SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Mature Digital Trust Infrastructure  Are we there yet? Søren Peter Nielsen, Chief IT Architect Danish National IT and Telecom Agency presented June 9th at European e-Identity Management Conference 2011 Tallinn, Estonia
Identities in eGovernment - a look to the future ,[object Object]
Conceptually – It seems simple
Web SSO Model 1 4 5 6 3 Identity Provider “ Circle of Trust” Service Provider Authentication Authority Attribute Authority 7 2
Federation Building Blocks Business & Operating Rules Operational  Infrastructure Service Providers/   Identity Providers Policy Technical  Standards Auditing / Accreditation
Authentication Assurance Levels Factor Token Very  High High Medium Low Employee  Screening  for a High  Risk Job Obtaining  Govt.  Benefits Applying  for a Loan  Online Access to  Protected  Website PIN/User ID - Knowledge Strong Password - Based PKI/ Digital Signature Multi - Increased $ Cost Increased Need for Identity Assurance
Areas that determine the  Level of Assurance ,[object Object],[object Object],[object Object],[object Object]
EU eGov Benchmark 2010 Fundamental IT enablers Key Horizontal Enablers
Have we crossed the chasm for eID?
Do we have full adoption? Credit to: Simon Wardley
Do we have the right assumptions? Intended Strategy Realised Strategy Fix This! Fixed! DeliberateStrategy IDM dev
The world is not standing still Intended Strategy Realised Strategy Deliberate Strategy Unrealised  Strategy Emergent Strategy Fixed! ???
No organisation is an Island anymore
But the approach to Identity and Access management is still rooted in industrial age thinking Architecture and mindsets are locked into the  identification-oriented paradigm
Areas with requirements determining Assurance level ,[object Object],[object Object],[object Object],[object Object]
Architecture and mindsets ,[object Object],[object Object]
Validation-oriented paradigm (i.e. the user can prove that he represents a pseudonym via a secret key).  Instead of all applications identifying the users and coupling local data to the identity (e.g. SSN),  data is coupled  to virtual identities  (pseudonyms), which  are subject  to validation
Credit to: Simon Wardley
Credit to: Simon Wardley
Credit to: Simon Wardley identification-  and validation- oriented  paradigms  identification-  oriented  paradigm
Credit to: Simon Wardley Digital Trust  Infrastructure
Are We There Yet? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Contact ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
Delivering Imperatives of Modern Organizations Such As Cybersecurity and Open...
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08Kantara trust frameworks 2016 05-08
Kantara trust frameworks 2016 05-08
 
Kantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy InternetKantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy Internet
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
 
Monage.io identity presentation 3.22.17 v3
Monage.io   identity presentation 3.22.17 v3Monage.io   identity presentation 3.22.17 v3
Monage.io identity presentation 3.22.17 v3
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21
 
G.k
G.kG.k
G.k
 
H Rajendra Kamath
H Rajendra KamathH Rajendra Kamath
H Rajendra Kamath
 
Guide for understanding digital signature
Guide for understanding digital signatureGuide for understanding digital signature
Guide for understanding digital signature
 
Ki overview-2014
Ki overview-2014Ki overview-2014
Ki overview-2014
 
US Government’s Position on FIDO within NSTIC
US Government’s Position on FIDO within NSTICUS Government’s Position on FIDO within NSTIC
US Government’s Position on FIDO within NSTIC
 
Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Mastercard CMU Capstone Midsummer Presentation
Mastercard CMU Capstone Midsummer PresentationMastercard CMU Capstone Midsummer Presentation
Mastercard CMU Capstone Midsummer Presentation
 
Authenticated Document/Data Exchange
Authenticated Document/Data ExchangeAuthenticated Document/Data Exchange
Authenticated Document/Data Exchange
 

Andere mochten auch (7)

Cloud - Two examples
Cloud - Two examplesCloud - Two examples
Cloud - Two examples
 
Det Smarte Grid - Soren.Peter.Nielsen på #kant12
Det Smarte Grid - Soren.Peter.Nielsen på #kant12Det Smarte Grid - Soren.Peter.Nielsen på #kant12
Det Smarte Grid - Soren.Peter.Nielsen på #kant12
 
Smart Energy @ Home - a project that lives by data
Smart Energy @ Home -  a project that lives by dataSmart Energy @ Home -  a project that lives by data
Smart Energy @ Home - a project that lives by data
 
Redes sociales Corporativas en las Administraciones Públicas
Redes sociales Corporativas en las Administraciones PúblicasRedes sociales Corporativas en las Administraciones Públicas
Redes sociales Corporativas en las Administraciones Públicas
 
Gestión Centralizada de Certificados de Firma Electrónica
Gestión Centralizada de Certificados de Firma ElectrónicaGestión Centralizada de Certificados de Firma Electrónica
Gestión Centralizada de Certificados de Firma Electrónica
 
SIACERT TRUSTED SERVICES
SIACERT TRUSTED SERVICESSIACERT TRUSTED SERVICES
SIACERT TRUSTED SERVICES
 
Custodia de Documentación Electrónica
Custodia de Documentación ElectrónicaCustodia de Documentación Electrónica
Custodia de Documentación Electrónica
 

Ähnlich wie Mature Digital Trust Infrastructure - Are we there yet?

AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
tonkung6
 

Ähnlich wie Mature Digital Trust Infrastructure - Are we there yet? (20)

The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
Crypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedgerCrypto Valley Conference 2019 - CULedger
Crypto Valley Conference 2019 - CULedger
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityThe Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf10 Most Trusted Authentication Solution Providers of 2023.pdf
10 Most Trusted Authentication Solution Providers of 2023.pdf
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdfAnevaluationofsecurestorageofauthenticationdataIJISR.pdf
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Mature Digital Trust Infrastructure - Are we there yet?

  • 1. Mature Digital Trust Infrastructure Are we there yet? Søren Peter Nielsen, Chief IT Architect Danish National IT and Telecom Agency presented June 9th at European e-Identity Management Conference 2011 Tallinn, Estonia
  • 2.
  • 3. Conceptually – It seems simple
  • 4. Web SSO Model 1 4 5 6 3 Identity Provider “ Circle of Trust” Service Provider Authentication Authority Attribute Authority 7 2
  • 5. Federation Building Blocks Business & Operating Rules Operational Infrastructure Service Providers/ Identity Providers Policy Technical Standards Auditing / Accreditation
  • 6. Authentication Assurance Levels Factor Token Very High High Medium Low Employee Screening for a High Risk Job Obtaining Govt. Benefits Applying for a Loan Online Access to Protected Website PIN/User ID - Knowledge Strong Password - Based PKI/ Digital Signature Multi - Increased $ Cost Increased Need for Identity Assurance
  • 7.
  • 8. EU eGov Benchmark 2010 Fundamental IT enablers Key Horizontal Enablers
  • 9. Have we crossed the chasm for eID?
  • 10. Do we have full adoption? Credit to: Simon Wardley
  • 11. Do we have the right assumptions? Intended Strategy Realised Strategy Fix This! Fixed! DeliberateStrategy IDM dev
  • 12. The world is not standing still Intended Strategy Realised Strategy Deliberate Strategy Unrealised Strategy Emergent Strategy Fixed! ???
  • 13. No organisation is an Island anymore
  • 14. But the approach to Identity and Access management is still rooted in industrial age thinking Architecture and mindsets are locked into the identification-oriented paradigm
  • 15.
  • 16.
  • 17. Validation-oriented paradigm (i.e. the user can prove that he represents a pseudonym via a secret key). Instead of all applications identifying the users and coupling local data to the identity (e.g. SSN), data is coupled to virtual identities (pseudonyms), which are subject to validation
  • 18. Credit to: Simon Wardley
  • 19. Credit to: Simon Wardley
  • 20. Credit to: Simon Wardley identification- and validation- oriented paradigms identification- oriented paradigm
  • 21. Credit to: Simon Wardley Digital Trust Infrastructure
  • 22.
  • 23.