Identity Relationship Management The Next Evolution of Identity and Access Management for the...

38
Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything

Transcript of Identity Relationship Management The Next Evolution of Identity and Access Management for the...

Identity Relationship Management

The Next Evolution of Identity and Access Management for the

Internet of Everything

IRM Summit Kantara WorkshopTime Topic Presenter12:00-12:15 Welcome

 Allan Foster

12:15-13:00 IRM Landscape, Trusted ID, ICAM, & FCCX

 

Joni Brennan

13:00-13:30 NSTIC / IDESG 

Ian Glazer

13:30-14:15 UMA for Enterprise 

Eve Maler

14:15-14:45 Break 

 

14:45-15:15 Experian agile IDProofing 

Kolin Whitley

15:15-15:45 Radiant Logic IRM ADAP, Contextual Identity

 

Michel Prompt

15:45-16:15 Open-Stand & Collaborative Communities – as core to bizdev

 

Karen McCabe

16:15-16:45 Calls to action & Thanks 

 Joni Brennan

IRM Summit

IRM Landscape Kantara Initiative Overview Trusted ID FICAM & FCCX

IRM Summit

IRM Landscape

The IRM Story

Evolution of Identity

Employees

Consumers

Employees &Partners

Things

PerimeterPerimeter Federation

Perimeter-lessFederation

Cloud / SaaS

Perimeter-lessFederation

CloudSaaS

Mobility

AttributesContext

Stateless

Relationships

Identity Relationship Management

Model for managing a company’s interactions with current and future customers and “things” using Identity and Access Management (IAM).

IRM rapidly and cost effectively unleashes new business opportunities that drive next generation consumer-facing services and top line revenue.

Pillars of Identity Relationship Management …

CONSUMERS & THINGS over employees

ADAPTABLE over predictable

REVENUE over operating expense

VELOCITY over process and tools

INTERNET SCALE over enterprise scale

DYNAMIC over static intelligence

BORDERLESS over perimeter

MODULAR over monolithic

BUSINESS PILLARS TECHNICAL PILLARS

=

=

=

=

CONSUMERS & THINGSover employees only

INTERNET SCALEover enterprise scale

ADAPTABLE over predictable

DYNAMIC INTELLIGENCE over static intelligence

TOP LINE REVENUE over operating expense

BORDERLESS over perimeter

VELOCITY over process and tools

MODULAR over monolithic

The Next Generation of Identity & Access

Management

What’s Next?

Tell us how you ‘do’ IRM!

Join the community

@

IRM Summit

Kantara Initiative Overview

Who is Kantara60+ Leading Organizations, 100’s of Participants, Industry and Governments:

Trust

Privacy

Security

CommunityTrustees At-Large:

•Government of Canada

•Trans-European ResearchEducation Networking Association

What We Do

The building blocks of Trusted Identity…

So that you can

• INFLUENCE• CONNECT• LEARN• PARTNER• SHARE• GROW

What we provide

• RULES• TOOLS• EXPERTS

IRM Summit

Trusted Identity

Trusted Identity NSTIC – National Strategy for Trusted Identities

in Cyberspace Trust is not the goal Identity is not the goal

Trust and Identity are tools to enable business and public services growth

Trustworthy Identities enable Trusted platforms where businesses connect and services grow.

Trusted Identity Kantara Programs verify

IdPs and Assessors Policy, Technology, Privacy

Reusable program applicable to FICAM, FCCX, NSTIC, EU eIDAS,

IDAP, + IdPs, RPs, FOs

Our part in the trust chain

IRM Summit

For FICAM and FCCX

FICAM & FCCX FICAM – Federal Identity Credential and Access

Management (Policy) Connects citizens to public services leveraging private sector

Credential Service Providers Kantara Operates Certification Program – Trust Framework

Provider

FCCX – Federal Cloud Credential eXchange (Implementation) The technical identity hub that operates FICAM Kantara Operates Certification Program – Trust Framework

Provider

Trust Framework Model

RegistrationRegistration

VerificationVerification

AssessmentAssessment

CertificationCertification

Trust Status Listing Service

Trust Status Listing Service

Interested Parties

Interested Parties

Kantara Trust RegistryKantara Trust Registry

Accredited and Approved

Verizon Universal Identity Service (VUIS)

IDPV Component Recognition

Norton Credential Service Provider

Registered ApplicantMITREid (LoA 1) organizations in

pipeline

Kantara Accredited to LoA 1-4 Kantara Approved to LoA 1-3 non-crpyto

Component Services

Responding to industry experts Kantara members developed the modular component service approach.

Component Services: •Identity Proofing / Verification •Credential Issuance and Management

Responding to industry experts Kantara members developed the modular component service approach.

Component Services: •Identity Proofing / Verification •Credential Issuance and Management

Identity Proofing & Verification

Organizational Trust

Credential & Token

Management

Credential Service Provider

MODULAR Assurance

CONTEXTUAL Assurance

ADAPTABLE Assurance

BORDERLESS Assurance

Questions?

•Kantara Executive Director: Joni Brennan [email protected]

•General Inquiries: [email protected]

JOIN INNOVATE TRUST

Shaping the Future of Digital Identity

@kantaranews kantarainitiative.org kantarainitiative.org/listinfo/community bit.ly/Kantara_Assurance kantarainitiative.org/membership/