{"id":683,"date":"2007-02-17T14:19:36","date_gmt":"2007-02-17T22:19:36","guid":{"rendered":"\/?p=683"},"modified":"2007-02-17T14:25:15","modified_gmt":"2007-02-17T22:25:15","slug":"wouldnt-it-be-more-correct","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=683","title":{"rendered":"Wouldn&#39;t it be more correct?"},"content":{"rendered":"<p>I&#39;d like to share this interesting comment by Francis Shanahan, who works on identity from the vantage point of Citi:<\/p>\n<blockquote><p>&#8220;Your blog <a href=\"\/?p=678\">talks about<\/a> &#8220;Cardspace enabling Apache&#8221;. Regarding the language in the post, I know I&#39;m being picky here but&#8230;<\/p>\n<p>&#8220;Wouldn&#39;t it be more correct to say &#8220;XML Tokens as an additional authentication&#8230;&#8221; rather than &#8220;&#8230;Information Cards as an additional authentication mechanism&#8230;&#8221; since I can use Kerberos or SAML tokens with Cardspace over WS-Fed.<\/p>\n<p>&#8220;Wouldn&#39;t it be more correct to say &#8220;token enable&#8221; rather than &#8220;Cardspace enable&#8221;? I don&#39;t need to use the Cardspace selector with a WS-Trust enabled site.<\/p>\n<p>&#8220;Wouldn&#39;t it be more correct to say &#8220;The whole identity token processing can&#8230;&#8221; rather than &#8220;The whole cardspace processing can&#8230;&#8221; and so on.&nbsp; CardSpace is just the ID selector used to faciliate the token exchange.<\/p>\n<p>&#8220;Just don&#39;t want to confuse folks thinking there&#39;s a Cardspace specific token.&#8221;<\/p><\/blockquote>\n<p>First I&#39;ll say that technically speaking I think you make good points, and I&#39;ll try to be as careful as I can to bring out these ideas.<\/p>\n<p>Then, since pointing the finger at someone else is so fashionable, I&#39;ll say I was quoting what another company said it was doing.&nbsp; (That, in itself, is interesting.)<\/p>\n<p>But most important, I&#39;ll argue that the simplification of our current ideas into &#8220;iconic&#8221; notions is inevitable, and worthwhile, even though subtleties will be lost.&nbsp; So we have to achieve a balance between the irreconcilables of breadth and accuracy.<\/p>\n<p>I&#39;ll start with an analogy &#8211; the analogy to file and folder icons.&nbsp; Computer scientists know files are potentially complex mappings of streams of bits onto blocks of storage.&nbsp; They know folders are doubly linked lists of pointers to these streams of bits.&nbsp; But if they&#39;re smart, they keep all of this to themselves &#8211; even when they&#39;re with other computer scientists and the door is closed.&nbsp; If we told people about the inner workings of file systems, we&#39;d drive them crazy.&nbsp; In fact, they still wouldn&#39;t know how to manage documents or pictures or music.<\/p>\n<p>Instead, people have gotten used to little pictures of files, and drag them from one &#8220;folder&#8221; to another &#8211; or even &#8220;onto&#8221; their mp3 players.&nbsp; Our official help files say things like &#8220;Double click on the document to open it&#8221;.&nbsp; We conveniently overlook the fact that the document exists as magnetic fields on the hard disk and you can&#39;t double click them.<\/p>\n<p>There is a dualism between the science of the thing and the way we conceive of it in usage, just as there is in all aspects of reality.<\/p>\n<p>When we invent new technologies, we start from the science, and it&#39;s really hard to explain what one is doing.&nbsp; It takes months or even years to develop an &#8220;elevator pitch&#8221; &#8211; the ten second description of what you&#39;ve done that makes it seem worth doing.&nbsp; But that doesn&#39;t actually matter much, assuming you get funding.&nbsp; What matters is the way the idea eventually enters mainstream consciousness.<\/p>\n<p>It is inevitable that marketers will talk about products (CardSpace, Higgins, etc) rather than technology.<\/p>\n<p>While people will &#8220;get&#8221; that something is being transferred when you authenticate or authorize, I suspect they&#39;ll always see the visual image as being the identity itself, with few understanding it as &#8220;a means to manage the metadata enabling connectivity between identity providers and relying parties&#8221;.&nbsp;<\/p>\n<p>I think protocols like WS-Federation and WS-Trust will be more or less invisible except to backbone engineers.<\/p>\n<p>Once we get an Information Card icon out there and people start to use it, I think people will take it as meaning &#8220;Information Cards accepted here&#8221; &#8211; and that, in their minds, will be synonymous with CardSpace or whatever Information Card selector they run on their devices.&nbsp; They&#39;ll realize that some sites want some cards and other sites want others, but will never think about token types.<\/p>\n<p>So my reading is that Ping, which developed the Apache product being referred to, is already thinking about how to present a message that begins to deal with taking Information Cards to a wider audience.&nbsp; Not out of the technology ghetto yet, but to a wider audience within the very busy technology community.&nbsp; It would be interesting to hear what <a href=\"http:\/\/www.durand.com\/\">Andre Durand<\/a> has to say about this.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What will happen to the InfoCard &#8220;lexicon&#8221; as the technology begins to reach a wider audience?<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,15,4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/683"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=683"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/683\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}