Create an Account
username: password:
 
  MemeStreams Logo

RE: Mind blowing delivery of Identity 2.0

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  Computer Security
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
RE: Mind blowing delivery of Identity 2.0
Topic: Movies 11:13 am EST, Jan  5, 2009

Decius wrote:
1. Anyone can host identities.
2. Anyone can accept identities.
3. The identities mean something.

I figured I'd preemptively answer the obvious question this raises. The way you achieve this is by:

1. Allowing identity providers to make assertions about the identities they provide.

2. Providing identity acceptors with mechanisms for managing the list of identity providers from whom they trust assertions and what sort of assertions they trust.

--

1. Allowing identity providers to make assertions about the identities they provide.

Basically, the identity host must be able to say things like:

User Bob54 says his name is "Bob Marley."
User Bob54 says his email address is "bob@gmail.com."
- We tested this with a verification email on 01/01/06 and it worked.
User Bob54 has been a user of our system since 01/01/06.

Preferably, the user should be able to control which assertions the provider provides to which acceptors, so that private information can be managed in the system.

2. Providing identity acceptors with mechanisms for managing the list of identity providers from whom they trust assertions and what sort of assertions they trust.

There are many possible architectures here. It may be the case that a small number of widely trusted identity providers will emerge, but unlike passport the system will be open to competition. One approach that I like is to have an entity that audits identity providers and publishes a list of ones that follow certain best practices. That entity could collect user fees from both providers and acceptors.

RE: Mind blowing delivery of Identity 2.0



 
 
Powered By Industrial Memetics
RSS2.0