Identifier: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
No edit summary
 
Line 5: Line 5:
By definition identifier can be one or more than one attributes, if the identifier is one attribute then that attribute must be unique, and is thus a unique-identifier. When multiple attributes are used, they are referred to as identifying-attribute.
By definition identifier can be one or more than one attributes, if the identifier is one attribute then that attribute must be unique, and is thus a unique-identifier. When multiple attributes are used, they are referred to as identifying-attribute.


The current definition was added to the glossary on 12/10 following consensus approval at the AHG Meeting on 2013-12-05.


== Sources ==
== Sources ==
Line 11: Line 10:


== Status ==
== Status ==
<span style="background:green">MC Approved</span>
<span style="background:green">MC Approved</span> The current definition was added to the glossary on 12/10 following consensus approval at the AHG Meeting on 2013-12-05.


{{Comment}}
==Problems==
* Many identifiers include a pointer to an [[Authentication]] servers, for example bill@gmail.com.
* Other identifiers are just random numbers, like GUIDs.
* In all cases, if the identifier is known to an attacker, they can attempt to take ownership of that identifier, which is (unfortunately) known as '''Identity Theft'''.




Line 24: Line 26:


[[Category:Glossary]]
[[Category:Glossary]]
[[Category:Identifier]]

Latest revision as of 19:31, 28 May 2020

Definition

Attribute that can be used to distinguish a Digital Identity.

Notes

By definition identifier can be one or more than one attributes, if the identifier is one attribute then that attribute must be unique, and is thus a unique-identifier. When multiple attributes are used, they are referred to as identifying-attribute.


Sources

ITU-T X.1252

Status

MC Approved The current definition was added to the glossary on 12/10 following consensus approval at the AHG Meeting on 2013-12-05.

Problems

  • Many identifiers include a pointer to an Authentication servers, for example bill@gmail.com.
  • Other identifiers are just random numbers, like GUIDs.
  • In all cases, if the identifier is known to an attacker, they can attempt to take ownership of that identifier, which is (unfortunately) known as Identity Theft.




Quick Links: Taxonomy | Taxonomy Project Management | Taxonomy AHG Catalog | Taxonomy AHG Glossary |