The next generation of Identity

February 15, 2006

Identity 2.0 Design Goals

Filed under: Events — Dick @ 9:41 pm

Sxip has submitted a paper for the W3C Workshop on ‘Transparency and Usability of Web Authentication’. That sounded to us like part of the Identity 2.0 vision, so we took the opportunity to document the Identity 2.0 Design Goals.

With a nod to Mr Cameron, we now have The Fourteen Design Goals to go with The Seven Laws. They serve as design requirements for a solution architecture that implements the Identity 2.0 vision.

11 Comments

  1. I am interested in learning more.

    Comment by Roland Mechler — February 23, 2006 @ 9:38 am

  2. What more would you like to know? :)

    Comment by Dick — February 23, 2006 @ 6:05 pm

  3. A good set of requirements. It is good to see a "slim" paper outlining just the requirements, however I would like to see more details on the reasons for the requirements, perhaps with references back to Kim Cameron’s Laws.

    Comment by Pete Rowley — February 28, 2006 @ 11:47 am

  4. Good point Pete. That was in an earlier draft, hard to balance between being "slim" and being "complete"

    Comment by Dick — February 28, 2006 @ 1:14 pm

  5. OK so is the next item in the chain the 21 golden rules of Identity 2.0 or the 28 golden rules?

    Comment by Phill — March 2, 2006 @ 10:41 am

  6. I’m hoping we can get to shorter lists!

    Comment by Dick — March 2, 2006 @ 11:41 am

  7. That is very interesting!

    Comment by Joe — March 3, 2006 @ 5:05 pm

  8. Glad you think so!

    Comment by Dick — March 4, 2006 @ 10:04 am

  9. Dick,
    I’m new to Identity concepts and found your presentation very (very) good. Thanks for sharing!
    Do you think it will go to the point where a person will Identify themself using a GUID? - e.g. say a Life Science Identifier (LSID) where I may define myself as:

    urn:lsid:sxip.com:personal:timrobertson100:1.0
    (timrobertson100 version 1.0 according to the sxip.com "personal" space)

    If not a globally accepted GUID format, how does someone declare where there "intentity" resides?

    Comment by timrobertson100 — March 7, 2006 @ 3:24 am

  10. Hey Tim, check out http://sxip.org/ and http://sxip.net/ to see SXIP 2.0. We are using URLs now for persona identifiers, and you can have lots of them.

    Comment by Dick — March 7, 2006 @ 3:57 am

  11. I’m interested in the idea of the uni directional authentication.

    How do you see that being carried out?

    The existance of a third party identity issuer sound a bit like the kerberos ticket/wrapper model.

    How would trust of the issuer be verified?

    Comment by Satch — May 15, 2006 @ 4:26 pm

Sorry, the comment form is closed at this time.

Powered by WordPress