Open and federated identities with ID4me FOSDEM 2020, 2 February - - PowerPoint PPT Presentation

open and federated identities with id4me
SMART_READER_LITE
LIVE PREVIEW

Open and federated identities with ID4me FOSDEM 2020, 2 February - - PowerPoint PPT Presentation

Open and federated identities with ID4me FOSDEM 2020, 2 February 2020 Vittorio Bertola, Open-Xchange 1. The problem 2 Our online identity, today The big Internet platforms already create an online identity for us They track us across


slide-1
SLIDE 1

Open and federated identities with ID4me

FOSDEM 2020, 2 February 2020 Vittorio Bertola, Open-Xchange

slide-2
SLIDE 2

2

1.

The problem

slide-3
SLIDE 3

3 3

Our online identity, today

The big Internet platforms already create an «online identity» for us They track us across multiple services and sell us for targeted advertising Meanwhile, we are stuck with a thousand accounts □ Insecure, inconvenient etc.

slide-4
SLIDE 4

4

The solution: Single sign-on

SSO = A single set of f cr crede dentials that ca can be us used d on all existing online se services

Requires an online service acting as user authentication provider (must be trusted by everyone)

Service #1

Single set of credentials

Service #2 Service #3

User authentication provider

slide-5
SLIDE 5

5

But of course, the big OTTs already thought of this!

slide-6
SLIDE 6

6 6

Proprietary SSO gaining ground

Very convenient and ubiquitous Average Internet users like it a lot Bu But No interoperability + fragmentation => concentration Clients have to implement each of them Users cannot choose their provider Makes tracking straightforward

slide-7
SLIDE 7

7

slide-8
SLIDE 8

8

We need openness and federation!

slide-9
SLIDE 9

9 9

Advantages of SSO

You only need to remember and secure one set

  • f credentials

Any additional security mechanisms can be implemented just once by a specialized party You can have an easy way to control the sharing of your information and keep it updated You don’t need to register for new websites, just identify yourself

slide-10
SLIDE 10

10 10

Advantages of public federated SSO

Why can’t your online identity work like your email address? You only need one account to interoperate with everyone You get to choose and even change your provider (possibly one that does not sell you out) You can keep your identifier if you buy a piece

  • f the namespace
slide-11
SLIDE 11

11 11

But federation needs a discovery mechanism…

slide-12
SLIDE 12

12 12

What do we miss?

We already have federated identity management and authorization protocols □ OpenID Connect / Oauth 2.0 □ Though not normally deployed in a truly federated

way (at most, used for a federation with a single identity provider)

We miss a place to keep the directory of all existing identities, and a protocol for looking identities up into it

slide-13
SLIDE 13

13

2.

Where do we keep a public directory for identities?

slide-14
SLIDE 14

14 14

Why not standard OpenID Connect?

OpenID Connect already has an optional discovery mechanism □ It is based on WebFinger, which is based on HTTPS □ Only accepts URIs as identifiers, with email addresses

as a special case

But it requires you to deploy a web server and a WebPKI certificate on each and every domain that you want to use for identifiers

slide-15
SLIDE 15

15 15

Why not blockchain?

We want to be (and we are) blockchain-ready However, we wanted something that is: □ easily available to any developer and user □ immediately deployable on a mass scale Otherwise: □ it will be too late to compete with Facebook etc. □ too few people will be able to develop applications

and services

slide-16
SLIDE 16

16

16

It’s the DNS!

slide-17
SLIDE 17

17 17

Why the DNS?

It is an open, public standard with many free implementations It is widely available to everyone everywhere It has been working reliably for 30+ years It is secure (with DNSSEC) It can scale effectively to any amount of traffic It is regulated to prevent capture It is decentralized and federated

slide-18
SLIDE 18

18 18

The DNS provides the namespace

In the real world, people use «natural» names which are neither unique nor uniform nor easily parsable So you need a namespace to name identities uniquely on a global scale, while distributing its management… but it’s the same problem that was already solved for host names 35 years ago

slide-19
SLIDE 19

19 19

The DNS provides the namespace (2)

Using the DNS, you can assign human-readable identifiers to identities in a naturally federated namespace Users are already familiar with DNS-like strings You can even use email addresses if you wish Or you can encourage people to get their personal domain name and own a piece of the namespace

slide-20
SLIDE 20

20 20

The DNS provides the discovery scheme

We just need a pointer to know who is responsible for an identifier Again, same problem already solved for email 35 years ago We use a TXT record, rather than a new RRtype □ So we are not adding straw onto the camel’s back Two Internet drafts independently submitted

slide-21
SLIDE 21

21

<identifier> = any valid hostname in a domain that you control _openid.<identifier> TXT v=OID1;iss=<issuer>;clp=<claims_provider>

slide-22
SLIDE 22

22

3.

The ID4me project

slide-23
SLIDE 23

23 23

ID4me

A set of open, patent-free standards A non-profit consortium for promotion

slide-24
SLIDE 24

24

Relying party (any online service) Identity authority User Identity agent

P e r s

  • n

a l i n f

  • r

m a t i

  • n

Personal information ID4me identifier (any DNS hostname) Credentials and consent

Keeps and verifies user credentials Manages consent to data sharing Provides service to user Manages user relationship Manages user data

Login confirmation

Roles in ID4me

slide-25
SLIDE 25

25

User

  • 1. Provide identifier
  • 8. Login completed
  • 6. Request user data
  • 7. Send user data

DNS

  • 5. Login

OK

Relying party (any online service) Identity agent Identity authority

  • 3. Request

login 2 . D i s c

  • v

e r a u t h

  • r

i t y a n d a g e n t

  • 4. Enter password

(or be recognized by cookie) Authorize data sharing

ID4me login flow

slide-26
SLIDE 26

26 26

Status

Website, public specifications, APIs released Several testbeds up and running Several authentication plugins available First ID4me service (Denic ID) being launched Optional verified identities under development Started up the international non-profit □ 27 members and counting

slide-27
SLIDE 27

27 27

Coming next

Cloudfest Hackathon project to develop a free «server» (agent + authority) implementation Standard extensions to provide and manage «strong», verified identities A public directory for operator reputation □ A problem for every federation…

slide-28
SLIDE 28

28 28

ht https://id4me me.org/

Information, specs, code…

slide-29
SLIDE 29

29

Thanks!

Any questions? You can find me at @vittoriobertola vb@bertola.eu

Credits: Original presentation template by SlidesCarnival modified by myself License: This presentation is distributed under a Creative Commons Attribution (CC-BY) license