Anda di halaman 1dari 12

The Laws of Identity …as of 5/12/2005

The Laws of Identity


The Internet was built without a way to know who and what you are connecting to. This limits
what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly
proliferating episodes of theft and deception which will cumulatively erode public trust in the Inter-
net.
This paper is about how we can prevent that loss of trust and go forward to give Internet users a
deep sense of safety, privacy and certainty about who they are relating to in cyberspace. Nothing
could be more essential if new Web-based services and applications are to continue to move be-
yond “cyber publication” and encompass all kinds of interaction and services. Our approach has
been to develop a formal understanding of the dynamics causing digital identity systems to suc-
ceed or fail in various contexts, expressed as the Laws of Identity. Taken together, these laws
define a unifying identity metasystem that can offer the Internet the identity layer it so obviously
requires.
The ideas presented here were extensively refined through the Blogosphere in a wide-ranging
conversation documented at www.identityblog.com that crossed many of the conventional fault-
lines of the computer industry, and in various private communications. In particular I would like to
thank Arun Nanda, Andre Durand, Bill Barnes, Carl Ellison, Caspar Bowden, Craig Burton, Dan
Blum, Dave Kearns, Dave Winer, Dick Hardt, Doc Searls, Drummond Reed, Ellen McDermott,
Eric Norlin, Esther Dyson, Fen Labalme, Identity Woman Kaliya, JC Cannon, James Kobielus,
James Governor, Jamie Lewis, John Shewchuk, Luke Razzell, Marc Canter, Mark Wahl, Martin
Taylor, Mike Jones, Phil Becker, Radovan Janocek, Ravi Pandya, Robert Scoble, Scott C.
Lemon, Simon Davies, Stefan Brands, Stuart Kwan and William Heath.

There is no consistent and comprehensible


Problem Statement framework allowing them to evaluate the
authenticity of the sites they visit, and they
The Internet was built without a way to know don’t have a reliable way of knowing when
who and what you are connecting to. they are disclosing private information to
illegitimate parties. At the same time they
A patchwork of identity lack a framework for controlling or even re-
one-offs membering the many different aspects of
their digital existence.
Since this essential capability is missing,
everyone offering an Internet service has Criminalization of the Internet
had to come up with a workaround. It is fair
to say that today’s Internet, absent a native People have begun to use the Internet to
identity layer, is based on a patchwork of manage and exchange things of progres-
identity one-offs. sively greater real-world value. This has not
gone unnoticed by a criminal fringe which
As peoples’ use of the web broadens, so
understands the ad hoc and vulnerable na-
does their exposure to these workarounds.
ture of the identity patchwork – and how to
Though no one is to blame, the result is per-
subvert it. These criminal forces have in-
nicious. Hundreds of millions of people
creasingly professionalized and organized
have been trained to accept anything any
themselves internationally.
site wants to throw at them as being the
“normal way” to conduct business online. Individual consumers are tricked into releas-
They have been taught to type their names, ing banking and other information through
secret passwords and personal identifying “Phishing” schemes which take advantage
information into almost any input form that of their inability to tell who they are dealing
appears on their screen. with. They are also induced to inadvertently

Kim Cameron, Architect of Identity, Microsoft Corporation 1


The Laws of Identity …as of 5/12/2005

install “spyware” which resides on their composability we have achieved in other


computers and harvests information in long aspects of web services will enable nothing
term “Pharming” attacks. Other schemes new. Knowing who is connecting with what
successfully target corporate, government is a must for the next generation of cyber
and educational databases with vast identity services to break out of the starting gate.
holdings, and succeed in stealing hundreds
of thousands of identities in a single blow. It’s hard to add an identity layer
Criminal organizations exist to acquire these
identities and resell them to a new breed of There have been attempts to add more
innovators expert in using them to steal as standardized digital identity services to the
much as possible in the shortest possible Internet. And there have been partial suc-
time. The international character of these cesses in specific domains – like the use of
networks makes them increasingly difficult to SSL to protect connections to public sites; or
2
penetrate and dismantle. of Kerberos within enterprises.
Phishing and Pharming are now thought to But these successes have done little to
be one of the fastest growing segments of transform the identity patchwork into a ra-
the computer industry, with an annual com- tional fabric extending across the Internet.
pound growth rate (CAGR) of 1000%.1 Why is it so hard to create an identity layer
Without a significant change in how we do for the Internet? Mainly because there is
things, this trend will continue. little agreement on what it should be and
It is essential to look beyond the current how it should be run. This lack of agree-
situation, and understand that if the current ment arises because digital identity is re-
dynamics continue unchecked, we are lated to context, and the Internet, while be-
headed toward a deep crisis: the ad hoc ing a single technical framework, is experi-
nature of Internet identity cannot withstand enced through a thousand kinds of content
the growing assault of professionalized at- in at least as many different contexts – all of
tackers. which flourish on top of that underlying
framework. The players involved in any one
A deepening public crisis of this sort would of these contexts want to control digital iden-
mean the Internet would begin to lose credi- tity as it impacts them, in many cases want-
bility and acceptance for economic transac- ing to prevent spillover from their context to
tions when it should be gaining that accep- any other.
tance. But in addition to the danger of slip-
ping backwards, we need to understand the Enterprises, for example, see their relation-
costs of not going forward. The absence of ships with customers and employees as key
an identity layer is one of the key factors assets, and are fiercely protective of them.
limiting the further settlement of cyberspace. It is unreasonable to expect them to restrict
their own choices or give up control over
Further, the absence of a unifying and ra- how they create and represent their relation-
tional identity fabric will prevent us from ships digitally. Nor has any single approach
reaping the benefits of web services. arisen which might serve as an obvious mo-
Web services have been designed to let us tivation to do so. The differing contexts of
build robust, flexible, distributed systems discreet enterprises lead to a requirement
that can deliver important new capabilities, that they be free to adopt different kinds of
and evolve in response to their environment. solutions. Even ad hoc identity one-offs are
Such living services need to be loosely cou- better than an identity framework which
pled and organic, breaking from the para- would be out of their control.
digm of rigid premeditation and hard-wiring. Governments too have found they have
But as long as digital identity remains a needs that distinguish them from other kinds
patchwork of ad hoc one-offs which must of organization. And specific industry clus-
still be hard-wired, all the negotiation and ters – “verticals” like the financial industry –

Kim Cameron, Architect of Identity, Microsoft Corporation 2


The Laws of Identity …as of 5/12/2005

have come to see they have unique difficul- have been done many times before as com-
ties and aspirations when it comes to main- puting has evolved.
taining digital relationships with their cus-
For instance, in the early days of personal
tomers.
computing, application builders had to be
As important as these institutions are, the aware of what type of video display was in
individual – as consumer – gets the final say use, and of the specific characteristics of the
about any proposed cyber identity system. storage devices that were installed. Over
Anything they don’t like and won’t – or can’t time, a layer of software emerged that was
– use will inevitably fail. Someone else will able to provide a set of services abstracted
come along with an alternative. from the specificities of any given hardware.
The technology of “device drivers” enabled
Consumer fears about the safety of the
interchangeable hardware to be plugged in
Internet prevent many from using credit
as required. Hardware became “loosely
cards to make on-line purchases. Increas-
coupled” to the computer – allowing it to
ingly, malware and identity theft have made
evolve quickly since applications did not
privacy issues of paramount concern to
need to be rewritten to take advantage of
every Internet user. This has resulted in
new features.
increased awareness and readiness to re-
spond to larger privacy issues. The same can be said about the evolution of
networking. At one time applications had to
As the virtual world has evolved, privacy
be aware of the specific network devices in
specialists have developed nuanced and
use. Eventually the unifying technologies of
well-reasoned analyses of identity from the
sockets and TCP/IP emerged, able to work
point of view of the consumer and citizen. In
with many specific underlying systems (To-
response to their intervention, legal thinkers,
ken Ring, Ethernet, X.25 and Frame Relay)
government policy makers, and elected rep-
– and even with systems, like wireless, that
resentatives have become increasingly
were not yet invented.
aware of the many difficult privacy issues
facing society as we settle cyberspace. This Digital identity requires a similar approach.
has already led to vendor sensitivity and We need a unifying identity metasystem
government intervention, and more is to be that can protect applications from the inter-
expected. nal complexities of specific implementations
and allow digital identity to become loosely
In summary, as grave as the dangers of the
coupled. This metasystem is in effect a sys-
current situation may be, the emergence of
tem of systems that exposes a unified inter-
a single simplistic digital identity solution as
face much like a device driver or network
a universal panacea is not realistic.
socket does. That allows one-offs to evolve
Even if some miracle occurred and the vari- towards standardized technologies that work
ous players could work out some kind of within a metasystem framework without re-
broad cross-sector agreement about what quiring the whole world to agree a priori.
constitutes perfection in one country, the
probability of extending that universally Understanding the obstacles
across international borders would be zero.
To restate our initial problem, the role of an
An identity metasystem identity metasystem is to provide a reliable
way to establish who is connecting with what
In the case of digital identity, the diverse – anywhere on the Internet.
needs of many players demand that we
We have observed that various types of sys-
weave a single identity fabric out of multiple
tems have successfully provided identifica-
constituent technologies. Although this
tion in specific contexts. Yet despite their
might initially seem daunting, similar things
success they have failed to attract usage in
other scenarios. What factors explain these

Kim Cameron, Architect of Identity, Microsoft Corporation 3


The Laws of Identity …as of 5/12/2005

successes and failures? Moreover, what failures of Microsoft’s Passport identity sys-
would be the characteristics of a solution tem.
that would work at internet scale? In an-
The Laws of Identity, taken together, define
swering these questions, there is much to be
the architecture of the Internet’s missing
learnt from the successes and failures of
identity layer.
various approaches since the 1970’s.
This investigation has led to a set of ideas Words that allow dialogue
called the “Laws of Identity”. We chose the
word “laws” in the scientific sense of hy- Many people have thought about identity,
potheses about the world – resulting from digital identities, personas and representa-
observation – which can be tested and are tions. In proposing the laws we do not ex-
3
thus disprovable. The reader should bear pect to close this discussion. However, in
in mind that we specifically did not want to keeping with the pragmatic goals of this ex-
denote legal or moral precepts, nor embark ercise we define a vocabulary that will allow
on a discussion of the “philosophy of iden- the laws themselves to be understood.
4
tity” .
These laws enumerate the set of objective What is a digital identity?
dynamics defining a digital identity metasys- We will begin by defining a digital identity as
tem capable of being widely enough ac- a set of claims made by one digital subject
cepted that it can serve as a backplane for about itself or another digital subject. We
distributed computing on an Internet ask the reader to let us define what we
scale. As such, each law ends up giving mean by a digital subject and a set of claims
rise to an architectural principle guiding the before examining this further.
construction of such a system.
Our goals are pragmatic. When we postu- What is a digital subject?
late the Law of User Control and Con-
sent, for example, it is because experience The Oxford English Dictionary (OED) de-
tells us: a system that does not put users in fines a subject this way:
control will – immediately or over time - be "…a person or thing that is being
rejected by enough of them that it cannot discussed, described or dealt with."
become and remain a unifying technol-
ogy. How this law meshes with values is not So we define a digital subject as:
the relevant issue. “…a person or thing represented or
Like the other laws, this one represents a existing in the digital realm which is
contour limiting what an identity metasystem being described or dealt with".
must look like - and must not look like - Much of the decision-making involved in
given the many social formations and cul- distributed computing is the result of "deal-
tures in which it must be able to operate. ing with” an initiator or requester. And it is
Understanding the laws can help eliminate a worth pointing out that the digital world in-
lot of doomed proposals before we waste cludes many subjects which need to be
too much time on them. "dealt with" other than humans, including:
The laws are testable. They allow us to • devices and computers (which allow
predict outcomes – and we have done so us to penetrate the digital realm in
consistently since proposing them. They the first place)
are also objective, i.e. they existed and op-
erated before they were formulated. That is • digital resources (which attract us to
how the Law of Justifiable Parties, for ex- it)
ample, can account for the successes and • policies and relationships between
other digital subjects (e.g. between

Kim Cameron, Architect of Identity, Microsoft Corporation 4


The Laws of Identity …as of 5/12/2005

humans and devices or documents open to participation by many different sub-


or services). jects, the more obvious this becomes.
The OED goes on to define subject, in a The use of the word claim is therefore more
philosophical sense, as the "central sub- appropriate in a distributed and federated
stance or core of a thing as opposed to its environment than alternate words such as
attributes". As we shall see, "attributes" are “assertion”, which means “a confident and
6
the things expressed in claims, and the sub- forceful statement of fact or belief" . In
ject is the central substance thereby de- evolving from a closed domain model to an
5
scribed. open, federated model, the situation is trans-
formed into one where the party making an
What is a claim? assertion and the party evaluating it may
have a complex and even ambivalent rela-
A claim is: tionship. In this context, assertions need
"…an assertion of the truth of some- always be subject to doubt - not only doubt
thing, typically one which is disputed that they have been transmitted from the
or in doubt". sender to the recipient intact, but also doubt
that they are true, and doubt that they are
Some examples of claims in the digital realm even of relevance to the recipient.
will likely help:
• A claim could just convey an identi- Advantages of a claims-based
fier - for example, that the subject’s definition
student number is 490-525, or that
the subject’s Windows name is The definition of digital identity employed
REDMOND\kcameron. This is the here encompasses all the known digital
way many existing identity systems identity systems and therefore allows us to
work. begin to unify the rational elements of our
patchwork conceptually. It allows us to de-
• Another claim might assert that a fine digital identity for a metasystem em-
subject knows a given key – and bracing multiple implementations and ways
should be able to demonstrate this of doing things.
fact.
In proffering this definition, we recognize it
• A set of claims might convey per- does not jive with some widely held beliefs –
sonally identifying information – for example that within a given context, iden-
name, address, date of birth and tities have to be unique. Many early sys-
citizenship, for example. tems were built with this assumption, and it
is a critically useful assumption in many con-
• A claim might simply propose that a
texts. The only error is in thinking it is man-
subject is part of a certain group – datory for all contexts.
for example, that she has an age
less than 16. By way of example, consider the relationship
between a company like Microsoft and an
• And a claim might state that a sub- analyst service that we will call Contoso
ject has a certain capability – for ex- Analytics. Let's suppose Microsoft contracts
ample to place orders up to a cer- with Contoso Analytics so anyone from Mi-
tain limit, or modify a given file. crosoft can read its reports on industry
The concept of “being in doubt" grasps the trends. Let's suppose also that Microsoft
subtleties of a distributed world like the doesn't want Contoso Analytics to know ex-
Internet. Claims need to be subject to actly who at Microsoft has what interests or
evaluation by the party depending on them. reads what reports.
The more our networks are federated and In this scenario we actually do not want to
employ unique individual identifiers as digital
Kim Cameron, Architect of Identity, Microsoft Corporation 5
The Laws of Identity …as of 5/12/2005

identities. Contoso Analytics still needs a uses it. The system must first of all appeal
way to ensure that only valid customers get by means of convenience and simplicity.
to its reports. But in this example, digital But to endure, it must earn the user’s trust
identity would best be expressed by a very above all.
limited claim - the claim that the digital sub-
Earning this trust requires a holistic com-
ject currently accessing the site is some Mi-
mitment. The system must be designed to
crosoft employee. Our claims-based ap-
put the user in control - of what digital identi-
proach succeeds in this regard. It permits
ties are used, and what information is re-
one digital subject (Microsoft Corporation) to
leased.
assert things about another digital subject
without using any unique identifier. The system must also protect the user a-
gainst deception, verifying the identity of any
This definition of digital identity calls upon us
parties who ask for information. Should the
to separate cleanly the presentation of
user decide to supply identity information,
claims from the provability of the link to a
there must be no doubt that it goes to the
real world object.
right place. And the system needs mecha-
Our definition leaves the evaluation of the nisms to make the user aware of the pur-
usefulness (or the truthfulness or the trust- poses for which any information is being
worthiness) of the claim to the relying party. collected.
The truth and possible linkage is not in the
The system must inform the user when he or
claim, but results from the evaluation. If the
she has selected an identity provider able to
evaluating party decides it should accept the
track internet behavior.
claim being made, then this decision just
represents a further claim about the subject, Further, it must reinforce the sense that the
this time made by the evaluating party (it user is in control regardless of context,
may or may not be conveyed further). rather than arbitrarily altering its contract
with the user. This means being able to
Evaluation of a digital identity thus results
support user consent in enterprise as well as
in a simple transform of what it starts with –
consumer environments. It is essential to
again producing in a set of claims made by
retain the paradigm of consent even when
one digital subject about another. Matters of
refusal might break a company’s conditions
trust, attribution and usefulness can then be
of employment. This serves both to inform
factored out and addressed at a higher layer
the employee and indemnify the employer.
in the system than the mechanism for ex-
pressing digital identity itself. The Law of User Control and Consent al-
lows for the use of mechanisms whereby the
metasystem remembers user decisions, and
users may opt to have them applied auto-
The Laws of Identity matically on subsequent occasions.
We can now look at the seven essential
laws that explain the successes and failures

2
of digital identity systems. Minimal Disclosure for a
Constrained Use

1
User Control and Consent
The solution which discloses the
Technical identity systems must only least amount of identifying information and
reveal information identifying a user best limits its use is the most stable long
with the user’s consent. term solution. (Starts here...)
(Blogosphere discussion starts here...)
We should build systems that employ identi-
No one is as pivotal to the success of the fying information on the basis that a breach
identity metasystem as the individual who is always possible. Such a breach repre-

Kim Cameron, Architect of Identity, Microsoft Corporation 6


The Laws of Identity …as of 5/12/2005

sents a risk. To mitigate risk, it is best to


acquire information only on a “need to know”
basis, and to retain it only on a “need to re-

3
Justifiable Parties
tain” basis. By following these practices, we
can ensure the least possible damage in the Digital identity systems must be de-
event of a breach. signed so the disclosure of identify-
ing information is limited to parties
At the same time, the value of identifying having a necessary and justifiable place in a
information decreases as the amount de- given identity relationship. (Starts here...)
creases. A system built with the principles
of information minimalism is therefore a less The identity system must make its user
attractive target for identity theft, reducing aware of the party or parties with whom she
risk even further. is interacting while sharing information.
By limiting use to an explicit scenario (in The justification requirements apply both to
conjunction with the use policy described in the subject who is disclosing information
the law of control), the effectiveness of the and the relying party who depends on it.
“need to know” principle in reducing risk is Our experience with Microsoft’s Passport is
further magnified. There is no longer the instructive in this regard. Internet users saw
possibility of collecting and keeping informa- Passport as a convenient way to gain ac-
tion “just in case” it might one day be re- cess to MSN sites, and those sites were
quired. happy using Passport – to the tune of over a
billion interactions per day. However, it did
The concept of “least identifying information” not make sense to most non-MSN sites for
should be taken as meaning not only the Microsoft to be involved in their customer
fewest number of claims, but the information relationships. Nor were users clamoring for
least likely to identify a given individual a single Microsoft identity service to be
across multiple contexts. For example, if a aware of all their Internet activities. As a
scenario requires proof of being a certain result, Passport failed in its mission of being
age, then it is better to acquire and store the an identity system for the Internet.
age category rather than the birth date.
Date of birth is more likely, in association We will see many more examples of this law
with other claims, to uniquely identify a sub- going forward. Today some governments
ject, and so represents “more identifying are thinking of operating digital identity ser-
information” which should be avoided if it is vices. It makes sense (and is clearly justifi-
not needed. able) for people to use government-issued
identities when doing business with the gov-
In the same way, unique identifiers that can ernment. But it will be a cultural matter
be reused in other contexts (for example whether, for example, citizens agree it is
drivers’ license numbers, social security "necessary and justifiable" for government
numbers and the like) represent “more iden- identities to be used in controlling access to
tifying information” than unique special- a family wiki – or connecting a consumer to
purpose identifiers that do not cross context. her hobby or vice.
In this sense, acquiring and storing a social
security number represents a much greater The same issues will confront intermediaries
risk than assigning a randomly generated building a trust fabric. The law is not in-
student or employee number. tended to suggest limitations of what is pos-
sible, but rather to outline the dynamics of
Numerous identity catastrophes have oc- which we must be aware.
curred where this law has been broken.
We know from the law of control and con-
We can also express the Law of Minimal sent that the system must be predictable
Disclosure this way: aggregation of identify- and "translucent" in order to earn trust. But
ing information also aggregates risk. To the user needs to understand who she is
minimize risk, minimize aggregation.

Kim Cameron, Architect of Identity, Microsoft Corporation 7


The Laws of Identity …as of 5/12/2005

dealing with for other reasons, as we will tage - in fact there is a great disadvantage -
see in law six (human integration). In the in changing a public URL. It is fine for every
physical world we are able to judge a situa- visitor to the site to examine the public key
tion and decide what we want to disclose certificate. It is equally acceptable for eve-
about ourselves. This has its analogy in ryone to know the site is there: its existence
digital justifiable parties. is public.
Every party to disclosure must provide the A second example of such a public entity is
disclosing party with a policy statement a publicly visible device like a video projec-
about information use. This policy tor. The device sits in a conference room in
should govern what happens to disclosed an enterprise. Visitors to the conference
information. One can view this pol- room can see the projector and it offers digi-
icy as defining "delegated rights" issued by tal services by advertising itself to those who
the disclosing party. come near it. In the thinking outlined here, it
has an omni-directional identity.
Any use policy would allow all parties to co-
operate with authorities in the case On the other hand, a consumer visiting a
of criminal investigations. But this does not corporate web site is able to use the identity
mean the state is party to the identity rela- beacon of that site to decide whether she
tionship. Of course, this should be made wants to establish a relationship with it. Her
explicit in the policy under which information system can then set up a "unidirectional"
is shared. identity relation with the site by selecting an
identifier for use with that site and no other.
A unidirectional identity relation with a differ-

4
Directed Identity
ent site would involve fabricating a com-
A universal identity system must pletely unrelated identifier. Because of this,
support both “omni-directional” there is no correlation handle emitted that
identifiers for use by public entities can be shared between sites to assemble
and “unidirectional” identifiers for profile activities and preferences into super-
use by private entities, thus facilitating dis- dossiers.
covery while preventing unnecessary re-
lease of correlation handles. (Starts here...) When a computer user enters a conference
room equipped with the projector described
Technical identity is always asserted with above, its omni-directional identity beacon
respect to some other identity or set of iden- could be utilized to decide (as per the law of
tities. To make an analogy with the physical control) whether she wants to interact
world, we can say identity has direction, not with it. If she does, a short-lived unidirec-
just magnitude. One special "set of identi- tional identity relation could be estab-
ties" is that of all other identities (the pub- lished between the computer and the projec-
lic). Other important sets exist (for example, tor - providing a secure connection while
the identities in an enterprise, some arbitrary divulging the least possible identifying infor-
domain, or in a peer group). mation in accordance with the law of mini-
Entities that are public can have identifiers mal disclosure.
that are invariant and well-known. These Bluetooth and other wireless technologies
public identifiers can be thought of as bea- have not so far conformed to the fourth law.
cons – emitting identity to anyone who They use public beacons for private entities.
shows up. And beacons are "omni direc- This explains the consumer backlash inno-
tional" (they are willing to reveal their exis- vators in these areas are currently wrestling
tence to the set of all other identities). with.
A corporate web site with a well-known URL Public key certificates have the same prob-
and public key certificate is a good example lem when used to identify individuals in con-
of such a public entity. There is no advan- texts where privacy is an issue. It may be

Kim Cameron, Architect of Identity, Microsoft Corporation 8


The Laws of Identity …as of 5/12/2005

more than coincidental that certificates have But in many cultures, employers and em-
so far been widely used when in confor- ployees would not feel comfortable using
mance with this law (i.e. in identifying public government identifiers to log in at work. A
web sites) and generally ignored when it government identifier might be used to con-
comes to identifying private individuals. vey taxation information; it might even be
required when a person is first offered em-
Another example involves the proposed us-
ployment. But the context of employment is
age of RFID technology in passports and
sufficiently autonomous that it warrants its
student tracking applications. RFID devices
own identity, free from daily observation via
currently emit an omni-directional public
a government-run technology.
beacon. This is not appropriate for use by
private individuals. Customers and individuals browsing the web
meanwhile will in many cases want higher
Passport readers are public devices and
levels of privacy than is likely to be provided
therefore should employ an omni-directional
by any employer.
beacon. But passports should only respond
to trusted readers. They should not be emit- So when it comes to digital identity, it is not
ting signals to any eavesdropper which iden- only a matter of having identity providers run
tify their bearers and peg them as nationals by different parties (including individuals
of a given country. Examples have been themselves), but of having identity sys-
given of unmanned devices which could be tems that offer different (and potentially con-
detonated by these beacons. In California tradictory) features.
we are already seeing the first legislative
A universal system must embrace differen-
measures being taken to correct abuse of
tiation, while recognizing that each of us is
identity directionality. It shows a failure of
simultaneously - in different contexts - a citi-
vision among technologists that legislators
zen, an employee, a customer, a virtual per-
understand these issues before we do.
sona.
This demonstrates, from yet another angle,
that different identity systems must exist in a

5
Pluralism of Operators metasystem. It implies we need a simple
and Technologies: encapsulating protocol (a way of agreeing
on and transporting things). We also need a
A universal identity system way to surface information through a unified
must channel and enable the inter-working user experience that allows individuals and
of multiple identity technologies run by mul- organizations to select appropriate identity
tiple identity providers. (Starts here...) providers and features as they go about
It would be nice if there were one way to their daily activities.
express identity. But the numerous contexts The universal identity metasystem must not
in which identity is required won’t allow it. be another monolith. It must be polycentric
One reason there will never be a single, (federation implies this) and also polymor-
centralized monolithic system (the opposite phic (existing in different forms). This will
of a metasystem) is because the character- allow the identity ecology to emerge, evolve
istics that would make any system ideal in and self-organize.
one context will disqualify it in another. Systems like RSS and HTML are powerful
It makes sense to employ a government because they vehicle any content. We need
issued digital identity when interacting with to see that identity itself will have several -
government services (a single overall iden- perhaps many - contents, and yet can be
tity neither implies nor prevents correlation expressed in a metasystem.
of identifiers between individual government
departments).

Kim Cameron, Architect of Identity, Microsoft Corporation 9


The Laws of Identity …as of 5/12/2005

derlying platform or software is unknown or

6
Human Integration:
has a small adoption.
The universal identity metasys-
tem must define the human One example is United Airlines’ Channel 9.
user to be a component of the dis- It carries a live conversation between the
tributed system integrated through cockpit of one’s plane and air traffic control.
unambiguous human-machine communica- The conversation on this channel is very
tion mechanisms offering protection against important, technical and focused. Partici-
identity attacks. (Starts here...) pants don't “chat” - all parties know precisely
what to expect from the tower and the air-
We have done a pretty good job of securing plane. As a result, even though there is a lot
the channel between web servers and of radio noise and static, it is easy for the
browsers through the use of cryptography – pilot and controller to pick out the ex-
a channel that might extend for thousands of act content of the communication. When
miles. But we have failed to adequately pro- things go wrong, the broken predictability of
tect the two or three foot channel between the channel marks the urgency of the situa-
the browser’s display and the brain of the tion and draws upon every human faculty to
human who uses it. This immeasurably understand and respond to the danger. The
shorter channel is the one under attack from limited semiotics of the channel mean there
phishers and pharmers. is very high reliability in communications.
No wonder. What identities is the user deal- We require the same kind of bounded and
ing with as she navigates the web? How highly predictable ceremony for the ex-
understandably is identity information con- change of identity information. A ceremony
veyed to her? Do our digital identity sys- is not a “whatever feels good” sort of thing.
tems interface with users in ways that objec- It is predetermined.
tive studies have shown to work? Identity
information currently takes the form of cer- But isn’t this limitation of possibilities at odds
tificates. Do studies show certificates are with our ideas about computing? Haven’t
meaningful to users? many advances in computing come about
through ambiguity and unintended conse-
What exactly are we doing? Whatever it is, quences which would be ruled out in the
we’ve got to do it better: the identity system austere light of ceremony?
must extend to and integrate the human
user. These are valid questions. But we definitely
don’t want unintended consequences when
Carl Ellison and his colleagues have coined figuring out who we are talking to or what
the term ‘ceremony’ to describe interac- personal identification information to reveal.
tions that span a mixed network of human
and cybernetic system components – the full The question is how to achieve very high
channel from web server to human brain. A levels of reliability in the communication be-
ceremony goes beyond cyber protocols to tween the system and its human users. In
ensure the integrity of communication with large part, this can be measured objectively
the user. through user testing.

This concept calls for profoundly changing


the user’s experience so it becomes predict-
Consistent Experience

7
able and unambiguous enough to allow for
informed decisions. Across Contexts
Since the identity system has to work on all The unifying identity metasystem
platforms, it must be safe on all platforms. must guarantee its users a simple,
The properties that lead to its safety can't be consistent experience while ena-
based on obscurity or the fact that the un- bling separation of contexts through multiple
operators and technologies.
Kim Cameron, Architect of Identity, Microsoft Corporation 10
The Laws of Identity …as of 5/12/2005

Let's project ourselves into a future where • A user will want to understand his or
we have a number of contextual identity her options and select the best iden-
choices. For example: tity for the context
• browsing: a self-asserted identity Putting all the laws together, we can see
for exploring the web (giving away that the request, selection, and proffering of
no real data) identity information must be done such that
the channel between the parties is safe.
• personal: a self-asserted identity
The user experience must also prevent am-
for sites with which I want an ongo- biguity in the user’s consent, and under-
ing but private relationship (includ- standing of the parties involved and their
ing my name and a long-term email proposed uses. These options need to be
address)
consistent and clear. Consistency across
• community: a public identity contexts is required for this to be done in a
for collaborating with others way that communicates unambiguously with
the human system components.
• professional: a public identity for
collaborating issued by my employer As users, we need to see our various identi-
ties as part of an integrated world which
• credit card: an identity issued by none the less respects our need for inde-
my financial institution pendent contexts.
• citizen: an identity issued by my
government
We can expect that different individuals will
have different combinations of these digital
identities, as well as others. Conclusion
To make this possible, we must “thingify” Those of us who work on or with identity
7
digital identities – make them into “things” systems need to obey the Laws of Identity.
the user can see on the desktop, add and Otherwise, we create a wake of reinforcing
delete, select and share. How usable would side-effects that eventually undermine all
today’s computers be had we not invented resulting technology. The result is similar to
icons and lists that consistently represent what would happen if civil engineers were to
folders and documents? We must do the flaunt the law of gravity. By following them
same with digital identities. we can build a unifying identity metasystem
that is universally accepted and enduring.
What type of digital identity is acceptable in
a given context? The properties of potential
candidates will be specified by the web ser-
vice from which a user wants to obtain a 1
For example, the Anti-Phishing Working
service. Matching thingified digital identities Group “Phishing Activity Trends Report” of
can then be displayed to the user, who can February 2005 cites an annual monthly
select between them and use them to un- growth rate in phishing sites between July
derstand what information is being re- through February of 26% per month, which
quested. This allows the user to control represents a compound annual growth rate
what is released. of 1600%.
Different relying parties will require different 2
And recently, we have seen successful
kinds of digital identities. And two things are examples of federation in business to busi-
clear: ness identity sharing.
• A single relying party will often want
to accept more than one kind of
identity; and

Kim Cameron, Architect of Identity, Microsoft Corporation 11


The Laws of Identity …as of 5/12/2005

3
We consciously avoided the words “propo-
sition”, meaning something proven through
logic rather than experiment, and “axiom”,
meaning something self-evident.

4
All three areas are of compelling interest,
but it is necessary to tightly focus the current
discussion on matters which are directly
testable and applicable to solving the imma-
nent crisis of the identity infrastructure.

5
We have selected the word subject in pref-
erence to alternatives such as "entity", which
means "a thing with distinct and independ-
ent existence". The independent existence
of a thing is a moot point here - it may well
be an aspect of something else. What is
important is that the thing is being dealt with
by some relying party and that claims are
being made about it.

6
OED

7
We have chosen to “localize” the more
venerable word “reify”.

Kim Cameron, Architect of Identity, Microsoft Corporation 12

Anda mungkin juga menyukai