Session at the European Identity & Cloud Conference 2013
May 16, 2013 17:00
KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Session at the European Identity & Cloud Conference 2013
May 16, 2013 17:00
Session at the European Identity & Cloud Conference 2013
May 16, 2013 17:00
Okay, well, maybe, maybe it's nice to, I liked what I saw. Thank you. Because this was great.
And, and mainly because the, the, I, I like the question of the, of the encryption and how it's, how to, to upgrade the, the whole process. And I think this, this has a lot to do with, with what, what I like to show you thinking about a trust framework, and I can imagine how to adapt those two things. So this is worth talking about, but may, maybe it's good to ask Greg, what you like me to show you, because I don't know who has been in the life platform.
I think you should go ahead and just do your video quickly and then give us, You mean the video with the French lady, or You can leave the French lady out. We don't need her already. Wait a moment to set, to set the scene. I will show you the video I showed yesterday, but then without a French lady is better. You're pretty sure No one would've believed in the first years of the 21st century that human affairs were being watched from the timeless worlds of the worldwide rabbi. No one could have dreamed.
People were being scrutinized as summon of the microscopes studies, creatures that SWM and multiply in a drop of water. This is your world for centuries. You have seen me as nothing but a target audience distracting me with your fancy bells and whistles. Today. You try to profile me feeding on my social media logins and other web trails, but actually all you do is look at little pieces of my life, scattered all around the worldwide web and with no place of my own, you must realize you're never going to know who I am. You're never going to find the things I really want.
Simply for one reason, I don't exist in the digital world. Do you really want to know who I am? Do you really want to know what I want? Let tell you. I want my data to flow freely to be controlled only by me. I want a place that knows all about me even more than you will ever need to know A place in a social network. That's truly mine and where my privacy is respected a place that connects me with the source of my data. So I can use, share, and do smart things with it, with a high level of assurance and trust for me, for my friends and for connected parties.
I don't mind sharing my desires and wishes with you. As long as we can have an equal and meaningful relationship, I'm ready to connect.
Are you, So now Marcel, give us a, as much as you want to about doors and distinguish between your framework and the application and what your objective is in promoting the framework versus having people buy your software as an application. Sure. Thanks. And thanks for this, this input, because what the framework thinking will do is, is reach what we call between quotes the social network 3.0 a social network where respect privacy is very important and even more important is the word respect than the word privacy, because privacy is as close as you can get.
But according to human values at first, it goes about respect. And what Greg's point in me at is, is actually the way that we explain what we do with, with this picture. This picture is, is the old world, the old paradigm where we are acting in and we are doing our things in.
We are, we are used to, to companies hundred year plus we are used to the internet protocol and we are used to web applications, websites, applications, and so forth. And we are used to the fact that here we perceive the data as, as information.
And, and for that reason, we act very analog in the digital world, because we are traveling with, with a lot of data from one site to another. When, when this, this, this bank application needs my data, I'm used to the fact that I log into my salary Porwal and I'm going to shop with my salary attributes to this website. And I enter it in again.
And, and it's a pity because all things which have to do with, with certified data are gone because I'm the, I'm the, I'm the traveler here. So it's, it's pity. And what we should need in, in this world is, is actually this scheme. And this is the scheme where a trust framework comes in, where I am a virtual point of services, where I can have access to my data. So I don't have to move around with data. It's just the access from one point. And what's very important to, to understand.
And that's where Greg is pointing at, is that what we are doing at, at key at the key foundation is we, we try to define the rules and regulations and, and we deliver a bunch of protocols to, to be able to build this and, and actually what we do. And I will move a bit in my presentation to give you some clues to make this more explicit. Is that what we do today actually is we are in this, in this picture where we, where we are here, busy doing, and what we also are doing to show you, what I will show you later is we take a few roles in an ecosystem.
And actually we do a lot what we don't want to do because the ecosystem has to do the work. Because when we talk about the next step, then this is the picture. And what we are doing here will be going to parties who can be compliant with a license from a foundation, which protecting the trust in the, in the whole framework. So this is actually the, the big picture. And that means that the, the rules in the model can be filled in by, by, by issuing parties, which can be all kind of parties. And by service providing parties, which can be all kind of parties.
We who can, who can be compliant with rules and regulations. And you can, you can think of companies like, like Microsoft or, well, I was talking with Daimler Bens or whatever, or you talk with credit com credit card companies because what they do today. And that's what I show you here is a credit company today is issuing a credit card. And I don't know if you, if it's a long time ago that you issued, or you, you created a credit card for yourself, but it's amazing. What kind of information a credit card company needs to give you this piece of plastic?
So what's happening here is that you say, okay, when this is a Dutch credit card company and they have the license of, of visa MasterCard. So when I create here a credit card in this, this case, we, we rebuild a little, the flow of creating a credit card to be able to work on validated attributes in a trust framework and what I show here. And that's, that's the, that's the, the explicit point Greg is making is just an example.
It's, it's not the work of the key foundation. The key foundation provides rules, regulations, protocols, to be able to make these things. And It it's a prototype that lets you show the value and the features of the framework. Correct. What you really want to have promoted is the framework. Yeah. Not the application. No.
So it's, it's unfortunate that the stuff you're gonna see next highlights the application so much and that's the way it should be. The framework is transparent. It's in the background doing all the work. And that's what key foundation is about, is giving, letting the work be done rather than the application. You're gonna see. Sure. So make sure you understand that's his, his Is important. I thank you for that because my, my background I'm, I'm an industrial graphic designer. So I see EV I see solutions in pictures.
So I want to have this user experience that users start to understand as, as easy as possible, what this means. So this is the reason that, well, we, we, we go into this flow and this flow is for, for a big part, a flow, the people asking for a credit card know, because we did do almost nothing on the flow, but it it's. The result is very different.
You will, you will see because I I'm going to ask for a credit card. And the first thing I have to do is fill in my email address. I get this mail and this is a part of the process to check if my email address is my email address and okay, I go on with my phone number and I get this code to It's almost Aaron ABAR. Sorry. Okay. You email address that they were using. Okay. Okay. So I get this code to be sure that this is my, my, my phone number. And then I get this form, which is the, the, the usual form.
We did not do anything about it, except that in this process, you see immediately, okay, those two are validated by this company. And this company has to validate everything because otherwise you can't pay. You can get your card. So when I fill in this form, they, they need a lot of information. You must see here, my income, my, everything, they need everything. So normally when I did all did do all this, all, all this information they need.
The only thing I got is a piece of plastic, and that's a pity because you can, and, and last step I have to do is I, I normally step five is asking for a, my ICS space. Well, this goes wrong at the first word, because the space is not yours. It's ICS. And here we create a personal, a personal place, a per a place in this network, in this trust framework here, it's, it's done. I gave myself a username and a password and I can look. And we use here the application doors to enter in, in my, in my page here, this is my profile. And you see here, this is validated.
And this delivers me a level one, European historic level one identity. This is, this is not so high, but with this identity, I can, for instance, use this service just as a nice poor man's choice service to remember my username and passwords. But the nice thing is that I, when I get here information on my personal domain, then I see that my credit card is on its way. And when I go to wallet, I see that my request is pending. And when I go back to my messages here, then I see, Hey, ICS has validated all my other attributes.
So when I go look again to my profile, I see that I have a level two identity because this company needed to validate it anyway. So why not give it back to me then I can use it? And why is this so, so nice to use it because when I go here again, so go Back, go back when Marcel for a second.
Oh, wait a moment. Oh, that was tough response. Sorry. Okay. So you see the username and password there. Yep. He had to enter that in because he was talking to a service that isn't integrated to say Azure active directory or some identity management as a service system. So he wasn't able to take his social credential and use that to generate his U his credentials that would allow him to log into this service.
He had to create a new name and password, and what we want to have happen to reduce the friction of this is either Marcel's framework uses the social network that Kim Kim's Azure active directory does. And then you go through that system or you have to go build your own. Yeah. Now the point that I would make is that I'm sure that getting using Marcel's framework, that you could make your choice about how you wanted to get that done.
Yeah, sure. So that you could remove the necessity for any service that you're, that you're logging into of creating a new, yet another name and password to get to that service.
I, so, so while, while this particular instance is doing another name and password, our objective is to get over that, to not have, to be able to be doing that. And I just wanted to point out that there's nothing in Marcel's framework that would prevent us from building an application that used your social credentials to skip that part. Sure. So this is, this is coming from zero, but when you are more than zero, you can go, go the way you want. Thanks. That's good. We like seven More minutes.
So Yeah, sure. Well, the, the nice part is, is actually this one I, I hop over to, to connect and that's actually when parties connect to the, to the framework directly like a shop, because then I can create an anonymous account with one click because my personal domain creates a episode of identity.
And then that that's nice because then I don't need a username and password any, I don't need it anyway, because, and the nice thing for the shop is that when I look to settings, I see here that I have this anonymous account, but when I share things I like to share, they are anonymous, but they are validated. So I am older than 18. So this is a very nice thing to know for a, for a shop when I want to share it. And when I share it, I, I share it when there is some benefit to share it.
And here, when I, when I want to have this newsletter that, so here we are, and that's pointed out again, it's not about, it's not about a graphics. It's about a systematic behind the, the, the framework is that this newsletter is a controlled pool. And where do I pull to? I pull to my own piece of message center as a, as a part of my personal domain.
So this, this retailer doesn't need to know my email address or whatever I can redirect if I want to my email address, but with the same Sodo identity I made, I made this, this, this, this link I can control what's coming back. So this is a, this is a certified way of, of getting whatever messages I like.
And, and another one is, is, is creating my own profile. I will show you later. And another way is creating my payment service. So creating your own profile is very nice because parties are going to help you creating your own profile. So you don't profile them. Know you profile yourself.
So like, like this supermarket, okay. Profile myself, biological food is very important for this lady. So what happens when I, I go to this website, I'm logged in anonymously. The first thing I see is if this retailer can subscribe to my personal profile, this is the other way around. So when I like to, to like them to do that, I can choose for that. And what you see is that because of my profile, this advertising, or this content is there, but I'm in control. So this is, this is totally about control and control. For instance, about payment.
With one click, I pay, I choose the wallet, I see the card I pay payment successful. And there we go. So this is just an example of what the framework is able to do and how the framework can add value to your digital life, because you have this place and you can share attributes and you can control where you are.
So, Right. And there's no reason you couldn't use this framework then to build the services, maybe coupled with something like Daytona or not. But now one thing you do, I want you to know is that Marcel's framework, doesn't generate APIs for you. No. Right? And they don't do API management that has to be added onto it.
So that, and it, it isn't a directory. It isn't a graph store.
You know, you have to add those other components into that framework and then use the, the standardized way that that framework works to then build out your life management platform. So there's, there's a lot of work to do there, but at least now we've separated out the pieces.
So, you know, this how this could be componentized components, ties and move forward. So we're running out of time. So I'm gonna go ahead and let Marcel finish up with whoever we wanna say, and then we're gonna go and go to the next keynote. Okay.
Well, if there are no questions the last few minutes, then, then, then there is a question. Okay.
So what, what can I look for? Sorry.
Where, where can I look for the protocol that you are using for this Yeah. Documentation for the framework? Yeah.
Well, well, today we work very close with parties together to, to be first movers. And so keep in touch and we provide you with information or we make appointments to be able to go on with the Email. Him is what He just said. That's what he said. Yeah.
Again, questions. Any questions? Thanks everybody for coming. And we'll see you downstairs at the, the keynote.