SlideShare une entreprise Scribd logo
1  sur  55
Télécharger pour lire hors ligne
Higgins 1:  A species of Tasmanian long-tailed mouse 2:  An open source identity framework being developed at the Eclipse Foundation
Sections ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Section One: Higgins 1.0 Released February 2008 Commercial products based on Higgins 1.0 have been announced by Novell, Serena, Computer Associates and IBM Copyright © 2008 Parity. Made available under EPL 1.0
Higgins is an Identity Framework Enables users and applications to integrate identity, profile, and social relationship information across multiple data sources and protocols.  Copyright © 2008 Parity. Made available under EPL 1.0
End-users experience Higgins through the UI metaphor of Information Cards using an app called an  Identity Selector Information Cards and selectors are just tip of the iceberg of what can be done with Higgins, but it’s a place to start… Copyright © 2008 Parity. Made available under EPL 1.0
Today you go from site to site filling in forms and passwords Copyright © 2008 Parity. Made available under EPL 1.0 Type, type, type. Click, click.  Here a password, there a password. Everywhere a password. Here a form, there a form, ... Websites…
Information Cards Put You in Control Copyright © 2008 Parity. Made available under EPL 1.0 Each card is a slice of the digital you (or a friend of yours) held in some data silo. Any kind of information: your preferences, favorite songs, employee id numbers, drivers licenses, affiliations, your health plan id, ...you get the idea, can be accessed using a card. This wallet-like thing is an app called an  Identity Selector
Higgins Identity Selectors Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
How to Use I-Cards ,[object Object],[object Object],[object Object]
Identity Selector “Wallet” Click on a card to send it to a site Click Copyright © 2008 Parity. Made available under EPL 1.0 Higgins is interoperable with Microsoft CardSpace™ shown here
Identity Selector Card-based Sign-in ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Selector Supported Card Types Copyright © 2008 Parity. Made available under EPL 1.0 Managed  What some other entity says about you Personal  What you say about you
Identity Selectors Three Flavors in Higgins 1.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App  Identity Provider Relying Party  Website or App  Cards are generated and downloaded from here.  A local Token Service issues tokens as requested by Selector. Cards are stored and selected here Tokens containing claim data is requested and received here
Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App  Identity Provider Relying Party  Some Higgins Identity Selectors rely on a hosted  I-Card Service component
Identity Selector  Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins Identity Selectors. Client apps for Windows, OSX and Linux  I-Card Web Service User
Identity Selector  Selector Selector – Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins includes a Higgins Selector Selector component (Windows-only)  Provides an abstraction layer that decouples browser extensions from selectors.  I-Card Web Service User
Architecture Identity Providers Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Selectors Identity Attribute Service Identity Services
Identity Providers  Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins Token/IdP Service is used by the Identity Provider website User
Identity Providers Two Flavors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Architecture Relying Party Website Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Selectors Identity Attribute Service Identity Services
Relying Party Website  Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet RP Libraries Selector Selector Higgins RP Website provides code to validate tokens from Identity Selectors Key: Generic Technology Higgins Components User
Relying Party Website Multi-Protocol Support ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Architecture Identity Services Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
Architecture Extensible  Identity Services Copyright © 2008 Parity. Made available under EPL 1.0 CardSpace Protocol Provider-Plugins Implement RP protocols OpenID Managed I-Card Provider-Plugins   Implement card types Personal SAML X509 Relationship Kerberos Token Provider-Plugins Implement security tokens UN/PW Idemix Plug-ins Identity Services Login (un/pw) Key: Beyond Higgins 1.0 Higgins 1.0
Architecture Identity Attribute Service Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
Architecture Extensible  Identity Attribute Service Copyright © 2008 Parity. Made available under EPL 1.0 Identity Attribute Service (IdAS) LDAP XML File IdAS Context Providers-Plugins   Connect to existing data sources RDF Google Contacts Others… Plug-ins Key: Beyond Higgins 1.0 Higgins 1.0
Identity Attribute Service ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service Context Data Model (CDM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service CDM extends RDF ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Architecture Interoperability Points Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
Interoperability Event Participants RSA 2008 Copyright © 2008 Parity. Made available under EPL 1.0
Interoperability Event Participants RSA 2008 Copyright © 2008 Parity. Made available under EPL 1.0
Section Two: Higgins 1.1 June 2009 Copyright © 2008 Parity. Made available under EPL 1.0
AIR-Based Selector ,[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service  Access Control Enhancements ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service  New Context Providers ,[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Identity Attribute Service XDI Protocol Support ,[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Relationship Cards Relationship Card What you  and  Best Buy say about you Copyright © 2008 Parity. Made available under EPL 1.0
Relationship Cards  Human Friendly Data References ,[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0 Data object (called an  Entity )
Relationship Cards  Data Location and Authority ,[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Relationship Cards Data Model ,[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Other New Card Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Selector as an OpenID Service OpenID Provider  Identity Provider Relying Website I-Card Web Service Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector OpenID 2.0 OP with associated Higgins Selector Service User
ID-WSF Support (maybe) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
IdAS Client Component (maybe) Higgins Identity Selector Local App Higgins  I-Card Service Banking  Site eCommerce or Community Site SAML Enterprise Directory Social Network Site Social Networks RDF Semantic Web Repository Social Network Site STS IdP RP STS IdP RP SAML2 IdP I dAS Client LDAP Server Linked Data Server OpenSocial OpenID Provider I dAS Client IdAS  Client Other Local Apps & Bots IdAS Client Internet Extension Browser Key: K ey: O ther… R DF O pen  Social L DAP Enterprise Directories Enterprise Directories Enterprise Directories Social Networks Linked Data Linked Data Linked Data Higgins 1.0 H iggins X.X 3 rd  Party I dAS RDF Data Source LDAP Directory Browser Computer or mobile device LDAP Identity Providers Web apps CP XDI Service XDI4J Selector Selector RDF CP Personal Data Services Web 2.0 and Enterprise Apps Higgins Extension Data Contexts Identity Attribute Service
Section Three:  Beyond Higgins 1.1 Mobile Higgins Higgins project is seeking project funding and/or contributions to develop a Higgins selector for mobile platforms Copyright © 2008 Parity. Made available under EPL 1.0
Target Platforms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Project Co-leads http://higgins-project.org Paul Trevithick    Mary Ruddy [email_address]   [email_address] +1.617.513.7924   +1.617.290.8591 Copyright © 2008 Parity. Made available under EPL 1.0
Appendix Original Project Goals Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 1 of 5 ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 2 of 5 ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 3 of 5 ,[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 4 of 5 ,[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0
Goals: 5 of 5 ,[object Object],[object Object],[object Object],Copyright © 2008 Parity. Made available under EPL 1.0

Contenu connexe

Tendances

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...AntonioMaio2
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 
Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Amazon Web Services
 
Secure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid'sSecure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid'sSwathi Rampur
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?rlsoft
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Oliver Pfaff
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Synacts
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTTransUnion
 
Saas webinar-dec6-01
Saas webinar-dec6-01Saas webinar-dec6-01
Saas webinar-dec6-01Paul Madsen
 
Authentication and Identity with Amazon Cognito
Authentication and Identity with Amazon CognitoAuthentication and Identity with Amazon Cognito
Authentication and Identity with Amazon CognitoAmazon Web Services
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5DigiLocker
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioAntonioMaio2
 
Digital Locker User Manual
Digital Locker User ManualDigital Locker User Manual
Digital Locker User ManualDigiLocker
 

Tendances (17)

Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...
 
The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
Open ID in Government
Open ID in GovernmentOpen ID in Government
Open ID in Government
 
Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...Authentication & Authorization for Connected Mobile & Web Applications using ...
Authentication & Authorization for Connected Mobile & Web Applications using ...
 
Secure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid'sSecure cross cloud single sign-on (sso) using eid's
Secure cross cloud single sign-on (sso) using eid's
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?How to deploy SharePoint 2010 to external users?
How to deploy SharePoint 2010 to external users?
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Saas webinar-dec6-01
Saas webinar-dec6-01Saas webinar-dec6-01
Saas webinar-dec6-01
 
Authentication and Identity with Amazon Cognito
Authentication and Identity with Amazon CognitoAuthentication and Identity with Amazon Cognito
Authentication and Identity with Amazon Cognito
 
eSign Brochure1.5
eSign Brochure1.5eSign Brochure1.5
eSign Brochure1.5
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
SharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio MaioSharePoint Saturday Toronto July 2012 - Antonio Maio
SharePoint Saturday Toronto July 2012 - Antonio Maio
 
Digital Locker User Manual
Digital Locker User ManualDigital Locker User Manual
Digital Locker User Manual
 

Similaire à Higgins

Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
AWS Webinar Series - Build web-based and native mobile applications on AWS
AWS Webinar Series - Build web-based and native mobile applications on AWS AWS Webinar Series - Build web-based and native mobile applications on AWS
AWS Webinar Series - Build web-based and native mobile applications on AWS Amazon Web Services
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensForgeRock
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinForgeRock
 
Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication FIDO Alliance
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
 
2016-Mar-03 Leppitsch in Auckland meetup
2016-Mar-03 Leppitsch in Auckland meetup2016-Mar-03 Leppitsch in Auckland meetup
2016-Mar-03 Leppitsch in Auckland meetupMichael Leppitsch
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Amazon Web Services
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonKi-Eun Shin
 
SPS Belgium 2015 - High-trust Apps for On-Premises Development
SPS Belgium 2015 -  High-trust Apps for On-Premises DevelopmentSPS Belgium 2015 -  High-trust Apps for On-Premises Development
SPS Belgium 2015 - High-trust Apps for On-Premises DevelopmentEdin Kapic
 
Spsbe15 high-trust apps for on-premises development
Spsbe15   high-trust apps for on-premises developmentSpsbe15   high-trust apps for on-premises development
Spsbe15 high-trust apps for on-premises developmentBIWUG
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Securityguest2a5a03
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDForgeRock
 
Let’s Talk About the Ipro Platform
Let’s Talk About the Ipro PlatformLet’s Talk About the Ipro Platform
Let’s Talk About the Ipro PlatformIpro Tech
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 
20190523 archiver fim
20190523 archiver fim20190523 archiver fim
20190523 archiver fimArchiver
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 

Similaire à Higgins (20)

Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
AWS Webinar Series - Build web-based and native mobile applications on AWS
AWS Webinar Series - Build web-based and native mobile applications on AWS AWS Webinar Series - Build web-based and native mobile applications on AWS
AWS Webinar Series - Build web-based and native mobile applications on AWS
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
 
Identity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel RaskinIdentity Live London 2017 | Daniel Raskin
Identity Live London 2017 | Daniel Raskin
 
Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
2016-Mar-03 Leppitsch in Auckland meetup
2016-Mar-03 Leppitsch in Auckland meetup2016-Mar-03 Leppitsch in Auckland meetup
2016-Mar-03 Leppitsch in Auckland meetup
 
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
Add End User Sign-in, User Management, and Security to Your Mobile and Web Ap...
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
 
SPS Belgium 2015 - High-trust Apps for On-Premises Development
SPS Belgium 2015 -  High-trust Apps for On-Premises DevelopmentSPS Belgium 2015 -  High-trust Apps for On-Premises Development
SPS Belgium 2015 - High-trust Apps for On-Premises Development
 
Spsbe15 high-trust apps for on-premises development
Spsbe15   high-trust apps for on-premises developmentSpsbe15   high-trust apps for on-premises development
Spsbe15 high-trust apps for on-premises development
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
Let’s Talk About the Ipro Platform
Let’s Talk About the Ipro PlatformLet’s Talk About the Ipro Platform
Let’s Talk About the Ipro Platform
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
20190523 archiver fim
20190523 archiver fim20190523 archiver fim
20190523 archiver fim
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 

Plus de Markus Sabadello

Plus de Markus Sabadello (8)

Technologies for Self-Sovereign Identity
Technologies for Self-Sovereign IdentityTechnologies for Self-Sovereign Identity
Technologies for Self-Sovereign Identity
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Masterclass on the DID Universal Resolver
Masterclass on the DID Universal ResolverMasterclass on the DID Universal Resolver
Masterclass on the DID Universal Resolver
 
FreedomBox
FreedomBoxFreedomBox
FreedomBox
 
Higgins ESE
Higgins ESEHiggins ESE
Higgins ESE
 
Higgins
HigginsHiggins
Higgins
 
Higgins
HigginsHiggins
Higgins
 
Higgins
HigginsHiggins
Higgins
 

Dernier

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Dernier (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Higgins

  • 1. Higgins 1: A species of Tasmanian long-tailed mouse 2: An open source identity framework being developed at the Eclipse Foundation
  • 2.
  • 3. Section One: Higgins 1.0 Released February 2008 Commercial products based on Higgins 1.0 have been announced by Novell, Serena, Computer Associates and IBM Copyright © 2008 Parity. Made available under EPL 1.0
  • 4. Higgins is an Identity Framework Enables users and applications to integrate identity, profile, and social relationship information across multiple data sources and protocols. Copyright © 2008 Parity. Made available under EPL 1.0
  • 5. End-users experience Higgins through the UI metaphor of Information Cards using an app called an Identity Selector Information Cards and selectors are just tip of the iceberg of what can be done with Higgins, but it’s a place to start… Copyright © 2008 Parity. Made available under EPL 1.0
  • 6. Today you go from site to site filling in forms and passwords Copyright © 2008 Parity. Made available under EPL 1.0 Type, type, type. Click, click. Here a password, there a password. Everywhere a password. Here a form, there a form, ... Websites…
  • 7. Information Cards Put You in Control Copyright © 2008 Parity. Made available under EPL 1.0 Each card is a slice of the digital you (or a friend of yours) held in some data silo. Any kind of information: your preferences, favorite songs, employee id numbers, drivers licenses, affiliations, your health plan id, ...you get the idea, can be accessed using a card. This wallet-like thing is an app called an Identity Selector
  • 8. Higgins Identity Selectors Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
  • 9.
  • 10. Identity Selector “Wallet” Click on a card to send it to a site Click Copyright © 2008 Parity. Made available under EPL 1.0 Higgins is interoperable with Microsoft CardSpace™ shown here
  • 11.
  • 12. Identity Selector Supported Card Types Copyright © 2008 Parity. Made available under EPL 1.0 Managed What some other entity says about you Personal What you say about you
  • 13.
  • 14. Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App Identity Provider Relying Party Website or App Cards are generated and downloaded from here. A local Token Service issues tokens as requested by Selector. Cards are stored and selected here Tokens containing claim data is requested and received here
  • 15. Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App Identity Provider Relying Party Some Higgins Identity Selectors rely on a hosted I-Card Service component
  • 16. Identity Selector Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins Identity Selectors. Client apps for Windows, OSX and Linux I-Card Web Service User
  • 17. Identity Selector Selector Selector – Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins includes a Higgins Selector Selector component (Windows-only) Provides an abstraction layer that decouples browser extensions from selectors. I-Card Web Service User
  • 18. Architecture Identity Providers Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Selectors Identity Attribute Service Identity Services
  • 19. Identity Providers Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector Higgins Token/IdP Service is used by the Identity Provider website User
  • 20.
  • 21. Architecture Relying Party Website Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Selectors Identity Attribute Service Identity Services
  • 22. Relying Party Website Component View Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet RP Libraries Selector Selector Higgins RP Website provides code to validate tokens from Identity Selectors Key: Generic Technology Higgins Components User
  • 23.
  • 24. Architecture Identity Services Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
  • 25. Architecture Extensible Identity Services Copyright © 2008 Parity. Made available under EPL 1.0 CardSpace Protocol Provider-Plugins Implement RP protocols OpenID Managed I-Card Provider-Plugins Implement card types Personal SAML X509 Relationship Kerberos Token Provider-Plugins Implement security tokens UN/PW Idemix Plug-ins Identity Services Login (un/pw) Key: Beyond Higgins 1.0 Higgins 1.0
  • 26. Architecture Identity Attribute Service Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
  • 27. Architecture Extensible Identity Attribute Service Copyright © 2008 Parity. Made available under EPL 1.0 Identity Attribute Service (IdAS) LDAP XML File IdAS Context Providers-Plugins Connect to existing data sources RDF Google Contacts Others… Plug-ins Key: Beyond Higgins 1.0 Higgins 1.0
  • 28.
  • 29.
  • 30.
  • 31. Architecture Interoperability Points Copyright © 2008 Parity. Made available under EPL 1.0 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors Identity Selectors
  • 32. Interoperability Event Participants RSA 2008 Copyright © 2008 Parity. Made available under EPL 1.0
  • 33. Interoperability Event Participants RSA 2008 Copyright © 2008 Parity. Made available under EPL 1.0
  • 34. Section Two: Higgins 1.1 June 2009 Copyright © 2008 Parity. Made available under EPL 1.0
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Relationship Cards Relationship Card What you and Best Buy say about you Copyright © 2008 Parity. Made available under EPL 1.0
  • 40.
  • 41.
  • 42.
  • 43.
  • 44. Selector as an OpenID Service OpenID Provider Identity Provider Relying Website I-Card Web Service Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components RP Libraries Selector Selector OpenID 2.0 OP with associated Higgins Selector Service User
  • 45.
  • 46. IdAS Client Component (maybe) Higgins Identity Selector Local App Higgins I-Card Service Banking Site eCommerce or Community Site SAML Enterprise Directory Social Network Site Social Networks RDF Semantic Web Repository Social Network Site STS IdP RP STS IdP RP SAML2 IdP I dAS Client LDAP Server Linked Data Server OpenSocial OpenID Provider I dAS Client IdAS Client Other Local Apps & Bots IdAS Client Internet Extension Browser Key: K ey: O ther… R DF O pen Social L DAP Enterprise Directories Enterprise Directories Enterprise Directories Social Networks Linked Data Linked Data Linked Data Higgins 1.0 H iggins X.X 3 rd Party I dAS RDF Data Source LDAP Directory Browser Computer or mobile device LDAP Identity Providers Web apps CP XDI Service XDI4J Selector Selector RDF CP Personal Data Services Web 2.0 and Enterprise Apps Higgins Extension Data Contexts Identity Attribute Service
  • 47. Section Three: Beyond Higgins 1.1 Mobile Higgins Higgins project is seeking project funding and/or contributions to develop a Higgins selector for mobile platforms Copyright © 2008 Parity. Made available under EPL 1.0
  • 48.
  • 49. Project Co-leads http://higgins-project.org Paul Trevithick Mary Ruddy [email_address] [email_address] +1.617.513.7924 +1.617.290.8591 Copyright © 2008 Parity. Made available under EPL 1.0
  • 50. Appendix Original Project Goals Copyright © 2008 Parity. Made available under EPL 1.0
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.