identity relationship management the next evolution of identity and access management for the...
TRANSCRIPT
Identity Relationship Management
The Next Evolution of Identity and Access Management for the
Internet of Everything
IRM Summit Kantara WorkshopTime Topic Presenter12:00-12:15 Welcome
Allan Foster
12:15-13:00 IRM Landscape, Trusted ID, ICAM, & FCCX
Joni Brennan
13:00-13:30 NSTIC / IDESG
Ian Glazer
13:30-14:15 UMA for Enterprise
Eve Maler
14:15-14:45 Break
14:45-15:15 Experian agile IDProofing
Kolin Whitley
15:15-15:45 Radiant Logic IRM ADAP, Contextual Identity
Michel Prompt
15:45-16:15 Open-Stand & Collaborative Communities – as core to bizdev
Karen McCabe
16:15-16:45 Calls to action & Thanks
Joni Brennan
Evolution of Identity
Employees
Consumers
Employees &Partners
Things
PerimeterPerimeter Federation
Perimeter-lessFederation
Cloud / SaaS
Perimeter-lessFederation
CloudSaaS
Mobility
AttributesContext
Stateless
Relationships
Identity Relationship Management
Model for managing a company’s interactions with current and future customers and “things” using Identity and Access Management (IAM).
IRM rapidly and cost effectively unleashes new business opportunities that drive next generation consumer-facing services and top line revenue.
Pillars of Identity Relationship Management …
CONSUMERS & THINGS over employees
ADAPTABLE over predictable
REVENUE over operating expense
VELOCITY over process and tools
INTERNET SCALE over enterprise scale
DYNAMIC over static intelligence
BORDERLESS over perimeter
MODULAR over monolithic
BUSINESS PILLARS TECHNICAL PILLARS
=
=
=
=
Who is Kantara60+ Leading Organizations, 100’s of Participants, Industry and Governments:
Trust
Privacy
Security
CommunityTrustees At-Large:
•Government of Canada
•Trans-European ResearchEducation Networking Association
Trusted Identity NSTIC – National Strategy for Trusted Identities
in Cyberspace Trust is not the goal Identity is not the goal
Trust and Identity are tools to enable business and public services growth
Trustworthy Identities enable Trusted platforms where businesses connect and services grow.
Trusted Identity Kantara Programs verify
IdPs and Assessors Policy, Technology, Privacy
Reusable program applicable to FICAM, FCCX, NSTIC, EU eIDAS,
IDAP, + IdPs, RPs, FOs
Our part in the trust chain
FICAM & FCCX FICAM – Federal Identity Credential and Access
Management (Policy) Connects citizens to public services leveraging private sector
Credential Service Providers Kantara Operates Certification Program – Trust Framework
Provider
FCCX – Federal Cloud Credential eXchange (Implementation) The technical identity hub that operates FICAM Kantara Operates Certification Program – Trust Framework
Provider
Trust Framework Model
RegistrationRegistration
VerificationVerification
AssessmentAssessment
CertificationCertification
Trust Status Listing Service
Trust Status Listing Service
Interested Parties
Interested Parties
Kantara Trust RegistryKantara Trust Registry
Accredited and Approved
Verizon Universal Identity Service (VUIS)
IDPV Component Recognition
Norton Credential Service Provider
Registered ApplicantMITREid (LoA 1) organizations in
pipeline
Kantara Accredited to LoA 1-4 Kantara Approved to LoA 1-3 non-crpyto
Component Services
Responding to industry experts Kantara members developed the modular component service approach.
Component Services: •Identity Proofing / Verification •Credential Issuance and Management
Responding to industry experts Kantara members developed the modular component service approach.
Component Services: •Identity Proofing / Verification •Credential Issuance and Management
Identity Proofing & Verification
Organizational Trust
Credential & Token
Management
Credential Service Provider
Questions?
•Kantara Executive Director: Joni Brennan [email protected]
•General Inquiries: [email protected]
JOIN INNOVATE TRUST