10.07.2015 Views

Understanding Digital Identity Management - Phil Windley's ...

Understanding Digital Identity Management - Phil Windley's ...

Understanding Digital Identity Management - Phil Windley's ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The level of authentication required is usually proportional to the risk that attendsaccess to the resource.Once the credentials are believed to be authentic, the authority retrieves thesecurity policy for the resource or passes them to a separate policy decisionpoint (PDP). The PDP uses the policy and asserted identity to determine theentitlements and permissions associated with that resource for the assertedidentity. Entitlements are the services and resources to which an identity isentitled. Examples include a credit limits, disk space or bandwidth allocations,and so on. Permissions are the actions that the subject is allowed to performwith respect to the resource, such as withdrawing funds, completing a purchase,and updating a record. When the PDP transfers this information back to thePEP, it does so in an authorization decision assertion (ADA).Information security protects information from unauthorized access, destruction,or alteration. Thus security is an identity and authorization issue. Privacy is theprotection of the attributes, preferences, and traits associated with an identityfrom being disseminated beyond the subject’s needs in any particulartransaction. In a circular manner, privacy is built upon a foundation of goodinformation security and that is dependent upon good identity management.This relationship is shown in Figure 1.Figure 1: The <strong>Identity</strong>, Security, Privacy Triangle<strong>Identity</strong> Scenarios in the Physical WorldThe world of digital identity is full of concepts that at first glance appear foreignbecause of the need to give precise definitions to terms in order to discuss themand specify system behavior using them. In reality, most of these concepts are<strong>Digital</strong> <strong>Identity</strong> <strong>Management</strong> 2 of 20 <strong>Phil</strong>lip J. Windleywww.windley.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!