Andrew Nash, CTO of Trulioo, and a Google and PayPal identity alumnus, gets at the heart of why Internet-scale identity is pretty much stuck with only Facebook Connect. He offers some ideas about several ways to make it work for other large consumer IDPs like banks:
Additionally, Stephen Wilson, John Fontana, and Anil John have articles about related topics. Â Read those and more below:
Stephen Wilson: The devil is in the legals "And it's the same with federated identity. Accepting another bank's identification of an individual is something that cannot be done casually. Regardless of the common sense embodied in federated identity, the banks' lawyers are saying to all institutions, sure, we know you're all putting customers through the same identity proofing protocols, but unless there is a contract in place, you must not rely on another bank's process; you have to do it yourself."
Anil John: Will Consumer IdPs Become the Maginot Line of Federated Identity? "I've recently been thinking about risk management and compensating controls as it applies to the delivery of online services that require higher assurances of identity. One item that regularly comes up in this area is the existence of entities that are conducting sensitive (financial or otherwise) transactions using nothing more than a userid and password. Their ability to do so is attributed to the downstream (from the authentication event) analytics and compensating controls that they have implemented. The questions being asked are "Can the assertion of identity from these entities be treated as having an assurance level greater than what can be attributed solely to the token that they are using (userid/password at LOA1)?" or "Should the granularity of the LOA levels themselves be changed to accommodate these additional capabilities that are being used?""
Ian Glazer: Representation over Storage: Responding to "Killing IAM" "I put my 18 minute ramble/rant on Killing IAM out on the blog a few weeks back, and I have to say, I have been blown away by the response. Besides all the comments on the blog itself, I've had multiple people take me aside to discuss some of the implications of killing IAM off so that it can be reborn. And I have to give Michel Prompt at Radiant Logic a special call-out for not one, but two, blog posts in response to what I said."
Phil Windley: Build the World You Want to Live In "I gave a talk and then was on a panel at the Silicon Valley edition of the New Digital Economies conference on Wednesday. During the panel, I gave this challenge to the audience: you have an ethical responsibility to build the world you want to live in."
Craig Burton: The FaÃ§ade Proxy "A FaÃ§ade is an object that provides simple access to complex - or external - functionality. It might be used to group together several methods into a single one, to abstract a very complex method into several simple calls or, more generically, to decouple two pieces of code where there's a strong dependency of one over the other."
Jason Bloomberg: The Sound of Water Dripping in the Cloud "In fact, there are so many different mistakes you can make that will run up your Cloud bill unnecessarily that it's a wonder anybody can save money in the Cloud at all. The most commonly discussed of these mistakes is the problem of zombie instances. If your IT shop doesn't have adequate deprovisioning policies, then people will tend to leave instances running long after they've served their purpose. Over time, people forget why they're still around, and nobody will want to deprovision them on the off chance there's something important on them."
Mark Dixon: SquareTag Identity Relationship Diagram "Combining my thoughts about my SquareTag Blogtagging experiment and Identity Relationship Diagrams, I created the following diagram, which illustrates my understanding of how the SquareTag system works:"
Drummond Reed: Please Send Wicked Simple Email "My day job right now involves developing newer, smarter forms of Internet messaging. But until that's available (stay tuned), we're still stuck with email. After 20 years of averaging a third of every working day doing email, I realized I could save hundreds of hours a year--and collectively we could save hundreds of millions of hours a year--by just writing wicked simple email. Here's how:"
Ericka Chickowski: When Active Directory And LDAP Aren't Enough "Scalability, tight coupling with Microsoft infrastructure, and ease of management in the on-premise world all contributed to catapulting Active Directory and the associated LDAP protocol into the centerpiece of today's typical enterprise IAM strategy. However, with new mobile platforms diversifying the operating system ecosystem, SaaS applications proliferating by the day, and hybrid cloud approaches fast becoming de riguer, Active Directory and LDAP are starting to show their limitations."
Doc Searls: Surf's down. For now. "I was talking with @ErikCecil yesterday about the sea change we both detect in people's tolerance for unwanted tracking. They're getting tired of it. So are lawmakers and regulators. (No, not everybody. But not a small percentage. And it's growing.) See here, here, Â here, here, here, here, here, here and here."
Steve Lohr: Big Data Is Opening Doors, but Maybe Too Many "But the latest leaps in data collection are raising new concern about infringements on privacy -- an issue so crucial that it could trump all others and upset the Big Data bandwagon. Dr. Pentland is a champion of the Big Data vision and believes the future will be a data-driven society. Yet the surveillance possibilities of the technology, he acknowledges, could leave George Orwell in the dust."
Gregory Ferenstein: Military ID Verification Service, Troop ID, Raises $2.1 Million "The concept of the business is simple. We noticed that brands were relying on offline channels -- and largely neglecting their digital channels -- to offer active military and veterans commercial discounts, employment opportunities, skill training vouchers, etc," writes Hall to TechCrunch in an email. "When we talked to the marketing and corporate citizenry teams, we discovered that marketers were afraid of fraud and abuse if they offered an exclusive discount via their web and mobile apps -- read a military discount URL getting shared on RetailMeNot or Fat Wallet -- so we developed a Single Sign On that accesses authoritative data stores on the back end so that merchants can offer exclusive discounts, employment opportunties [sic], skill training, etc to service members, veterans, and their immediate family members via their digital channels. "
Identity Woman: Interesting events in 2013 "This is a calendar of events that I know of in 2013 (and beyond). I think they're interesting, I'm currently planning attending all the events in BLACK, I'm helping co-organize all the events with RED headlines. Some events will change from interesting to attending as they approach."
Identity Woman: She's Geeky Seattle: April 26-27 "She's Geeky is a kind of magical event where women geeks of all kinds, gaming geeks, linux geeks, fandom geeks, crafting geeks, beekeeping geeks, drupal geeks, raspberry pi geeks, Arduino geeks, geeks in training, come together and hang out learning from each other."
Dan Whaley: I Annotate: A Workshop "After two decades of progress in infrastructure and web technologies, we believe the time is finally at hand to realize the widespread annotation of human knowledge. On a recent call a suggestion was made to bring together people building annotation solutions with those that ultimately will use them. The obvious sensibility of that idea led a number of us to approach the Andrew W. Mellon Foundation for funding for a workshop, which they approved several weeks ago. We're calling it I Annotate, and it will be April 10-12, here in San Francisco, at the Fort Mason Center."
Identity Woman: Online Community Unconference "Its BACK! "May 21st at the Computer History Museum I am really excited to be working with a super awesome crew of leaders of the Online Community Manager Tribe - or OCTribe. Â We have been considering reviving the event and the pieces have finally come together to do it."
Call For Papers - Open Identity Summit 2013 "September 10th - 11th 2013, Kloster Banz, Germany Deadline for electronic submissions: May 15th, 2013 The aim of Open Identity Summit 2013 is to link practical experiences and requirements with academic innovations. Focus areas will be Research and Applications in the area of Identity Management and Open Source with a special focus on Cloud Computing."
eID & ePass 5th edition "National eID & ePassport Conference - the Global Forum on the drivers behind the digitalization of citizen ID documents proudly announce the 5th edition in Berlin - 2013, 28th & 29th of October @Intercontinental Berlin."