{"id":176,"date":"2005-04-16T20:32:19","date_gmt":"2005-04-16T20:32:19","guid":{"rendered":"\/?p=176"},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T04:00:00","slug":"from-identity-to-identifiers-law-of-control","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=176","title":{"rendered":"From identity to identifiers &#8211; Law of Control"},"content":{"rendered":"<p dir=ltr>I am really fascinated by work <a href=\"http:\/\/www.equalsdrummond.name\/index.php?p=16\">Drummond Reed has started on his blog<\/a> in which he uses the laws of identity to structure a discussion on identifiers.  I look forward to seeing where this goes, since Drummond has thought incredibly deeply about identifiers (he is the technical chair of the OASIS Extensible Resource Identifier &#8211; XRI &#8211; Technical Committee; not to mention his work on XDI&#8230;).  I know from conversations with my friends at <a href=\"www.netapps.org\" class=\"broken_link\">NAC<\/a> (the Network Applications Consortium) that identifiers are becoming a super-hot pragmatic issue. <\/p>\n<p dir=ltr>Drummond explains what he&#39;s doing this way:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p dir=ltr>When Kim published his Fourth Law (the Law of Directed Identity), it was the first (and only) law that touched directly on <em>identifiers<\/em>. I knew his Laws had gained quite a following when I quickly received several email messages asking if <a href=\"http:\/\/en.wikipedia.org\/wiki\/XRI\"><font color=#667755>XRIs (Extensible Resource Identifiers)<\/font><\/a>, the new OASIS specifications for abstract identifiers, conformed to the 4th Law. <\/p>\n<p>In discussing this with other members of the <a href=\"http:\/\/www.oasis-open.org\/committees\/xri\"><font color=#667755>XRI TC<\/font><\/a>, as well as with Kim, we realized that each of his &#147;Laws of Identity&#148; has a &#147;Corollary For Identifiers&#8221;. In particular, these corollaries would apply to any <em>universal identifier metasystem<\/em> that aspired to be the addressing scheme for the &#147;mega momma backplane&#148; (as Kim, <a href=\"http:\/\/marc.blogs.it\/\"><font color=#334422>Marc Canter<\/font><\/a>, and <a href=\"http:\/\/craigburton.com\/\"><font color=#667755>Craig Burton<\/font><\/a> put it.)<\/p>\n<p>That, of course, is precisely the goal of the OASIS XRI effort dating back to 2003 (and previously to the <a href=\"http:\/\/www.xdi.org\/history.html\" class=\"broken_link\"><font color=#667755>XNS work dating back to 1999<\/font><\/a>.) Given that the XRI 2.0 specifications are currently in public review in advance of a full OASIS vote, now seems like a good time to follow Kim&#146;s lead and publish &#147;The Seven Corollaries of Identifiers&#8221;.<\/p>\n<\/blockquote>\n<p dir=ltr>The idea that <em>each of the laws<\/em> has its own &#8216;identifier corollary&#8217; makes perfect sense.  And I&#39;m struck by the way in which the laws provide a conceptual handle through which the issues of identification can be understood by an audience wider than those who wake up, have a coffee, and think about identifiers all day long.<\/p>\n<p dir=ltr>So let&#39;s look at the first corollory:<\/p>\n<blockquote dir=ltr style=\"MARGIN-RIGHT: 0px\">\n<p dir=ltr><strong><a href=\"https:\/\/www.identityblog.com\/2004\/11\/16.html\" class=\"broken_link\"><font color=#667755>1. The Law of Control<\/font><\/a><\/strong><\/p>\n<p><em>Technical identity systems MUST only reveal information identifying a user with the user&#146;s consent.<\/em><\/p>\n<p><strong>1a. The Corollary of Identifier Control.<\/strong><\/p>\n<p><em>The identifiers in a universal identifier metasystem MUST only reveal information identifying a user with the user&#146;s consent.<\/em><\/p>\n<p>Funny how intuitive it seems when you put it this way. A user&#146;s online identifier should not force the user to reveal any more information than they wish. And yet one of the online identifiers most frequently requested from users squarely violates this principle: an email address. Websites who require an email address to register &#150; and many have no choice because it is often the only easy, universal way to perform basic user authentication &#150; force individuals into revealing information that in many cases they would rather not.<\/p>\n<p>So half the Web breaks this corollary before we&#146;re even out of the starting gate. But it gets worse. Look at one of the current bulwarks of online identification: DNS. A standard requirement for most DNS name registries is accurate, current contact data for the registrant that is published <em>publicly<\/em> as &#147;Whois&#148; data. Although many registrars now offer proxy registration services to preserve registrant privacy and prevent spam, there&#146;s no escaping that a major component of our current Internet identifier infrastructure breaks the First Corollary squarely in two.<\/p>\n<p>So can XRIs fix this problem? Yes. The first principle of XRI architecture is that XRIs are abstract &#150; the association between an XRI and the real-world resource it represents is entirely under the control of its XRI authority (the person or organization registering the XRI, at any level of delegation). So nothing in an XRI need reveal anything about the authority&#146;s identity or messaging address.<\/p>\n<p>So how can the identifier be authenticated, i.e., what&#146;s the XRI equivalent of the simple email address verification test that websites use every day? <a href=\"http:\/\/wiki.xdi.org\/moin.cgi\/IssoSpecs\" class=\"broken_link\"><font color=#667755>The ISSO (I-Name Single Sign-On) protocol<\/font><\/a>, which combines XRI 2.0 resolution with SAML 2.0 authentication assertion exchange. It&#146;s easier, faster, and much more secure than email authentication &#150; and still does not require revealing any other information identifying the user.<\/p>\n<p>So that fixes the first problem. What about the second &#150; the DNS &#147;Whois&#148; problem? What registrant data is required when registering an XRI? Here I can only speak for the XRI global registry services to be offered by <a href=\"http:\/\/www.xdi.org\/\" class=\"broken_link\"><font color=#667755>XDI.ORG<\/font><\/a>. Based on its <a href=\"http:\/\/gss.xdi.org\/\" class=\"broken_link\"><font color=#667755>Global Services Specifications (GSS)<\/font><\/a> that have been in public review since December, the answer is: none. Following XDI.ORG&#146;s <a href=\"http:\/\/gss.xdi.org\/moin.cgi\/GssPolicies_2fDataProtectionPolicies#head-2c49161759a6befa7caf257331370ad8f8a98f3d\" class=\"broken_link\"><font color=#667755>Minimum Information Policy<\/font><\/a>, a cornerstone of its <a href=\"http:\/\/gss.xdi.org\/moin.cgi\/GssPolicies_2fDataProtectionPolicies\" class=\"broken_link\"><font color=#667755>Data Protection Policies<\/font><\/a>, the XDI.ORG global registries will store only registered XRIs, resolution values, and authentication credentials. There is no public (or private) &#147;Whois&#148; service. (There is a <a href=\"http:\/\/gss.xdi.org\/moin.cgi\/GssPolicies_2fPublicTrusteePolicies\" class=\"broken_link\"><font color=#667755>Public Trustee Service<\/font><\/a> that provides an alternate means of authenticating a registrant to XDI.ORG if they lose their registration credential, but that data is entirely private.)<\/p>\n<p>So what provides accountability for global registrations? <a href=\"http:\/\/gss.xdi.org\/moin.cgi\/GssPolicies_2fDisputeResolutionPolicies#head-224eb6c7ce85dbc1689d50df889d30545f300a1e\" class=\"broken_link\"><font color=#667755>Dispute Notification Service.<\/font><\/a> Every global XRI registrar is required to provide a means of forwarding authenticated dispute notifications to a registrant. This accomplishes the same goal as DNS Whois service but without revealing registrant identifying data or exposing registrants to spam.<\/p>\n<\/blockquote>\n<p dir=ltr>This really helps me understand what XRI is all about.  And we&#39;re just at law 1.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I am really fascinated by work Drummond Reed has started on his blog in which he uses the laws of identity to structure a discussion on identifiers. I look forward to seeing where this goes, since Drummond has thought incredibly deeply about identifiers (he is the technical chair of the OASIS Extensible Resource Identifier &#8211; &hellip; <a href=\"https:\/\/www.identityblog.com\/?p=176\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">From identity to identifiers &#8211; Law of Control<\/span><\/a><\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/176"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=176"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/176\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}