10.07.2015 Views

Report - Guardian

Report - Guardian

Report - Guardian

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

264 The LSE Identity Project <strong>Report</strong>: June 2005Figure 1 - Modern Enterprise Identity ArchitecturesAbout Modern Enterprise Identity Architectures.The above figure illustrates how modern enterprise identity architectures function, suchas Liberty Alliance’s ID-FF. To gain access to a service, a user (e.g., a companyemployee) engages in the following steps.Step 1. The user logs in to a central server (“authority”), using a password or astronger form of authentication.Step 2. The user requests access to a service, such as a corporate resource.Step 3. The service electronically queries the central authority, asking it if it hasauthenticated the user. (This step may be accomplished by redirecting thetransfer through the user, but this does not change the privacy implications of thearchitecture.)Step 4. The authority verifies the user’s identity and whether or not that user hasjust been authenticated, and proceeds by informing the service provider of itsdecision. Note: Step 1 may take place at this point.While enterprise identity architectures such as the Liberty Alliance ID-FF architecturemay be adequate for the corporate management of the identities of employees andsuppliers who access their corporate resources, it would have highly problematicimplications if used for government-to-citizen identity management. The identityprovider and the service providers would have the power to electronically monitor allcitizens in real time across all government services, and its insiders (as well as hackersand viruses) would have the power to commit undetectable government-wide identitytheft with a single press of a central button.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!