it may help to think of identity as a whole as a process rather then a "thing" I wrote a field guide around a bunch of these things - to understand different types of identifiers, names and attributes. feel free to use it as a reference - preferably with some credit. https://identitywoman.net/the-field-guide-to-identity-identifiers-attributes... On Sat, Dec 17, 2016 at 7:08 AM, Thorsten H. Niebuhr [WedaCon GmbH] < tniebuhr@wedacon.net> wrote:
Well, so far no feedback at all, I will start with :
*Identification*
*'*The process by which an *identities'* information is *gathered* and *verified* for accuracy'
The *Identification Section* contains general concepts used to describe the nature of digital assets that are, or are used to establish (and remove) links to objects in the real world which do have either directly or indirectly a relationship to a human being.
[Further descriptions, eg mention 'Joiner' and 'Leaver' concepts.]
The four sublevels
- Identities - digital|social|online|philosophical identities, entities: Describe identities and its many facets, PII,... - Gathering/ Providing - how these informations are collected and aggregated - claims, attributes, relations, self-provided, stolen,.... - ethics - Verification - verified and non-verified data and its use - Trust Levels - Process? Privacy?
I am not sure about the fourth sublevel, maybe someone has a better idea?
Thorsten
On 12.12.2016 21:52, Thorsten H. Niebuhr [WedaCon GmbH] wrote:
Hi (BoKkers) Group,
during todays meeting (minutes here <https://kantarainitiative.org/confluence/pages/viewpage.action?pageId=85492564#MeetingMinutesTaxonomy/Bokkers-Meeting20161212>) we decided to discuss the Toplevels and each of their 4 sublevels in more detail. To speed up the process and by triggering the group, I will create 4 Mailthreads for each toplevel to be used for discussion.
Each of these Mailthread should, *best by next monday*
- have *found a 'leader'* who will take responsibility for the discussion - have found *4 sublevels* (so 4 areas that can be used to further sort processes, terms, knowledge,etc)* within the given toplevel* - have seen a *great level of discussion*
For sure the most important part here is to find someone who will lead and drive the discussion, or is even willing to take over one of the areas on his/her own. So if you can spent 1-2 hrs of your available time, it would be much appreciated!
The *first mailthread is the one you are reading here right now*, the others will be 'Management', 'Authentication', 'Authorization'.
Thnks for your contribution
Thorsten Niebuhr
Hi all,
During todays meeting (minutes here <https://kantarainitiative.org/confluence/pages/viewpage.action?pageId=85492564>) we discussed further refinements for the Dart- Board-Model, especially on the 'upper layer' which deals with Identity Management topics only, while relying on the lower three layers for operation,implementation,planning.
Our next goal is to 'slice the cake', to find sublevels to the four TopLevels we decided to start with so far. The sublevels mentioned below (in green) are just examples.
The best case scenario for this would be to find four generic terms within each of the TopLevels.
- Identification Processes around validating identities (digital or physical) and as the 'entry'/'leave' point on a given domain.This does NOT deal with Authentication! - Proof/Verification - Register - De-Register - Data Portability (Transfer) - Management Processes around the management of Identity Data - Enrollment - Dis-Enrollment - Privacy - Federation - Authorization Processes related to Authorization - ... - ... - ... - ... - Authentication Processes related to Authentication - - ... - ... - ...
Finally, to check the validity of the model, we will investigate typical IAM-Topics if we are able to find appropriate paths to describe the given topic in the model.
here is a quick example on how I think this model could be applied (example used: 'Identity Provider')
- Function of an 'Identity Provider' - Needs to offer functions from 'Identification' to - *validate* a given Identity against real or other digital data - Following *Process* ABC - using *technology* XYZ - ...further definitions on the *lower* layers (Operations, implementations,planning) - (do we need to add a* layer for legal* aspects?) - Management - ... - Authorization - ... - Authentication - ...
So the Task (especially for those who gave their commitment to the BoK/Taxonomy) is to
- Find propper sublevels as described above - exercise typical usecases from the IDM World against the model
Thanks in advance,
for the BoK-Subgroup
Thorsten
--
Thorsten H. Niebuhr tniebuhr@wedacon.net / tniebuhr@wedacon.de <tniebuhr@wedacon.net>
WedaCon Informationstechnologien GmbH Office: +49 (251) 399 678-22 <+49%20251%2039967822> Fax: +49 (251) 399 678-50 <+49%20251%2039967850> Mobile: +49 (174) 991 257 4 <+49%20174%209912574> Kroegerweg 29 D-48155 Muenster http://www.wedacon.net
Amtsgericht Muenster HRB 6115 USt.-ID: DE216758544 StNr.: 336/5775/1487 Geschaeftsfuehrender Gesellschafter: Thorsten H. Niebuhr
_______________________________________________ DG-IDPro mailing listDG-IDPro@kantarainitiative.orghttp://kantarainitiative.org/mailman/listinfo/dg-idpro
_______________________________________________ DG-IDPro mailing listDG-IDPro@kantarainitiative.orghttp://kantarainitiative.org/mailman/listinfo/dg-idpro
_______________________________________________ DG-IDPro mailing list DG-IDPro@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/dg-idpro