Framework Profiles: Difference between revisions
Jump to navigation
Jump to search
(→Goals) |
|||
Line 5: | Line 5: | ||
===Goals=== | ===Goals=== | ||
*As a part of the creation of a set of [[Identity Ecosystem]]s this plan lays out how to address specific community needs for security, privacy, interoperability and user experience. It is expected that all communities will start from the Baseline Functional Requirements (as amended from time to time) and add additional requirements in those four areas plus the potential for a trusted laboratory validation of compliance with the profiles. | *As a part of the creation of a set of [[Identity Ecosystem]]s this plan lays out how to address specific community needs for security, privacy, interoperability and user experience. It is expected that all communities will start from the Baseline Functional Requirements (as amended from time to time) and add additional requirements in those four areas plus the potential for a trusted laboratory validation of compliance with the profiles. | ||
*Compliance results are freely available for query by any potential participant prior to any engagement. Potential users need to understand the results before they commit to joining in any framework. | *Compliance results are freely available for query by any potential participant prior to any engagement using a standard web [[API]]. Potential users need to understand the results before they commit to joining in any framework. | ||
*[[Attestation]] need not be free. Joining any framework will likely be costly in terms of money and effort. Getting an attestation or certificate of membership is a value that must be paid for. The source of funding is not specified but could include charging for access to attested results, for example the acquisition of a signed or encrypted certificate of membership need not be freely available. | *[[Attestation]] need not be free. Joining any framework will likely be costly in terms of money and effort. Getting an attestation or certificate of membership is a value that must be paid for. The source of funding is not specified but could include charging for access to attested results, for example the acquisition of a signed or encrypted certificate of membership need not be freely available. | ||
Revision as of 17:15, 27 October 2018
Full Title or Meme
The Identity Ecosystem Framework (IDEF) will need fine-grained specifications for applying its principles to specific vertical industry and horizontal community requirements.
Context
Goals
- As a part of the creation of a set of Identity Ecosystems this plan lays out how to address specific community needs for security, privacy, interoperability and user experience. It is expected that all communities will start from the Baseline Functional Requirements (as amended from time to time) and add additional requirements in those four areas plus the potential for a trusted laboratory validation of compliance with the profiles.
- Compliance results are freely available for query by any potential participant prior to any engagement using a standard web API. Potential users need to understand the results before they commit to joining in any framework.
- Attestation need not be free. Joining any framework will likely be costly in terms of money and effort. Getting an attestation or certificate of membership is a value that must be paid for. The source of funding is not specified but could include charging for access to attested results, for example the acquisition of a signed or encrypted certificate of membership need not be freely available.
Existing Compliance Frameworks
A partial list of the existing compliance effort that are used as models includes:
- The IDEF registry is operation and will serve as the base framework for the sandbox efforts.
- The Kantara Initiative has aTrust Registry based on SAML 2 metadata.
- The OpenID foundation has a certification program for several of their identity profiles that has won wards for 2018 European Identity and Cloud Award and the 2018 Identity Innovation Award.
- The NIST has a Cybersecurity Framework consisting of standards, guidelines, and best practices to manage cybersecurity-related risk. One example of the use of vertical industry profiles of this framework may be found by following the link to the financial profile page below.
- The NIST has an SP 800-63-3 compliance program which now has assessors like Kantara to certify compliance.
Problems
- User need to real-time query access to the list of compliant participant.
- Each jurisdiction creates their own Identifier domain(s) for users and for providers that can be used to identify participants with some central rooted registry for the participants that have met the framework profile requirements.
Solutions
A user-friendly online query service that will give users actionable information about compliant participants.
- The establishment of individual profiles that can be verified online and inline by calling APIs is the core of all of these profiles.
- Unstructured queries will return a list of all the participants that meet query.
- The working document for the Trust Framework Membership Validation APIs has been under development since August 2017.
- A Federation Trust Registry is proposed to strongly identify framework participants.
Profiles
As each community begins the process of creating profile the committee will coordinate and record their efforts here:
- Health Care Profile now in planing with various US healthcare committees.
- Financial Profile now considering the creation of a specific implementation of a Financial Profile Sandbox for compliance testing.