Skip to main content

POST Self-Sovereignty and the Three Domain Model

xxx

In June 2017, the National Institute of Standards and Technology revised its digital identity implementation guidelines in Special Publication 800-63.  By the end of June 2018, all federal agencies will be required to have legacy systems and applications in compliance with the guidelines.

From NIST's digital identity deadline approaches -- GCN

The NIST Digital Identity Guidelines use a three part model to create a standardised framework for dealing with the digital identity.

The NIST guidelines break up digital identity management into three sections: enrollment and identity proofing, authentication and life cycle management and .

From NIST's digital identity deadline approaches -- GCN

If that breakdown sounds familiar to blog readers, it’s because it is congruent with the “Three Domain Identity” (3DID) model that we developed a few years ago to help our clients to formulate strategies around digital identity. Just as a reminder, the three domains in our model are “identification” (NIST’s enrollment, identity proofing), “authentication” (NIST’s authentication and life cycle management), and “authorisation” (NIST’s federation and assertions). I made a handy “cut out n’ keep” graphic. 

xxx

The Three Domain Identity (3DID) Model  

So, it seems to me that the 3DID model provides an excellent basis for government and business to establish a shared digital identity paradigm.

Comments

Popular posts from this blog

We could fix mobile security, you know. We don't, but we could

Earlier in the week I blogged about mobile banking security , and I said that in design terms it is best to assume that the internet is in the hands of your enemies. In case you think I was exaggerating… The thieves also provided “free” wireless connections in public places to secretly mine users’ personal information. From Gone in minutes: Chinese cybertheft gangs mine smartphones for bank card data | South China Morning Post Personally, I always use an SSL VPN when connected by wifi (even at home!) but I doubt that most people would ever go to this trouble or take the time to configure a VPN and such like. Anyway, the point is that the internet isn’t secure. And actually SMS isn’t much better, which is why it shouldn’t really be used for securing anything as important as home banking. The report also described how gangs stole mobile security codes – which banks automatically send to card holders’ registered mobile phones to verify online transactions – by using either a Trojan...