts as possible. The Connect specs have also been updated to track updates to the OAuth and JOSE specs, which they use. “
  • Drummond Reed: PLOA – Just What You Need to Know
    “But the biggest challenge with PLOA has been that it’s a worldview shift about how identity assurance really needs to work. As such, it solves so many related problems together that it’s hard to sum it up in a nutshell the same way you can for OpenID (“lets you use one username and password across all OpenID-enabled sites”) or OAuth (“lets you give access to your private stuff online without giving out your password”). After seeing Jay’s demo, the light bulb finally hit for me: PLOA is Need to know for assurance.”
  • Netflix update for Xbox 360 brings single sign-on, Facebook Connect in the UK and more
    “In practical terms, this means that it will now be easier to access your Netflix content on an Xbox 360, even if the games console is not yours – all you have to do is to log in with your Xbox LIVE credentials.”


  • Nat Sakimura: OpenID Connect IdP On iPhone
    “As part of the exercise to see if OpenID Connect Messages 1.0 were written appropriately so that other bindings can be produced, Jun Eijima and I have created a custom scheme binding of the OpenID Connect, and implemented it on iPhone.”


  • Kantara Initiative Summit, April 17 at EIC Munich
    “Tuesday, April 17, 2012, 8:00am-1:30pm, Room Galerie, Dolce Ballhaus Forum, Andreas-Danzer-Weg, 85716 Unterschleißheim, Munich, Germany (at the European Identity Conference 2012)
    Gain “state-of-identity” insights through a series of presentations of common scenarios from diverse market leaders.  We will focus on Trust Framework Model, deployment interoperability, and what your organization can do to get involved.”
  • Complimentary EIC Workshop: A review of the Status of Key Internet ID Protocols OpenID Connect, OAuth 2.0 and Account Chooser
    “17.04.2012 09:00 - 11:00. A high level overview of the protocol, and an explanation of why major technology companies have standardized on it including Google, Microsoft, Facebook, Yahoo, etc. We will also discuss how the functionality of the OpenID v2 protocol has been reimplemented on top of OAuth to create OpenID Connect. The session will also review the new Account Chooser protocol and discuss the security problems of websites that run their own password based login systems.”
  • Personal Data Ecosystem Meet-Up – Austin
    “Monday April 23, 2012, 7 - 10 pm, 621 E 6th Street, Austin TX
    If you didn’t get enough identity and personal data chat, wrap up your day at this informal networking event where you can enjoy some of the fine local Austin cuisine and view the works of many local artists at the Golab Gallery. Musical entertainment to be provided by Haystack Rodeo. Dinner, beer and wine will be served : Cazamance, Koriente”
  • Register Now for InCommon Confab (April 26-27 in Arlington, VA)
    “The program includes three keynotes:
    *       Ian Glazer, research director at Gartner, who leads their coverage of identity and access governance and privacy.
    *       Anil John, a digital security and service orientation expert with the U.S. GSA and FICAM
    *       Ken Klingenstein, senior director for middleware and security at Internet2, and one of the world's thought leaders in federated identity.
    There will also be general sessions on a new business model for leveraging federated identity to streamline the admissions process, and the future of federation technology.”


  • Apigee: Six Design Patterns for Highly Successful Mobile Apps
    “For years, building web apps has required server-side code and a database. That was great for browsers, but then mobile apps came along and changed everything. Today apps appear on any number of devices, including browsers, and the same app needs to run seamlessly on multiple devices. “

Cloud Computing

  • Phil Windley: A Programming Model for Personal Clouds
    “For these changes to take place, personal clouds must be able to do more than store personal data and mediate interactions with it—as important as that is. Your personal cloud must run applications for you, under your direction.”
  • It’s official: IBM and Red Hat get with OpenStack
    “As GigaOM reported last week, the two tech giants will join the nascent OpenStack Foundation as Platinum members along with AT&T, Canonical, Hewlett-Packard, Nebula, Rackspace, and Suse.”
  • SaaS, PaaS and IaaS: three cloud models; three very different risks
    ‘Software as a Service has password issues. Platform as a Service has encryption issues. Infrastructure as a Service has rogue user issues.”
  • Twitter open sources its MySQL secret sauce
    “Twitter has shared numerous aspects of its infrastructure over the past few years, and its decision to open source its work on MySQL might be the social media platform’s most useful contribution yet. Sure, open source big data tools are valuable, but they’re not MySQL.”

Valuable Identity

  • Anil John: Assurance Level Escalation and Government Relying Parties
    “In particular, Assurance Level Escalation is considered a special case of multi-token authentication, where the presentation of the first token and the second token are simply separated in time.”
  • John Fontana: Gov.-led ID plan picks finalists for $10 million grant program
    “The government-led digital identity strategy known as NSTIC has selected 27 finalists as part of a $10 million grant program seeking pilot project proposals likely to become the anchors of a standards-based ID infrastructure.”
  • We Can See Mobile Payments from Here!
    “I attended the Mobile Contactless Payment Innovation Summit in San Francisco last week. The audience included representatives from payments companies, enablers, solution providers and merchants all engaged in mobile payments. Given the constant rate of innovation in mobile payments and recent network incentives for EMV in the US, there was a great deal to talk about.”
  • Jon Callas: Bitcoin observation
    “Did you know that if a Bitcoin is destroyed, then the value of all the other Bitcoins goes up slightly? That's incredible. It's amazing and leads to some emergent properties. … The end of all this musing, though, is that I believe that a decentralized coinage that has the property that destroying a coin has value *inevitably* leads to centralization through the Highlander Constant.

TV Everywhere


* Required Fields