{"id":935,"date":"2008-03-06T18:37:44","date_gmt":"2008-03-07T02:37:44","guid":{"rendered":"\/?p=935"},"modified":"2008-03-06T18:38:59","modified_gmt":"2008-03-07T02:38:59","slug":"know-your-need","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=935","title":{"rendered":"Know your need"},"content":{"rendered":"<p>Here&#39;s a <a href=\"http:\/\/connectid.blogspot.com\/2008\/03\/need-to-know-know-your-need.html\">great comment <\/a>from the smart and\u00a0witty <a href=\"http:\/\/connectid.blogspot.com\/2008\/03\/need-to-know-know-your-need.html\">Paul Madsen<\/a>.\u00a0\u00a0 He really his the nail on\u00a0the head with his &#8220;Know your Need&#8221; corollory<\/p>\n<blockquote><p>In <a href=\"https:\/\/www.identityblog.com\/blog.php\/#post-934\" class=\"broken_link\"><font color=\"#666699\">announcing<\/font><\/a> Microsoft&#39;s purchase of the Credentica patents (and hiring of Stefan&#39;s core team), Kim uses the &#8216;need to know&#8217; analogy.<\/p>\n<blockquote><p><span style=\"font-style: italic\">That danger can be addressed by adopting a need-to-know approach to the Internet.<\/span><\/p><\/blockquote>\n<p>(For the life of me, I just cannot get Sgt Shultz&#39;s &#8216;I know nothing&#8217; out of my head.)<\/p>\n<p>Credentica&#39;s U-prove technology promises to close off a (depending on the deployment environment, potentially big) &#8216;knowledge leak&#8217; &#8211; if the IDP doesn&#39;t need to know what\/where\/why\/when\/who the user does with the assertions it creates, then the principle of minimal &#8216;need to know&#8217; means that it shouldn&#39;t.<\/p>\n<p>Cardspace seems a great application for U-Prove to prove itself. As Stefan <a href=\"http:\/\/idcorner.org\/\" class=\"broken_link\"><font color=\"#6699cc\">points<\/font><\/a> out, &#8216;its a good thing&#8217; to influence\/control both client and server.<\/p>\n<p>Separately, I see the flip side of &#8216;need to know&#8217; as &#8216;know your need&#8217;, i.e. entities involved in identity transactions must be able to assess and assert their needs for identity attributes. This is the CARML piece of the <a href=\"http:\/\/www.projectliberty.org\/liberty\/strategic_initiatives\/identity_governance\" class=\"broken_link\"><font color=\"#6699cc\">Identity Governance Framework<\/font><\/a>). Put another way, before a decision is made as to whether or not some entity &#8216;needs to know&#8217;, it&#39;d be nice to know why they are asking.<\/p><\/blockquote>\n<p>I agree that\u00a0it is sometimes a positive and useful thing for\u00a0a claims\u00a0provider\u00a0to know the user&#39;s &#8220;what, where, why, when and who&#8221;.\u00a0 So everything is a matter of minimization &#8211; but\u00a0within\u00a0to the requirements of the scenario.<\/p>\n<p>I don&#39;t actually buy the &#8220;influence\/control both client and server&#8221; phraseology.\u00a0 I&#39;m fine with influence, but see control as an elusive and worthless goal.\u00a0 That&#39;s not how the world works.\u00a0 It works through synergy and energy radiating from everywhere, and those of us who are on this odyssey must tap into that.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Credentica&#39;s U-prove technology promises to close off a potentially big &#8216;knowledge leak&#8217;&#8230;<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,17,47,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/935"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=935"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/935\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}