Trend in User-Centric Identity Management Technology and its Standards ITU-T Workshop on

advertisement
ITU-T Workshop on
“New challenges for Telecommunication
Security Standardizations"
Geneva, 9(pm)-10 February 2009
Trend in User-Centric Identity
Management Technology and its
Standards
Sangrae Cho(sangrae@etri.re.kr)
Digital ID Security Research Team
ETRI
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
Contents
1. Introduction
2. User-Centric IdM Technology
3. Digital Identity Wallet
4. Conclusion
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
2
Introduction
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
3
Identity Definition
Identity
 The attributes by which an entity is
described, recognized or known
(ITU-T)
 The fundamental concept of
uniquely identifying an object
(person, computer, etc.) within a
context. (OpenGroup)
 A set of claims made by one party
about another party. Claims are
typically conveyed in Signed
Security Tokens (Microsoft)
 The essence of an entity. One's
identity is often described by one's
characteristics, among which may
be any number of identifiers
[Liberty & OASIS]
Geneva, 9(pm)-10 February 2009
Source: ITU-T Report on the Definition of the Term “Identity” 2008
International
Telecommunication
Union
4
Identity Management
Identity Management
Infrastructure that supports for
authentication, authorization, audit and
identity lifecycle including creation,
update and termination of identity
Registration/
Creation
Propagation
Accounts
& Policies
Termination
Maintenance/
Management
Architecture Template for IDM
Source : Burton Group 2006
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
5
Purpose of IdM
 Increase in personal identity as web services are increased :
Improve usability 27 websites join, 7.5 account on average in Korea [Digital
News, ’05.2.23]
 IdM requirement in inter-domain organization as business
relationship has been diversified : Increase in efficiency and
productivity
Increase of demand in SSO & EAM&IAM , Intranet -> Internet
[DigitalIDWorld Newsletter,’05.3.31]
 Increase in personalized service requirements : Create new IT
service & increase in personal privacy
Need privacy protection when new
service is provided in web 2.0[ZDNet, ‘06.12]
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
6
User-Centric
IdM Technology
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
7
Evolution of IdM
Human
’08 Present
.com
.net
.org
.org
.com
.com
System
Silo
Subject for IdM
Identity
Interchange
.net
.org
Centralized
.net
Federated
User-Centric
Domain-centric
User-centric
Unidirectional
Bidirectional
User-Centric : The user is in the middle of a data transaction and the data always flows
through the user’s identity agent. This gives user control of his identity
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
8
User-Centric Identity Concept
Source : OASIS, The Core Concept of Identity 2.0
User consent
User always can allow or deny whether information about them is released
or not (reactive consent management)
User control
User has ability to policy-control all exchanges of identity information
(proactive consent management)
User delegates decisions to identity agents controlled through policy
User-centered
Core subset of the previous two as ‘People in the protocol’
User is actively involved in information disclosure policy decisions at run
time
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
9
Main User-Centric IdM Technology
User-Centric Characteristics in each technology
OpenID
URL based user identifier &
Select user’s IdP
Liberty
Alliance
Permission-based
attribute exchange
Geneva, 9(pm)-10 February 2009
Card
Space
Select User’s IdP
using Identity Selector
International
Telecommunication
Union
10
Trend in Standardization
Current View of IdM Landscape
Source : Report on Identity Management Use Cases and Gap Analysis, ITU-T FG IdM
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
11
Ongoing Standard Projects
in ITU-T SG17
X.1250(X.idmreq): Capabilities for global identity
management trust and interoperability
Requirement for global interoperability among IdM systems
Currently in TAP after re-determined in September 2008
X.1251(X.idif): A Framework for User Control of
Digital Identity
User control enhanced digital identity interchange framework
Currently in TAP after determined in September 2008
X.idm-dm: Common Identity Data Model
Develop common identity data model to express identity
information between IdM systems
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
12
X.1251(X.idif) - Framework
Application Layer
Web Application
Server 1
Digital Identity Client
User Interface Manager
Web Application
Server 2
User Identity Mgt.
Identity Interchange Layer
Identity Web
Server 1
Credential Mgt.
Identity
Token
Identity Web
Server 2
User Identity Mgt.
User Identity Mgt.
Privacy Protection
Privacy Protection
Authorization
Identity
Interchange Service
Authorization
Authentication
Authentication
Authentication
Digital Contract Mgt.
Identity Interchange
Identity Sync Mgt
Token Transformer
Digital Contract Mgt.
Digital Contract Mgt.
Identity Interchange
Identity Interchange
Identity Sync Mgt
Identity Sync Mgt
Communication Layer
Internet
Geneva, 9(pm)-10 February 2009
Wireless
Mobile Comm.
International
Telecommunication
Union
13
Ongoing Standard Projects
in ITU-T
NGN Identity Management
SG13 Q15 NGN Security is responsible
Developing standards based on the result of IdM Focus Group
Y.ngnIdMuse: NGN identity management use
cases
Study use cases when IdM is applied in NGN environment
Y.ngnIdMreq: NGN identity management
requirements
IdM Requirements in NGN
Y.idmFramework: NGN identity management
framework
Global interoperability framework among IdM systems in NGN
International
Geneva, 9(pm)-10 February 2009
Telecommunication
Union
14
Ongoing Standard Projects in ISO
ISO
 Identity Management & Privacy Standard in ISO/IEC JTC1 SC27 WG5
ITU-T / ISO Joint Workshop on identity
management, Lucerne Sept. 2007
WGs within ISO/IEC JTC1/SC27 – IT Security Technologies
 A Framework for Identity Management (ISO/IEC 24760, WD)
 A Privacy Framework (ISO/IEC 29100, CD)
 A Privacy Reference Architecture (ISO/IEC 29101, WD)
 Entity Authentication Assurance ( ISO/IEC 29115, WD)
 A Framework for Access Management (ISO/IEC 29146, WD)
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
15
The Identity Landscape
“Increase in the interest of User-Centric IdM technology
and collaborations between technologies”
“MS, announce to support for OpenID.”
CardSpace supports for Open ID, Plan to
support for interoperability with CardSpace in
Convenience + Trust
Open ID(‘07.02)
+ Privacy Protection
+ Identity Interchange
Convenience
+ Trust
User-Centric
URL-based
(OpenID)
“ETRI, Research collaboration with MS for digital ID
Wallet”(‘07.05)
Digital
Identity
Invisible
(SAML/Liberty)
Card-based
(WS-Trust)
The Identity Landscape 2006 Reconstruct
Johannes Ernst, CEO of NetMesh
Digital ID Security Research Team, ETRI
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
16
Digital Identity Wallet
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
17
User Requirements
Cumbersome every time personal information is
typed in to join a website.
Especially, worrying to enter national resident
number
Inconvenient when logging in to use web service,
harder when mobile web is used in mobile phone
Not secure to enter ID/PWD in public places
Secure way to identify the phishing sites
Hard to remember which websites I have joined
Not easy to update personal information when it is
changed
Hard to move my information from A site to B site
International
for
better
services
Telecommunication
Geneva, 9(pm)-10 February 2009
Union
18
Overview
What is Digital Identity Wallet?
•A digital wallet that helps users to use
easily and keep securely their personal
identity and authentication information
distributed in the cyber space; Digital
Identity Wallet is just like a real wallet we
use in our daily life to keep ID cards and
cash
•System where users can have control over
disclosure of their personal information by
deciding whether he or she would provide
data or not; unwanted disclosure or misuse
of personal data can be prevented
Main functions of Digital Identity
Wallet
•Site registration and authentication
•Identity share and synchronization
•User privacy protection
•Mobile Digital Identity Wallet
Geneva, 9(pm)-10 February 2009
Secure Internet usage with
Digital Identity Wallet
Issue authentication
information
Website A
Issue link data
Registration
& login
Input personal data
Website C
Purchase
& payment
Internet
Shopping mall
Website B
Issue identity
verification data
Data share
Digital Identity Wallet
Identity
verification
organization
Payment
organization
Issue payment
information
Backup,
roaming,
consistency
Identity
Website Personal
verification registration
data
data
information
Authenticatio
n information
Link
data
Website D
Privacy protection
server
Payment
history
International
Telecommunication
Union
19
Services
Site registration service
Identity authentication & verification service
One-click site registration
Support of various
authentication methods
Registered site management
One-click! Mobile
authentication
Phishing site avoidance
Replacement of national
resident no. for ID verification
Secure identity sharing
between sites
Credit card and point card
utilization and reference
Automatic synchronization of
updated personal data
Authentication on a web
interoperating with home
device
Connection with cyber world
Personalized mash-up service
Share and synchronization service
Geneva, 9(pm)-10 February 2009
Other applications
International
Telecommunication
Union
20
Supports for various authentication
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
21
Use Case for Identity Interchange
Personal Finance Management Service
savings, loans info
Bank
Financial info
Stock info
Stock
Estate info
Real Estate
Geneva, 9(pm)-10 February 2009
Digital
Identity Wallet
Financial
Management
International
Telecommunication
Union
22
Conclusion
User-Centric is essential technology
Convenience
Privacy aware security for user
Convergence between IdM technologies
Full User Control
Provide user with full power to control his identity
Enhance privacy
Efficient Identity Interchange
Scalability
Independency
Seamless
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
23
Thank You !!!
Q&A
Geneva, 9(pm)-10 February 2009
International
Telecommunication
Union
24
Download