60 likes | 195 Views
IDESG Functional Model. Draft for consideration. IDESG FUNCTIONAL MODEL (maybe). Claims Service Providers. T R U S T. Register. Identity Proofing. Policy. Bind Credential To Identity. Authenticate. Authentication. Identity Binding. Trust Frameworks. Attribute Provision. Obtain
E N D
IDESG Functional Model Draft for consideration
IDESG FUNCTIONAL MODEL (maybe) Claims Service Providers T R U S T Register Identity Proofing Policy Bind Credential To Identity Authenticate Authentication Identity Binding Trust Frameworks Attribute Provision Obtain Attributes Set Policy Assessment Intermediary - Double Blinding Principals Accreditation Request Services Establish Identity Relying Party Relying Party
Functional Roles • Principals • Relying Parties • Claims Service Providers* • Identity Proofing • Authentication • Identity Binding • Attribute Provision • Intermediary • Double Blinding * NSTIC uses Credential Service Provider, OIDX Identity Service Provider
Claims Service Provider Models • Full Service • All services • May be obtained via 3rd parties • Identity Provider • Registration and Credential Authority • No attribute provision • Registration Authority only • Identity Proofing • RP may subsume this role (e.g. banking ID systems) • Attribute Provider only
NSTIC Principles and the Model • Privacy Enhancing and Voluntary • Principals choose which CSPs to use • Principals set policy on attribute release • Double Blinding provided by Intermediary • Secure and Resilient • Implicit • Interoperable • All functional roles may be distributed using standard protocols and trust frameworks • Cost Effective and Easy to Use • Implicitly hopeful!
Sources • NSTIC Note:AnIdentity Ecosystem Functional Model for the Modern Market • Basic functions: identity proofing, authentication, binding • “intermediary layers can also be used to render the operations between participants blind” • SecureKey Concierge: “Your Sign-In Partner [service provider] won’t know which government service [relying party] you’re accessing and the government won’t know which Sign-In Partner you’re using” • Public Key Infrastructure (PKI) • Separation of Registration and Certificate (binding) authorities • Privacy by Design and the Emerging Personal Data Ecosystem, Ann Cavoukian • “Individuals control their own data [attributes].” • OpenID Connect (not just identity) • Claims Provider: “Server that can return Claims about an Entity” • Claim: “Piece of information asserted about an Entity”