SlideShare a Scribd company logo
1 of 26
Download to read offline
High	
  Value	
  Consumer	
  
Transactions	
  
A	
  Relying	
  Party's	
  Perspective	
  
Image by Andrew Horne
Image by TheeErin
So… what’s the context?
— Consumer	
  to	
  business	
  	
  
— Relying	
  Party	
  supporting	
  Identity	
  Federation	
  
—  User	
  in	
  control	
  
— High	
  value	
  transactions	
  
—  Specifically	
  micro-­‐payments	
  
	
  
Games	
  Platform	
  
Purchase	
  Flow	
  
What we learned
Complicated	
  
•  Customer	
  Service	
  
o  finding	
  the	
  user's	
  
account	
  
•  Access	
  problems	
  due	
  to	
  
issues	
  with	
  the	
  IdP	
  
•  Account	
  recovery	
  
Works	
  
•  Identity	
  Federation	
  for	
  
Authentication	
  
•  Challenge	
  before	
  purchase	
  
Relying Party trends
•  Moving	
  away	
  from	
  identity	
  federation	
  for	
  authentication	
  
•  Using	
  social	
  login	
  for	
  attribute	
  collection	
  
o  RP's	
  really	
  like	
  this	
  
•  Desire	
  to	
  control	
  the	
  entire	
  user	
  experience	
  
What is driving these trends?
•  User	
  Experience	
  Concerns	
  
o  Account	
  recovery	
  
o  Forgot	
  IdP	
  /	
  Login	
  confusion	
  
o  Merging	
  duplicate	
  accounts	
  
o  Linking	
  multiple	
  federated	
  identities	
  together	
  
o  Authentication	
  from	
  Mobile	
  apps	
  
o  Delegation	
  
o  User's	
  account	
  "blocked"	
  at	
  the	
  IdP	
  
o  Customer	
  Service	
  Support	
  
What is driving these trends?
•  Business	
  Concerns	
  
o  Liability	
  and	
  dependence	
  on	
  external	
  party	
  (no	
  contracts)	
  
o  IdP	
  policy	
  mismatch	
  with	
  RP	
  policies	
  (e.g.	
  data	
  use	
  policy)	
  
o  ROI	
  for	
  identity	
  federation	
  (or	
  lack	
  there	
  of)	
  
o  Lack	
  of	
  knowledge/understanding	
  value	
  of	
  identity	
  federation	
  
•  Technical	
  Concerns	
  
o  Legacy	
  system	
  already	
  dependent	
  on	
  username/password	
  
o  Lack	
  of	
  a	
  successful	
  identity	
  standard	
  (or	
  maybe	
  too	
  many	
  
viable	
  ones)	
  
o  Recyled	
  identifiers	
  
Critical for the RP
What	
  is	
  my	
  risk	
  in	
  supporting	
  Identity	
  Federation?	
  
•  How	
  many	
  customers	
  will	
  I	
  gain?	
  
o  lower	
  barrier	
  to	
  entry	
  
•  How	
  many	
  customers	
  will	
  I	
  lose	
  if	
  something	
  goes	
  wrong?	
  
•  What	
  use	
  cases	
  do	
  I	
  need	
  to	
  handle	
  now	
  that	
  I'm	
  relying	
  on	
  
another	
  entity?	
  
•  How	
  much	
  does	
  it	
  cost	
  to	
  implement	
  the	
  mitigation	
  flows	
  
for	
  these	
  new	
  use	
  cases?	
  
Easy solution
•  Make	
  it	
  easy	
  for	
  every	
  RP	
  
to	
  be	
  their	
  own	
  IdP	
  
•  RP	
  controls	
  all	
  the	
  flows	
  
•  No	
  new	
  flows	
  to	
  deal	
  with	
  
•  Well	
  understood	
  user	
  
experience	
  patterns	
  
Problem
Ignores	
  the	
  User	
  
•  Yet	
  another	
  site	
  asking	
  for	
  
a	
  password	
  
•  Identifier/Password	
  
management	
  nightmare	
  
•  Consumer	
  almost	
  
guaranteed	
  to	
  be	
  
compromised	
  
Real solution
•  Trust	
  frameworks	
  to	
  provide	
  some	
  assurances	
  between	
  RPs	
  
and	
  IdPs	
  
•  Industry	
  best	
  practices	
  for	
  the	
  new	
  flows	
  
•  IDaaS	
  provider	
  targeted	
  at	
  consumer	
  services	
  
o  Easy	
  for	
  startups	
  to	
  leverage	
  
o  Mitigations	
  for	
  unexpected	
  outages	
  
o  Support	
  for	
  Federated	
  Identity	
  Providers	
  
Questions & Maybe Answers 
Contact	
  Information	
  
	
  george.fletcher@teamaol.com
http://twitter.com/gffletch
http://about.me/georgefletcher

More Related Content

More from CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

CIS13: Providing High Value Consumer Services as a Relying Party - IDaaS: What Works and What Doesn't

  • 1. High  Value  Consumer   Transactions   A  Relying  Party's  Perspective  
  • 4. So… what’s the context? — Consumer  to  business     — Relying  Party  supporting  Identity  Federation   —  User  in  control   — High  value  transactions   —  Specifically  micro-­‐payments    
  • 5.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. What we learned Complicated   •  Customer  Service   o  finding  the  user's   account   •  Access  problems  due  to   issues  with  the  IdP   •  Account  recovery   Works   •  Identity  Federation  for   Authentication   •  Challenge  before  purchase  
  • 19. Relying Party trends •  Moving  away  from  identity  federation  for  authentication   •  Using  social  login  for  attribute  collection   o  RP's  really  like  this   •  Desire  to  control  the  entire  user  experience  
  • 20. What is driving these trends? •  User  Experience  Concerns   o  Account  recovery   o  Forgot  IdP  /  Login  confusion   o  Merging  duplicate  accounts   o  Linking  multiple  federated  identities  together   o  Authentication  from  Mobile  apps   o  Delegation   o  User's  account  "blocked"  at  the  IdP   o  Customer  Service  Support  
  • 21. What is driving these trends? •  Business  Concerns   o  Liability  and  dependence  on  external  party  (no  contracts)   o  IdP  policy  mismatch  with  RP  policies  (e.g.  data  use  policy)   o  ROI  for  identity  federation  (or  lack  there  of)   o  Lack  of  knowledge/understanding  value  of  identity  federation   •  Technical  Concerns   o  Legacy  system  already  dependent  on  username/password   o  Lack  of  a  successful  identity  standard  (or  maybe  too  many   viable  ones)   o  Recyled  identifiers  
  • 22. Critical for the RP What  is  my  risk  in  supporting  Identity  Federation?   •  How  many  customers  will  I  gain?   o  lower  barrier  to  entry   •  How  many  customers  will  I  lose  if  something  goes  wrong?   •  What  use  cases  do  I  need  to  handle  now  that  I'm  relying  on   another  entity?   •  How  much  does  it  cost  to  implement  the  mitigation  flows   for  these  new  use  cases?  
  • 23. Easy solution •  Make  it  easy  for  every  RP   to  be  their  own  IdP   •  RP  controls  all  the  flows   •  No  new  flows  to  deal  with   •  Well  understood  user   experience  patterns  
  • 24. Problem Ignores  the  User   •  Yet  another  site  asking  for   a  password   •  Identifier/Password   management  nightmare   •  Consumer  almost   guaranteed  to  be   compromised  
  • 25. Real solution •  Trust  frameworks  to  provide  some  assurances  between  RPs   and  IdPs   •  Industry  best  practices  for  the  new  flows   •  IDaaS  provider  targeted  at  consumer  services   o  Easy  for  startups  to  leverage   o  Mitigations  for  unexpected  outages   o  Support  for  Federated  Identity  Providers  
  • 26. Questions & Maybe Answers  Contact  Information    george.fletcher@teamaol.com http://twitter.com/gffletch http://about.me/georgefletcher