Self-issued Identifier: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
Line 2: Line 2:
Wiki Page to track the use of [[https://tcwiki.azurewebsites.net/index.php?title=Self-issued_Identifier]] in the [[Identity Ecosystem]]
Wiki Page to track the use of [[https://tcwiki.azurewebsites.net/index.php?title=Self-issued_Identifier]] in the [[Identity Ecosystem]]
==Context==
==Context==
* With the rise of the W3C program on Decentralized Identifiers, there is a need for the [[Identity Ecosystem]] to coordinate with other teams developing this technology.
* With the rise of the [https://www.w3.org/2019/did-wg/ W3C program] on Decentralized Identifiers, there is a need for the [[Identity Ecosystem]] to coordinate with other teams developing this technology.
* At the 2020-06-16 meeting of the FIRE WG a liaison effort was approved. That effort is tracked here.
* At the 2020-06-16 meeting of the FIRE WG a liaison effort was approved. That effort is tracked here.
==Problems==
==Problems==
* The current work of the Decentralized Identifiers has proceed with little concern for how it might integrate with existing [[Identity Ecosystem]]s.
* The current work of the Decentralized Identifiers has proceed with little concern for how it might integrate with existing [[Identity Ecosystem]]s.

Revision as of 01:20, 17 June 2020

Full Title or Meme

Wiki Page to track the use of [[1]] in the Identity Ecosystem

Context

  • With the rise of the W3C program on Decentralized Identifiers, there is a need for the Identity Ecosystem to coordinate with other teams developing this technology.
  • At the 2020-06-16 meeting of the FIRE WG a liaison effort was approved. That effort is tracked here.

Problems

  • The current work of the Decentralized Identifiers has proceed with little concern for how it might integrate with existing Identity Ecosystems.
  • Self-issued Identifiers of all types depend on secret values held by the user in portable protected storage, for example a smartphone or WebAuthn key.
  • If the user's hardware device is stolen or disable, the recover of the user's identifier can be a challenge which could turn into a UX nightmare if not handled well.

References