Developer Workshop For Those Interested in Using Identity in Their Services and Tools

The Internet Identity Workshop presents an
Informational Morning for Developers

Hosted by Doc Searls,Mary Hodder and Kaliya Hamlin

Monday, December 12, 2005 9-12 noon, with lunch from 12-1

Canton Dim Sum @ 655 Folsom St in San Francisco.

Cost $20 for lunch (PLEASE RSVP HEREas the Canton Restaurant has been kind enough to give us the space if we all have lunch there, but we need an accurate count by Sunday at noon).

If you are a developer working on a application that has folks login – this is a morning for you.

Doc Searls will begin the day giving an overview of the identity landscape. He and others will answer the question:
* Why do identity systems matter when building new systems and tools?

We are bringing together a spectrum of folks who have been working on developing identity systems and tools. Identity Developers will share their work, basics and best practices to date to get started exploring integrating identity into these applications. These include YADIS, LID, Open ID, i-names/XRI, SXIP, among others.

Developers of applications who have included identity into their services and tools will share briefly how they’ve done it. Application developers will hear from and meet with identity developers to ask questions.

Event Info
Detailed Agenda
and RSVP here.
(sorry for the 2nd post on this blog but it finally sound.

Passel: identity. remixed.

DizzyD presented on Passel and The Identity Gang is in the HOUSE! Johanes, Doc, Phil, Mary and Mary – wow three identity women.
He also didn’t really approach it right he didn’t get all the different systems and how they worked and we were all in the audience correcting him. It really highlighted the need for the workshop we are hosting in October.

Here is the summary:
How do I as user my identity on the web?
The ‘story that started it all’
Wife’s machine got Trojan. I had to change all passwords everywhere.

What is Identity?!
Identity is just another class of information we manage.
It’s a second-order problem. When I get on the net I get on it to do Identity Management other tasks.

What is Identity [Italicized] ?
Depends on the setting

Bottom line two fundamental types
third party vouch for and self asserted

His summary of the other stuff..

What are the options:
Passport
All others are not inherently evil.
everyone is throwing protocols against the wall and seeing which ones stick.
who do you trust to host you identity?

SAML
SAML/Liberty
trust relatinoship between two entities on your behalf
“asserting” used a lot in this world….and I will use it a lot

Standards are well documented and widely deployed. Lots of infrastructure required for trust relationships. Conditionals and trust relationships not viable from an open source stand point. Took a lot of time for a second order problem.

SXIP
Identity is locked into who the identity provider. You can change home sites. not locked in. Run on own machine. Powerful for users with centralized for user to move.

LID
Send information back and forth and urls based.

OpenID
No dynamic scripting needed. You have your identity URL tell via meta tag where identity server is. enter URL – blog URL. LiveJournal do you allow it to authenticate?

Can’t i-names do this?
He asserted wrongly that there was not reputation (global services launch will embed reputation in the messaging/contact system.

For Internet-scale Identity needs

  • Aggregate IDentity
  • Decentralized and open
  • Divers programming Language/environments
  • Interoperable implementations
  • Bootstrap off existing trust models

PASSEL
Gives you more control over data
Aggregates your identity via user-centric three-piece architechure
implemntations already started Perl, PHP, Java and C#
Pluggable trust models.

Generalized model for proving any DNS-based identifier
Trust Model

  • how you prove the signer
  • person x
  • Moving identity information proving that a
  • protocol how move around
  • plug in how you trust information

PIECES:
Agent (principle’s computer)

  • aggregates into portfolio
  • public private key and fingerprint
  • natively if not
  • Zip file on key – use on different locations

Signer (site that makes assertions)

  • signer issues token with for example 4 hour life span
  • agent must retrieve new token from dizzyd.com

Target (relying party)

  • how does the
  • retrieval of public key.

Technorati Tags: , , ,

Announcing the Internet Identity Workshop (IIW2005)

There’s been considerable conversation around identity on the Internet, or what some would call grassroots identity. Providing identity services between people, websites, and organizations that may or may not have any kind of formalized relationship is a different problem than providing authentication and authorization services within a single organization. Many have argued that the lack of a credible identity infrastructure will eventually result in the Internet being so overrun with fraud as to make it useless for many interesting uses.

To solve this problem, or pieces of it, companies and individuals have made a variety of architectural and governance proposals. Some of these include:

Myself, Phil Windley, Drummond Reed, and Doc Searls are hosting the Internet Identity Workshop in Berkeley on October 25 and 26th to provide a forum to disucss these and other architectural and governance proposals for Internet-wide identity services and their underlying philosophies. The workshop will comprise a day of presentations on Internet-scale identity architectures followed by a day of structured open space to accommodate the range of topics and issues that will emerge from day one and other issues and identity services that do not fit into the scope of the formal presentations. We’re hoping that adding a little more formality to the conversation will aid in digesting some of the various proposals.
We’re inviting presentations for the first day on the following topics:

  • Problems, issues, politics, and economics or Internet-scale identity systems.
  • Architectures for Internet-scale identity systems
  • Philosophies that drive architectural decisions in these systems (see Kim Cameron’s Laws of Identity for an example of such a philosophy

If you’d like to present on some other topic, drop one of us a line first and we’ll see how it fits in. Prospective presenters will be asked to submit a 250-300 word abstract. We hope to accomodate everyone, but we may end up picking from the abstracts.

I’m excited about this and looking forward to it. I hope we can have a good set of presentations the first day and a solid day of discussion the second. If you’re interested in this sort of thing, I hope to see you there. Please read the full announcement for some other details and register if you’re coming. There is a $75 charge to cover the cost of the venue, administrative expenses, and the cost of snacks and lunch both dats.

Catalyst Round UP

First of all thanks to Cordance, Opinity and ooTao who supported me in representing them and the whole ecology of folks around Identity Commons. It was a great week with lots of fruitful networking.

Jamie you are the calmest conference organizer I have ever met. Your staff was together and very helpful. Thanks!
Here are the roundup highlights:
Identity Management Market Trends – guitar introduction by Mike Neuenschwander.

Every move of your mouse you make
You’ll get a browser cookie for pete’s sake
Every username you fake, every federated claim you stake
They’ll be watching you

Every night and day
Every online game you play
Everything you say in IM, e-mail, VoIp or some other way
They’ll be watching you

Jamie Lewis kicked of the final afternoon with a keynote on user-centric Identity summed up by Dave Kearns with these talking points

*Heady mix of optimists, pessimists, idealists, cynics
*Agendas, governments, commercial interests could subvert the process
*Indicators of the constant tensions virtualization, digital ID create
*The tug of war will continue, and we all have a stake in the outcome
*Demonstrates the relativistic nature of identity, need for
polycentrism

Bob Blakley talked about his Axiom’s of Identity – they were quite though provoking and a great addition to the Identity Gang/Workshop conversation.

Dick gave a new and improved lessig style presentation on Identity 2.0 / User Centric Identity.

These two both belong to the “mac” community and gave their presentation on them. I got a lot of comments about my decorated Mac. It is nothing compared to Mary’s though.

Identity Workshop on stage. It was great to get a name and face for more of the Identity folks this included Stefan Brands of ID Corner and Scott Blackmer. Who I know was there but didn’t meet was David Kerns.
Strangest Job title: Ryan from Sxip – Sales Engineer (huh?)

Best Hospitality Suite themes matching the company:

  • Elementalwith their Ice Carved Bar and Earth and Fire graphics on the wall.
  • BridgeStream does role based enterprise Identity Management. So they had had Impro Theater (IT) Shakespeare provided by Theater Sports LA (Michelle, Brianand Floyd) where they each played improvised “roles.” They were kind enough to do an improvised sonnet about Identity Woman (I was really sad I didn’t have a tape recorder :() They also handed out world beach balls for the ‘globe theater.’

Talked to Scott Mace a bit on the first hospitality suite evening about podcasting. It is something Identity Woman might start doing.

Phil Windley, Doc Searls and myself worked out more details regarding the Independent Identity Workshop we are pulling together for the fall.

The Spiritual element of what identity is – the unnameable quality was honored with two different Lau Tzu quotes.

Sailing San Diego Bay with Mary Rundle was the closing highlight.

Thanks to all for a great conference! I am looking forward to coming back next year.

Catalyst: SSO Simple Secure and Open – Dick on Identity .20

Dick – had a 580 slide deck done Lessig Style
This is a summary of his talk:

We found out about Dick’s Identity

We learned a about what Identity is

What I say about me
What other say about me (others trust this)
So,
identity=reputaiton
What others say about you
We learned about Identity Transactions:
Verbal in person (with visual cues)
Talk on phone (loss of visual cues)
Job Application (fill out form)

We learned about data verification using drivers licenses in the real world and how the process reduces Identity Friction.
Identity Transactions are Asymmetrical
There is separation of the acquisition and presentation of credential
The credential is reusable
Trust is social

What is digital identity?

Identity 1.0 Today

Today it is the hassel of filling out the same information again and again.
Basically today authentication is that you get to prove you are an entry in a directory entry. single authority on one credential – not portable – in silo.

Verified digital Identity is not what you give a site today.
e-bay -/-> Craigslist
We have walled gardens

Identity 2.0 is where the user can move it to any site.

Simple and open has a history of winning in new standards look at:

  • networking
  • e-mail
  • web – html

WHAT DOES IT LOOK LIKE?
Identity Credential exchange is transparent transaction that is scalable.

WHO WILL DRIVE THIS?
users? – to many user names and passwords

won’t pay – little influence

enterprise? - partners, contracts, agents

but risky to lead… can’t get there
Identity 1.5

e-government?

maybe

but localized

Banks?

motivated to solve
theoretical trust relationship

Identity Ecosystem will emerge where

users are loosely coupled
share user identity

We are in a new era

Webservices – Flickr, Mappr, SalesForce

Web 2.0 will drive identity 2.0

It will happen on the edge of the Internet (not the edge of the enterprise).

XRI/XDI no web-service apps

SXIP

name/value pairs
DIGS XML

The goal is to mimic photo ID
With Sxip Network

SXIP 1.0 has had a few tire kickers

SXORE Blog comment spam solution

SXIP 2.0 support web services
SXIP ACCESS
SSO – Simple Secure and Open

Jamie Lewis -
Q: So will this go into a STANDARDS PROCESS?
A: We are working on it. We want to get it very close to right then put it into standards body. I like IETF. Our goal is to be open