WEF A Blueprint For Digital Identity
WEF A Blueprint For Digital Identity
An Industry Project of the Financial Services Community | Prepared in collaboration with Deloitte
Consistent with the World Economic Forums mission of applying a multistakeholder approach to address issues of global impact,
creating this report involved extensive outreach and dialogue with the Financial Services Community, Innovation Community, Technology
Community, academia and the public sector. The dialogue included numerous interviews and interactive sessions to discuss the insights
and opportunities for collaborative action.
Sincere thanks to the industry and subject matter experts who contributed unique insights to this report. In particular, the members of
this Financial Services Community projects Steering Committee and Working Group, who are introduced in the Acknowledgements
section, played an invaluable role as experts and patient mentors.
We are also very grateful to Deloitte Consulting LLP in the US, an entity within the Deloitte1 network, for its generous commitment and
support in its capacity as the official professional services adviser to the World Economic Forum for this project.
Contact
For feedback or questions:
R. Jesse McWaters
[email protected]
+1 (212) 703 6633
1Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee (DTTL), its network of member firms, and their
related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global) does not provide
services to clients. Please see www.deloitte.com/about for a more detailed description of DTTL and its member firms. Please see www.deloitte.com/us/about for a
detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations
of public accounting.
This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax,
or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision
or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional
advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication.
The following senior leaders from global FIs provided guidance, oversight and thought leadership to the Future of Financial Services
series as its Steering Committee:
The project team would also like to acknowledge the following executives of global FIs who helped define the project framework and
shape strategic analyses as its Working Group:
Global Head, Strategy and Business Vice-President, Corporate Strategy, Partner, Global Co-Head of Financial Services,
Development, Financial, Thomson Reuters Visa CVC Capital Partners
In addition, the project team expresses its gratitude to the following subject matter experts who contributed their valuable perspectives
through interviews and workshops (in alphabetical order):
In addition, the project team expresses its gratitude to the following subject matter experts who contributed their valuable perspectives
through interviews and workshops (in alphabetical order):
Project Team
The A Blueprint for Digital Identity: The Role of Financial Institutions in Building Digital Identity project team includes the following
individuals:
WORLD ECONOMIC FORUM PROJECT TEAM PROFESSIONAL SERVICES SUPPORT FROM DELOITTE
Giancarlo Bruno Rob Galaski
Senior Director, Head of Financial Services Industries Project Advisor, Deloitte
Jesse McWaters Christine Robson
Project Lead, Disruptive Innovation in Financial Services Lead Author, Deloitte
Additional Thanks
The project team expresses its gratitude to the following individuals for their contribution and support throughout the project (in
alphabetical order):
Faiza Harji
Alex Rinaldi
Sabrina Sdao
And to:
The Deloitte Greenhouse (Event Facilitation & Location Services)
Level 39 (Location Services)
The Value Web (Event Facilitation)
2015 2016
PROJECT CONTEXT
Identity is a critical topic in Financial Services today. Current identity systems are limiting Fintech innovation and well as secure and
efficient service delivery in Financial Services and society more broadly. Digital identity is widely recognized as the next step in identity
systems. However, while many efforts are underway to solve parts of the identity challenge and create true digital identity, there is a
need for a concerted and coordinated effort to build a truly transformational digital identity system.
This document is intended as a guide for Chief Strategy Officers of Financial Institutions as well as policy makers who are interested in
the topic of identity and want to understand the digital identity and their own potential role in the creation of robust digital identity
systems.
PROJECT SCOPE
The mandate of this project was to explore identity and its importance in Fintech, Financial Services and in developed societies broadly,
the topic of digital identity, and provide a landscape scan of current efforts to build digital identity solutions.
This report will discuss different structures for identity systems and discuss which configurations are best suited to solve different
problems, and provide a perspective on the role of Financial Institutions in building digital identity systems.
This report will not focus on the creation of standards around identity; much valuable work has already been done in this space and
current developments such as the publication of the European Union eIDAS Regulation are moving the conversation on this front. Nor
will it discuss technology solutions. Rather, it will attempt to provide clarity and direction around the structure of identity and provide a
call to action for Financial Institutions to move against the identity challenge.
Global Workshops
Four multi-stakeholder workshops at global financial hubs with 200+ total participants
including industry leaders, innovators, subject matter experts, and regulators
PROJECT OUTCOMES
Introduction
1
What is the global identity challenge, and what problems does it pose for Financial Institutions?
Implementation
6
How do you reach a global digital identity solution?
Lack of digital identity limits the development and delivery of efficient, secure, digital-based Fintech offerings
Identity is currently a critical pain point for Fintech innovators. Many of these innovators are trying to deliver pure digital offerings, but
the process of identifying users consistently forces them to use physical channels. These Fintech innovators now see the development of
a new generation of digital identity systems as being crucial to continuing innovation and delivering efficient, secure, digital-based
Fintech offerings.
Examples
Payments Loans
Payments require validation of ACH information, meaning that Evaluating customer risk and issuing loans requires validation of
digital payments innovators must either require users to provide basic customer information, requiring innovators to gather
identity information through pseudo-digital channels (such as by information from users, again through pseudo-digital channels
photographing their drivers license) or act as platforms on top such as photographing existing ID or gathering trusted
of established Financial Institutions and rely on their KYC information from an existing source, and therefore
processes decentralizing a central piece of the product offering
Digital identity would allow FIs to perform critical activities with increased accuracy over that afforded by physical identity, and to
streamline and partially or fully automate many processes
Identity is also central to the broader financial services industry, enabling delivery of basic financial products ands services. Reliance on
physical identity protocols introduces inefficiency and error to these processes. Digital identity has great potential to improve core
financial services processes and open up new opportunities.
Examples
Identity enables many societal transactions, making strong identity systems critical to the function of society as a whole
Physical identity systems currently put users at risk due to overexposure of information and the high risk of information loss or theft;
they also put society at risk due to the potential for identity theft, allowing illicit actors to access public and private services. Digital
identity would streamline and re-risk completion of these public and private transactions.
Entities are required to prove their identities or certain Entities are often required to prove their identities or certain
attributes to demonstrate their eligibility for public services attributes to participate in private transactions
Examples Examples
Access to social assistance (e.g., old age security, Many basic merchant transactions (e.g., buying alcohol)
unemployment insurance) Large private provider transactions (e.g., renting an
Access to education apartment, buying a car)
Access to healthcare
Access to civic structures (e.g., voting)
Five key trends are increasingly the need for efficient and effective identity systems:
Each layer of identity of serves a different purpose, and suffers from a distinct set of problems in todays identity landscape
GOALS PROBLEMS
Developing
Lack of coordination
standards to govern Standards and consistency
system operation
There are currently many distinct gaps in the digital identity landscape
While many ongoing efforts, such as new authentication solutions, are critical to building digital identity, Service Delivery
there is a core need for a strong system will enable effective action against each layer of the stack Authorization
Attribute Exchange
The entire stack does not need to be provided by a single entity some components may be modular Authentication
but the entire stack must be effective and integrated to provide digital identity systems that have Attribute Collection
certain critical features Standards
Operationally effective
1 The system allows digital transactions to be completed conveniently and effectively
Security
3 The system prevents user information from being overexposed, lost or stolen
Viability
5 The system delivers value to all stakeholders, creating broad support and uptake and making it a commercially viable system
Financial institutions are exceptionally well positioned to drive identity systems that fill the gaps left by current efforts
STRUCTURAL
FIs already act as stores of customer attributes for their own commercial purposes, and therefore are positioned to act as identity
1 providers without extensive incremental effort
FIs are one of very few types of institutions that can verify user information; they already perform this function for commercial
2 and regulatory purposes
3 FIs are incentivized to collect accurate user information for their own commercial purposes
FIs have proven executional ability to develop new systems and standards (e.g., Interac) that have been widely adopted and
4 effectively used within the private sector
5 The FS industry has near-complete coverage of users (people, legal entities, and assets) in developed economies
Global FIs have interconnected operations across multiple jurisdictions, giving them a structural advantage in enabling cross-
6 jurisdictional identity transactions and systems
POSITIONING
2 FIs act as established intermediaries in many transactions and are therefore well positioned to act as identity intermediaries
3 FIs are typically trusted by consumers beyond other institutions to be safe repositories of information and assets
FIs could derive substantial benefit from investing in the development of digital identity solutions. We have categorized these benefits
into three categories: efficiency / cost avoidance, new revenue opportunities & brand enhancement, and transformational future state
opportunities
Identity-as-a-service
Offer identity as a service to relying parties who cannot or do not wish to store customer information
Identity-only customers
Offer identity as a separate, fee-based service for individuals who do not otherwise transact with that FI
Allocation of liability
Shift the liability for incorrect information, and the outcomes of holding this information, from Financial Institutions to
other entities in the network (e.g., users through approval and consent requirements)
Trust brokerage
Act as a broker of trust in previously trustless interactions between disparate parties in multiple industries, expanding
the reach of FIs beyond the FS industry and reaching new profit pools
FIs should champion efforts to build digital identity systems, driving the building and implementation of identity platforms through the
creation of minimum viable digital identity systems
Technology platform
A technology platform that enables secure attribute exchange between identity providers and relying parties with a convenient
4 user consent mechanism (e.g., operates on mobile and desktop)
System standards
Supervisory & liability standards that guide operation and use of user information in the system and provide liability and user
5 recourse
There are different configuration options for the development of digital identity systems, each with advantages and drawbacks
Global institutions could create internal Consortiums of financial institutions Financial Institutions could create
systems that stretch across the could form networks that cover large, industry utilities to deliver identity
jurisdictions in which they operate contained oligopoly economies (such as services across the industry
Canada or Australia)
This would enable quick implementation This model is effective in creating
but a single institution would likely have A consortium requires a high degree of standardization and broad coverage, but
difficulty in gaining a critical mass of collaboration among parties but is an implementation may be difficult due to
users, limiting its ability to drive system effective method of getting complete the involvement of many different
adoption and integration of relying coverage over a user group stakeholders
parties
Consortiums are well suited to provide Utilities are a good model for legal entity
identity for individuals as data storage is and asset identity because they provide a
not centralized, increasing privacy and standardized view and golden record of
system resilience information
Implementation of identity systems is extremely sensitive and therefore easy to get wrong; situational, operational and cultural factors
all have important implications for identity systems, and implementation or operational failure has extremely negative consequences for
both the drivers of identity system (e.g., wasted resources) and for users (e.g., data breaches).
We have studied the landscape of identity providers to understand what efforts are ongoing and which system models are best suited to
different situations and to provide recommendations on system configuration and implementation.
1. INTRODUCTION
Introduces the global identity challenge
and how problems with identity manifest
for Financial Institutions
Identity is foundational to many of the transactions that occur in todays society. In any exchange with requirements about the
transacting parties they must be a certain age or reside in a certain jurisdiction structures must be in place that allow entities to
determine certain information about their counterparty, and to have confidence that the information is true.
Reliance on legacy identity systems that do not effectively enable the transactions that people and entities wish to engage in create
challenges for a wide set of stakeholders.
Identity is critical to FIs; their businesses are entirely transaction-based, involving transactions with a high degree of risk and require a
high degree of certainty in completion. Global problems with identity therefore manifest as specific business problems for FIs.
Inefficient, costly and ineffective know-your-customer (KYC) and due diligence processes
Difficulty aggregating information on legal entities and determining total risk exposure
Difficulty identifying all transaction counterparties (e.g. third parties in trading relationships)
Difficulty complying with regulatory standards around data handling and privacy
Todays standard identity systems are based on physical documents and processes, which creates many limitations.
Physical identity was designed to The digital economy is Digital identity enables transactions
enable face-to-face transactions changing the way that in the digital world and offers
among entities identity transactions occur improved functionality for its users
WORLD ECONOMIC FORUM | 2016 35
Digital identity systems support the needs of todays world
Digital identity systems emerged as a direct response to the requirements of transactions in the digital world.
BENEFITS
Digital identity would deliver a range of benefits to people, businesses and society.
Privacy and control Revenue growth Improved compliance Improved service delivery
People would be able to control Financial Institutions would have Regulators would have increased Governments could more easily
access to their information opportunities to offer Identity-as- access to trusted, up-to-date and effectively deliver public
a-service information services
These technologies may hold considerable promise for identity, and are being explored by many different players.
Data storage
New technologies may offer improved methods of storing user information and increasing user control, privacy and security
Distributed Ledger Technology combined with encryption and cloud storage allows information to be held and transferred
point-to-point in a dispersed, immutable network
Federated identity standards, such as SAML 2.0, create interoperability between identity management networks and external
applications, allowing federated identity systems to scale to large numbers of identity providers and relying parties
Data transfer
Improved attribute exchange protocols allow information to be securely shared between endpoints without risk of interception or
decryption, and with more controls that create privacy for users
Improved encryption protocols, such as Keyless Signature Infrastructure on the blockchain and hashing, provide strong
protection for sensitive information and increase the reliability of digital activities
Data transfer protocols, such as Attributed Based Credentials 4 Trust and zero-knowledge proofs, prevent the creation of
metadata by concealing transaction endpoints, increasing user privacy
Authentication
Many new techniques for authenticating users are being explored for their potential to increase information security and user
control in certain circumstances by linking users to their digital activities in more robust and persistent ways
Behavioural and contextual authentication incorporate human and environmental factors to authenticate a user or device
Biometrics, including fingerprint, retina scanning, heartbeat waveform and facial recognition based on mobile devices have
potential to provide greater convenience and security and are being integrated into many anti-fraud controls
WORLD ECONOMIC FORUM | 2016 37
Digital identity systems have great potential but also many pitfalls in implementation
Many new identity systems are under development around the world in response to the need for digital identity and new technology
capabilities. However, not all have been successful, illustrating some of the pitfalls inherent in the construction of identity systems.
39
Why is identity important?
Identity is not a monolith; it is a collection of individual attributes that describe an entity and determine the transactions in which that
entity can participate. While the total existing set of attributes is endless, they can be broadly categorized into three groups: inherent,
inherited and assigned attributes. These attributes differ for members of three main user groups: individuals, legal entities and assets.
Identity is the total set of an entitys attributes. These attributes enable entities to participate in transactions, by proving to their
counterparty that they have the specific attributes required for that transaction.
To purchase alcohol, users must prove To onboard with a FI, the entity must Asset trading, such as trading of equities
that they are over the legal drinking age have proof that it is a legal and non- on a stock exchange, requires proof of
in that jurisdiction sanctioned entity ownership and origination
To vote, users must prove that they are To transact in capital markets, the entity Transfer of title of an asset requires proof
over the legal voting age, have must have proof that it is a legal and of ownership from the entity that is
citizenship and reside in that jurisdiction non-sanctioned entity with an acceptable transferring the asset
risk profile
Note: Assets have identity, but are unable to act or transact on their own. Assets require custodians who are entitled to act or transact on
the asset's behalf.
WORLD ECONOMIC FORUM | 2016 42
Identity transactions have three main aspects
What must be true about the users to Can users prove that they are eligible to Do the attributes being presented
complete the desired transaction? complete this transaction? genuinely belong to the entity that is
presenting them?
Authorization is a function of the Users must present their proof of
transaction and the transaction attributes in response to the query. Once The counterparty will determine whether
counterparty; they will determine the users present the required attributes, the the attributes match the presenting
requirements for transaction eligibility, counterparty must determine if they are users. If the users are able to
and make a query about certain user reliable. authenticate the attributes, the
attributes (e.g. age, address). transaction can proceed.
This model of identity transaction applies to onboarding transactions, that is, transactions where the counterparties do not have an
established relationship or where the counterparty is required to gather identity information with every transaction.
Some identity relationships may have a single onboarding transaction; after initially onboarding the users and verifying them through a
full identity transaction, the counterparty may use an authentication method (e.g. username and password, chip-and-PIN card) for each
subsequent transaction. This allows them to verify that the same entity is transacting each time without going through the full identity
transaction process.
Note: Not all transactions require exact knowledge of attributes. Many transactions simply require attribute data to fall inside certain
parameters (e.g. instead of knowing an individuals birthdate, a transaction may only require that the user be over a certain age); this is
critical in constructing privacy-enhancing identity systems.
The level of assurance (LoA) in an identity transaction is the degree of certainty that the transacting parties have in the veracity of the
identity being presented.
ASSURANCE IN TRANSACTIONS
A high LoA in identity transactions is not always desirable, as a high LoA requires intensive onboarding and strong authentication
processes that may be cumbersome for the user. The LoA required in an identity transaction should therefore generally be dependent on
risk the risk level of the transaction and the consequences of error.
Transactions that do not involve a release of information and Transactions that involve the release of sensitive and private
only involve an information flow from the user to the relying information, or the transfer of money or assets, are high-
party are low-assurance transactions assurance transactions
Examples include online registrations (e.g. signing up for a Examples include banking and other financial transactions, such
news site) and some payments (e.g. paying a parking ticket as using an online brokerage account, and many government
online) services
Identity exists within networks that enable transactions between the entities inside that network. These networks tend to evolve
around user groups with similar needs and characteristics. These boundaries form what are called natural identity networks. Every
natural identity network has different needs and therefore will require different system configurations.
The networks that form inside the The networks that form inside the The networks that form inside the
natural boundaries of identity systems natural boundaries of identity systems natural boundaries of identity systems
for individuals are based on for legal entities are based on national for assets are based on their asset
geographic location or affiliations affiliation, industry or geographic class, origination or ownership
with a supervisory entity reach Examples include registries of assets of
Examples include national identity Examples include national or global a single class, or registries of assets
systems, state or provincial identity business registries and industry that are all owned by a single entity
systems, and employee management identifier systems
systems
The purpose of a formal identity system is to allow counterparties without a previously established relationship to engage in trusted
transactions.
In a formal identity system, the users attributes are attested to by trusted third parties; these third parties issue credentials that tie
their attestation to the specific attributes, with some method of authenticating the credential to the entity that is presenting it
Users can use their wallet of credentials to engage in transactions with other entities that require some proof or knowledge of their
attributes
1 The user presents a set of attributes 2 The third party verifies the attributes 3 The user then uses the credential
to a third party and attaches its attestation to the from the identity provider in
attributes, becoming an identity transactions with relying parties
provider for the user
Lorem ipsum
Lorem ipsum
Lorem ipsum
Lorem ipsum
Lorem ipsum
Lorem ipsum
Every identity system must have four roles and one function to operate.
Role
WORLD ECONOMIC FORUM | 2016 Function 47
Methods have evolved, but the concept of identity proofing has not changed over time
The fundamental concept, purpose and structure of identity systems have not changed over time, while methods and technology have
made huge strides forward.
Past Present
A letter of introduction is one of the oldest forms of identity Today a passport issued by an individuals country of residence or
documentation. origin is one of the most common, trusted identity documents.
User: Individuals would use a letter of introduction as an User: Individuals are often asked to present their passport to
attestation of identity and character to someone they did not complete transactions that require proof of identity (e.g.
know entering new countries, opening a bank account, etc.)
IdP: The letter writers would provide attestations for various IdP: The government of that country acts as an IdP, making
attributes of the users (e.g. that the user was a person of good certain attestations about the user
character) RP: The attestations made by the IdP are accepted by a RP
RP: The recipients of the letter would choose whether or not based on its trust in the document, its issuer and its evaluation
to accept the attestations based on their knowledge of the IdP of whether the bearer is the true owner of the passport
and their evaluation of the letters veracity
A digital identity system has the same basic structure as a physical identity system, but attribute storage and exchange are entirely
digital, removing reliance on physical documents and manual processes.
Beyond offering new functionality, digital identity has significant functional benefits over physical-based identity systems.
Security
Physical identity documents can easily be lost, stolen or replicated by illicit actors, as well as read by entities with no
legitimate reason to have the user information
Digital identity information could be stored, transferred and exposed using cutting-edge digital security protocols that
would prevent against data breach, modification, loss and theft
User experience
Physical identity requires users to manually show documents or enter identity information in transactions, resulting in a
cumbersome user experience and creating potential for human error in transactions
Digital information transfer would streamline the transaction process for users and RPs across all channels, increasing the
ease of transacting for both parties and removing the potential for human error
Flexibility
Physical identity results in the crystallization of user identity in physical documents, and a fixed view of identity that cannot
be expanded to cover additional user attributes
Digital identity would provide a flexible and scalable system that could incorporate a greater richness of identity
information than is currently possible
The digital identity systems that exist today fall across broad ranges of purpose, scope and sophistication. Some systems have a digital
element bolted onto what is still fundamentally a physical identity system, while others are fully digital and are built to scale and expand
as user needs evolve.
Disparate identity systems were studied, including systems for all user groups, to understand the landscape of digital identity solutions,
categorize these systems and draw high-level conclusions on which systems best suit different needs.
Primary dimensions of choice are the set of choices that must be made in the design of a digital identity system that have the greatest
impact on the systems function and structure.
These are not always conscious choices; they are often a natural outcome of the setting in which the system is being implemented, and
the problem that the system is intended to solve or the needs that it is intended to serve. The three primary dimensions of choice are:
One entity acts as both Many IdPs authenticate One IdP serves many RPs A set number of IdPs Many IdPs serve many
the IdP and RP users to a single RP authenticate users to different RPs
many RPs
The system provides The system The system has a The system has a The system involves
users within a single authenticates users to single IdP that single IdP that stores multiple IdPs that
network access to the RP based on their authenticates users user information, authenticate users and
services that they are authentication to one and transfers or while a separate set of transfer attributes to
Flow of information
permissioned to access of a set of IdPs exposes attributes to IdPs authenticate many different RPs
based on their many different RPs users who are
No attributes are
attributes attempting to transact
transferred between
with RPs
All user attributes are the IdPs and the RP;
held inside the single the authentication After authentication,
entity and are used to transaction is used to the requested
permission users to simply grant or deny attributes are
either grant or deny the user access to the transferred from the
access to a given services offered by the IdP that holds
service or pathway RP attributes to the RP
with which the user is
transacting
EXTERNAL AUTHENTICATION
CENTRALIZED IDENTITY
FEDERATED AUTHENTICATION
A set of third-party IdPs act as brokers that authenticate users to the RPs
Sweden BankID
with which they are attempting to transact
Public-private service, Sweden
RPs are able to access user attributes from the primary IdP, often for a fee; Sweden has established an eID system that provides
many systems also require explicit user consent for attributes to be citizens and businesses access to over 300 public and
transferred private services. Digital identities are issued by a set of
In systems that allow for the discretionary transfer of attributes rather than private entities, including large banks and a major
telecommunications provider. The public sector buys
a fixed set of attributes, the user must explicitly consent to the transfer of
identity validation services from the private sector.
specified attributes from the primary IdP to the RP Private sector service providers can join the BankID
These systems are often government-driven, and the government acts as system by signing contracts with eID providers for
the central IdP that holds citizen or entity data authentication. The solution has been very successful;
over 9 million citizens currently use the service.
WORLD ECONOMIC FORUM | 2016 58
Distributed identity systems connect many IdPs and RPs
DISTRIBUTED IDENTITY
Blockchain, or distributed ledger technology (DLT), is a technology protocol that allows data to be shared directly between entities in a
network, without intermediaries. DLT has certain key features that hold potential for identity systems:
Many initiatives are currently underway that explore the true potential for DLT in identity systems; this report will not explore this topic
in detail.
Best suited to: streamline user access to a suite of services that are offered by a single entity and eliminate proprietary
logins
Example: A government offering its citizens online services that are critical but infrequently used
Centralized identity
Best suited to: provide a single version of the truth and a complete, accurate and standardized view of non-confidential
data across different users
Example: An industry utility offering a comprehensive view of the entities in that industry to manage risk and exposure
Federated authentication
Best suited to: provide a single version of the truth and a complete, accurate and standardized view of data while allowing
users to authenticate to a set of third parties, thereby eliminating proprietary logins
Example: A government enabling identity transactions for its citizens through collaboration with third parties
Distributed identity
Best suited to: incorporate large numbers of IdPs and RPs, providing user convenience, control and privacy in an online
environment
Example: A full digital economy requiring multiple independent connections between IdPs and RPs to enable user
transactions
WORLD ECONOMIC FORUM | 2016 62
Two of these archetypes are well suited to solve broad identity problems
Centralized and distributed identity systems are best suited to provide digital identity at scale; however, these two archetypes are not
equally well suited to provide identity for different user groups.
The need:
Trusted, up-to-date individual identity information
Ability to access additional user attributes with consent
Ability to internally link identity information to provide a single view of
Distributed identity for individuals would allow FIs
the customer
to access trusted user information and link it back to
Secure repositories for user information to prevent identity theft due to a single user identity; it would also ensure that user
stolen data information would be securely stored with
redundancy in the case of breach.
The need:
Trusted, up-to-date user identity information
Visibility into asset and user identity information
Ability to link asset, entity identity and individual information
Centralized identity and distributed identity with
Ability to aggregate identity information across entities
an aggregation layer for legal entities and assets
would allow FIs to have a consolidated, trusted
source of digital attributes for these users.
Configuring an identity system requires choices to be made against a secondary set of dimensions that do not have the key functional
and structural importance of the primary dimensions, but have strong impact on how the system will operate. The choices made against
the secondary dimensions should therefore be tailored to suit the specific needs and requirements of the natural identity network.
Note: This is not an exhaustive list of choices; many further choices must be made
It is impossible to provide an exhaustive list of the secondary dimensions of choice in the configuration and implementation of an
identity system, or to give recommendations against each. A set of guiding principles has therefore been developed to steer secondary
decision-making and to assist in delivering a robust identity system that suits the needs of its stakeholders.
A successful natural identity network is a product of the choices made against the secondary dimensions. Five principles inform decision-
making around these choices and guide the development of robust, value-accretive systems.
Social good
The system is designed as a social good that is available to all users and will deliver maximum benefit to a range of stakeholders
Privacy-enhancing
User information is only exposed to the right entities under the right circumstances
User-centric
Users have control over their information and can determine who holds and accesses it
SOCIAL GOOD
PRIVACY-ENHANCING
USER-CENTRIC
Building a successful identity network is difficult. A series of choices need to be made to ensure the system delivers value to all
stakeholders and gains traction and acceptance.
The highest-level considerations in the development of an identity system are the user group and the need that the system will serve,
and the archetype structure that should therefore be considered.
Once these considerations have been settled, the secondary dimensions of choice should be considered against the guiding principles
of digital identity.
1 2 3
Problems and user groups Primary dimensions of choice Secondary dimensions of choice
The highest consideration is the user The user group and target problem will The guiding principles for identity and
group and the problem that the identity guide the selection of an appropriate their implications will help determine
system is designed to solve; this will identity archetype what structural and configuration
determine the limits of the natural choices should be made against the
identity network secondary dimensions of choice
When configuring identity systems, stakeholders will have a set of decisions to make at each stage of the process.
Identity systems that are constructed based on this guidance will deliver benefits both to the stakeholders involved directly in the
identity network and to external stakeholders. FIs, specifically, would accrue deep benefit as a result of the implementation of digital
identity.
STAKEHOLDER GROUPS
1 2 3
Spotlight on:
Financial institutions
B A
B
IDENTITY
PROVIDERS GOVERNMENT
A
C
REGULATORS
USERS
RELYING
PARTIES
Network stakeholders are parties who are involved in the core operation of the network itself. The network stakeholders are users, IdPs
and RPs.
A
Privacy and control Security Convenience Transparency
Users are able to control User attributes are held Digital attribute transfer Users have visibility into
USERS who has access to their in safe and secure allows users to transact how and when their
attributes locations in an efficient manner attributes are exposed
B
Revenue growth Decreased risk and Competitive positioning Improved products
IdPs can charge fees for liability IdPs can forge a strong and services
processing identity IdPs understand their relationship with users IdPs can use detailed
IDENTITY and position themselves and trusted customer
transactions liability in the event of
PROVIDERS as a critical part of the information to deliver
data loss or breach
digital economy tailored services
C
Information accuracy Decreased transaction Service tailoring Decreased risk and Service provision
RPs have access to abandonment RPs can provide more liability RPs can differentiate
RELYING trusted, verified identity A streamlined user tailored products and RPs understand their between illicit and
PARTIES information experience removes services liability in the event of legitimate users
barriers to completing data loss or breach
WORLD ECONOMIC FORUM | 2016
transactions 77
What benefits would accrue to users?
USERS
2. Security
User attributes would only be held by entities meeting system standards and requirements for information handling
and storage
Security Digital attribute storage would make identity information resistant to damage, destruction or loss
Users would have the ability to disperse their identity information, creating contingency if an IdP suffered a data
breach or data were erased or stolen, and reducing the impact of a data breach on the user
3. Convenience
Digital identity and digital attribute transfer would simplify and improve the user experience in transactions,
eliminating the need for users to track multiple authentication methods (e.g. usernames and passwords) and manually
submit personal information during transactions
Convenience Attributes would be transferred digitally, removing the potential for human error and subsequent information
remediation
Users would be able to easily update information held with their IdPs and would not have to deal with transactions
being executed based on inaccurate or out-of-date information
4. Transparency
Transparency
Users would have visibility into which attributes would be exposed and to what entity during identity transactions
Estonias e-government system protects citizen information, provides an extremely convenient experience for users and allows them
to feel ownership over their data.
E-Government
Government solution, Estonia
The Government of Estonia has created a digital interface between citizens and government agencies. The government holds citizen
information in a centralized Population Registry and acts as the IdP and governing body, transferring reliable and trusted data to RPs.
Citizens are each assigned an eID identifier that they can use to log on to the State Portal, which provides access to dozens of
services, from voting, to updating automobile registries, to applying to universities. The government transfers the attribute
information needed to complete each transaction from the Population Registry to the RP, and citizens are able to see what entities
have accessed their information.
Citizens of Estonia have the ability to view who has accessed their records, how often and for what purpose. This transparency allows
citizens to feel ownership over their data, as they are able to see how the information is being used.
A compelling example is the Electronic Health Record a nationwide system that integrates data from various healthcare providers
into a single portal. Users are able to log on to a Patient Portal to control their treatment and manage their healthcare information.
Chekk allows users to own, manage and share their personal information
Chekk
Private sector solution, Global
Chekk is a mobile solution that provides users with a secure wallet of their personal attributes and allows them to share up-to-date
information with the entities with which they transact.
In the Chekk system, only the information required for a transaction is supplied, meaning that the user is in control and their privacy is
protected.
WORLD ECONOMIC FORUM | 2016 79
What benefits would accrue to IdPs?
IDENTITY PROVIDERS
1. Revenue growth
IdPs would complete identity transactions for RPs; this would allow them to monetize identity-as-a-service through
Revenue
per-transaction fees or other business models
growth
3. Competitive positioning
IdPs would be able to forge a strong relationship with users and position themselves as a critical part of the digital
Competitive economy, given their unique insight into users and their established position of trust
positioning
A set of banks act as IdPs in the TUPAS system, providing individuals with access to over 180 public and private services.
TUPAS
Private sector solution, Finland
The Federation of Finnish Financial Services drove the creation of a bank identity system called TUPAS, designed to improve user
access to online services.
The RPs pay for the service (initiation fees, monthly fees and fees for set transaction volumes). Users may also be charged on a
monthly basis, depending on their relationship with their bank.
While a group of telecoms in Finland offer a competing service, as of February 2016, 95% of all online service logins were processed
through TUPAS. Only 2% of online service logins were processed through the competing system. This may be due to the
governments strong adoption of TUPAS, citizen loyalty towards government and banks, or the fact that it was the first successful
service in the region. TUPAS has established a new revenue stream for banks as well as a strong competitive position.
With most banks, the user must approve and certify that the data being transferred from the bank to the RP are accurate, eliminating
any liability risk for the IdP.
RELYING PARTIES
1. Information accuracy
RPs would have access to trusted, verified identity information matched to the level of assurance required for their
products or services; this would eliminate the need for information remediation and for information cross-checks
Information through paid third-party services
accuracy Digital attribute exchange would eliminate the potential for human error in transactions
2. Service tailoring
Service
RPs would be able to provide more tailored products and services to users by requesting access to identity
tailoring information beyond what they would traditionally require to complete transactions
3. Service provision
Service
More reliable and accurate identity protocols would give RPs greater ability to differentiate between illicit and
provision legitimate users, and to deny or provide services accordingly
The Population Registry is a central database that stores identity information the data are trusted by many entities in Finland as a
comprehensive source of up-to-date information about citizens, assets and legal entities.
Population Registry
Government programme, Finland
The Population Registry is a national database owned and maintained by the Finnish government. The government acts as the IdP,
transferring attributes to public and private RPs.
Citizens are required to provide up-to-date information to the Population Registry, such that IdPs can trust that the information they
are receiving is accurate.
Public RPs that require attributes to complete transactions can use citizens national ID numbers to access data held in the
Population Registry. The necessary attributes are transferred digitally from the registry to the RP.
Private RPs can also subscribe to the Population Registry and access information (with consent) to provide better products and
services to their users.
External stakeholders are parties that are not involved in the systems day-to-day operation, but are key stakeholders in the system. The
external stakeholders are governments and regulators.
A
Process streamlining and Improved service delivery
efficiency Governments can more easily
Governments can more efficiently identify and deliver services to
GOVERNMENTS interact with their citizens, saving various groups of citizens
time and money
B
Tracing of assets Transparent view of entities Improved compliance Data standardization
Regulators can more effectively Regulators can access an Regulators can access trusted, Data collection and storage can
trace asset origination and aggregated view of legal entities up-to-date attribute information be standardized across all FIs,
REGULATORS
ownership across their hierarchies for users, improving the reducing friction in data
effectiveness of the overall aggregation
compliance process
GOVERNMENTS
The Aadhaar programme was introduced in India to increase social and financial inclusion by providing identity for all Indians
residents, many of whom previously had no means of proving their identities.
Aadhaar
Government programme, India
The Aadhaar card was developed to improve financial inclusion in the country. The Unique Identification Authority of India (UIDAI)
acts as the central IdP, controlling who has access to the data that they collect and store.
To receive a card, individuals submit various documents to a local registrar. If they are unable to provide documentation, an
introducer, such as an elected representative or a local teacher or doctor, can vouch for the person's identity. This parallel process
decreases the chance of UIDAI storing inaccurate information or providing social services to illegal immigrants or other illicit actors.
The UIDAI has a database that holds information such as name, date of birth, and biometrics data that may include a photograph,
fingerprint, iris scan, or other information.
The Aadhaar program has been very effective in increasing financial inclusion with over 1 billion people enrolled for accounts,
however there are still some outstanding concerns about information protection and privacy.
The Estonian e-Residency program allows non-Estonian citizens to gain digital residency in the country.
E-Residency
Government programme, Estonia
The e-Residency program allows non-Estonian citizens to get a digital ID card that enables them to use Estonian private and public
services and to use secure digital signatures. The purpose of the program is to create a virtual business environment and continue to
position Estonia as a hub of the digital world
Since its inception in December 2014, almost 10,000 people have applied for e-Residency and over 400 have established an new
company domiciled in Estonia.
REGULATORS
1. Tracing of assets
Regulators would be able to more effectively trace asset origination and ownership, increasing their ability to track the
proceeds of criminal activity
Tracing of
assets
Asset rehypothecation could be traced, ensuring that assets would not be rehypothecated beyond their total value
3. Improved compliance
Access to trusted identity information would increase the ability of FIs to be compliant with anti-money laundering,
know-your-customer and other regulations within their jurisdiction
Access to trusted information on legal entity and asset identity would allow FIs to more accurately detect money
Improved
compliance
laundering and other suspicious transactions
Access to trusted digital attributes would allow FIs to automate their compliance processes to some degree,
potentially allowing regulators to increase the required frequency of compliance reviews
4. Data standardization
Data Data collection and storage could be standardized across all FIs, reducing friction in data aggregation
standardization
GLEIF is an organization that supports the implementation of the Legal Entity Identifier standard this standard might ultimately
become a common thread between identifier systems in an effort to create a standardized global view of legal entities.
FIs have unique advantages that make them well-suited to playing key roles in digital CASE STUDIES
identity networks.
iDIN
Private sector solution, Netherlands
ADVANTAGES OF FIs IN DIGITAL IDENTITY
iDIN was created to capitalize on the
FIs are highly reliant on identity large investments that banks have made
Identity is central to the function of FIs, while they bear a large part of the cost of in onboarding their customers; banks
ineffective identity protocols already collect highly trusted identity
information and are well positioned to
transfer it to other parties.
FIs are connected to many key identity stakeholders
FIs have standing relationships with users, governments, regulators and other key NemID
stakeholders, and have experience working with these groups on key concerns while Private sector solution, Denmark
balancing competing interests To maximize the adoption of NemID, the
governing body wanted to cooperate
FIs are trusted institutions with private actors who have frequently
FIs are more trusted by consumers to hold personal information than other institutions, used services; banks not only interact
such as governments, telecoms and technology companies with individuals on a regular basis, but
are also seen as trusted institutions that
FIs have existing business models that do not require directly monetizing customer
already store user identity.
information
SecureKey Concierge
Public-private programme, Canada
SecureKey partnered with nine banks
that are trusted and hold accurate data;
this data can be used to authenticate
individuals in the system.
WORLD ECONOMIC FORUM | 2016 89
What benefits would accrue to FIs from the implementation of digital identity?
The benefits to FIs of implementing digital identity fall into six categories:
FINANCIAL
INSTITUTIONS
Improved compliance Revenue growth Better user experience and
Digital attribute handling and FIs will have the opportunity to competitive positioning
greater access to user identity will increase revenue from improved FIs can offer a streamlined user
allow FIs to complete compliance products and services as well as to experience and position themselves
processes more easily and accurately offer identity-as-a-service as a critical part of the digital
economy
FINANCIAL INSTITUTIONS
2. Operational efficiency
FIs would be able to access user information in a consolidated, digital form through queries in the digital identity
network; having attributes in a consolidated digital form would provide a single view of the customer and allow FIs to
Operational streamline customer-facing operations, such as onboarding, as well as many back-end processes
efficiency Digital identity for assets would allow FIs to track financial products and assets more closely, through greater visibility
into ownership and the resolution of rehypothecation concerns
3. Decreased fraud
User information would be held only by entities that follow standards around data protection; this would reduce
fraud (such as card-not-present transactions made using shipping and billing information stolen in large-scale data
Decreased breaches)
fraud
Digital authentication methods would reduce fraud resulting from hacked or compromised user accounts
FINANCIAL INSTITUTIONS
4. Improved compliance
Digital identity would give FIs access to trusted, up-to-date attribute information for users, improving the accuracy of
know-your-customer processes
Digital information transfer and storage would allow FIs to complete their compliance processes more quickly and
easily, allowing faster processing and reducing time spent on information remediation and correcting human error
Improved Compliance processes could be automated and executed on more regular cycles
compliance
Digital identity would give FIs better visibility into corporate ownership structures and the identity of corporate
directors to improve corporate know-your-customer processes
Digital identity would give FIs better visibility into asset origination and ownership
5. Revenue growth
FIs could monetize identity-as-a-service through business models such as subscription fees with RPs or fee-for-
transaction services for high-assurance identity transactions, including:
Authentication
Revenue Digital signatures
growth The completion of identity transactions for RPs, such as providing attribute information (e.g. providing shipping
information to merchants) or providing information about attributes (e.g. attesting to a merchant that a user is
over a certain age based on date of birth)
Aire is able to assist individuals who lack traditional credit information by using non-traditional user attributes to build a new credit
score.
Aire
Private company, United Kingdom
Aire, a UK-based start-up, offers an alternative to traditional credit-scoring techniques. Aire allows individuals to submit a wide range of
materials that are used to evaluate the individuals creditworthiness; for example, a user could submit utility or Netflix bills.
Know-your-customer utilities provide FIs with access to trusted, up-to-date attribute information for users, improving the accuracy of
individual and corporate know-your-customer processes.
FIs in the TUPAS system are the only entities to hold and transfer user information, allowing them to monetize identity-as-a-service
through business models such as subscription or fee-for-transaction services with RPs.
TUPAS
Private sector solution, Finland
In the TUPAS system, RPs must pay IdPs (in this case, a consortium of banks) to access trusted and accurate user attributes.
Beyond the first-level benefits of digital identity that FIs would receive as a result of participating in an identity system, we have explored
some future-looking use cases that illustrate additional capabilities that digital identity might offer to FIs.
5. Determining total risk 6. Identifying transaction 7. Linking individual identity 8. Tracking total asset
exposure counterparties to corporate identity rehypothecation
HOW WOULD DIGITAL IDENTITY HELP? HOW WOULD DIGITAL IDENTITY HELP?
FIs could automatically provide customer attributes to merchants, In collaboration with governments, taxes could be automatically
streamlining and securing the transaction process for the completed and filings generated by customers chosen FIs, using
merchant and customer. The digital transfer of attributes would their complete knowledge of customers financial holdings,
eliminate the potential for human error in information transfer assets, income and personal circumstances. With user consent,
and dramatically reduce information remediation and transaction all of this information would be available through a robust digital
abandonment for the RP. identity network. This would allow the typically complex and
Note: This automatic transfer of attributes could be supported by tedious tax filing process to be completed efficiently and
an additional factor of authentication (e.g. mobile or behavioural accurately.
authentication) to prevent fraud.
HOW WOULD DIGITAL IDENTITY HELP? HOW WOULD DIGITAL IDENTITY HELP?
Transaction counterparties could have a consolidated view of the Legal entities could request visibility into the consolidated
corporate structure of the entities with which they are identity of a third party and the ownership history of a given
transacting, allowing them to determine their total risk exposure asset involved in a transaction. This would allow them to identify
to that entity across transactions and lines of business. both the direct customer and the end customer in the
transaction, better informing the decision of whether to
complete the transaction.
HOW WOULD DIGITAL IDENTITY HELP? HOW WOULD DIGITAL IDENTITY HELP?
The digital and standardized collection, storage and transfer of Consolidated, standardized and digital identity information for
attributes for both individuals and legal entities would ensure assets would be available to all entities engaging in a transaction
identity information is accurate and up-to-date. Linkages involving that asset, giving transaction counterparties the ability
between these systems would create reliable pictures of the to check asset information, such as issuer and transaction history;
identities of individuals affiliated with legal entities for know- this would enable the tracking of the asset ownership structure
your-customer and other purposes. and composition, and prevent over-rehypothecation due to the
lack of visibility into past transactions involving that asset.
50%
We have outlined our perspective on the prime movers within digital identity solutions and how they should implement digital identity
solutions. It is critical to observe that this is the first step in a bottom-up approach that would result in systems being scaled outwards to
incorporate greater numbers of users, relying parties and identity providers as guidelines and functionality are tested and refined.
The system is launched with a critical mass of parties The system is scaled to increasing numbers of users,
to test and refine relying parties and identity providers
Global identity will never exist as a monolith
This document has laid out a principles-based approach to building effective, sustainable and bounded natural identity networks as the
foundation for interconnecting individual identity networks. There will never be a single, global solution for identity.
Identity serves different needs
Different user groups have different needs and requirements for identity. Identity systems for individuals are designed to increase the
ability of users to perform transactions in a safe and secure manner. Identity systems for legal entities are intended to enable
comprehensive aggregation at a macro level whether to determine total exposure to a single legal entity or manage systematic risk
and stability. Identity systems for assets are designed to allow tracking and provide transparency around ownership and value. Privacy is
one of the key requirements of individual identity, but is much less important in legal entity and asset identity and may even interfere
with the larger purposes of these systems. Individuals have self-determination, whereas legal entities and assets have custodians who
act on their behalf.
Identity is cultural
Identity is hugely affected by cultural and geopolitical factors. For example, while some populations are comfortable having a national ID
card, this system has failed in other jurisdictions. Certain authorities may not be a stable government to drive the creation and adoption
of digital identity.
This means that, aside from having different configurations for purely practical reasons, identity systems will differ dramatically to suit
the cultural and geopolitical needs that they serve.
Creating a global solution for identity is a two-step process: the key to building a global system for digital identity is first building
successful natural identity networks that address the unique needs and preferences of their user group and situation, and then building
connective tissue that creates interoperability between these systems.
1 2
Implementation: Configuring natural identity networks Interconnection: Building the rails for global identity
The configuration of natural identity networks will be guided by Building the rails between natural identity systems will create
the decisions made against the primary and secondary global interconnection and interoperability
dimensions of choice
Building identity as a two-step process enables identity systems to be built by narrowing the required stakeholders to groups that have
similar needs and concerns, and therefore have relatively aligned incentives. It also ensures that these systems are tailored to the
specific needs and wants of their user and stakeholder groups and will therefore gain the uptake that a top-down, one-size-fits-all
system would not attain. However, these solutions should also be built following a common framework that will ensure interoperability
by defining the features, attributes and requirements of the identities that are exchanged in the system. This reinforces the need for
individual identity systems to be built by entities such as financial institutions that have experience working together to define
standards, and then building individual systems within these standards.
Implementing discrete digital identity systems that suit the unique needs and cultural factors of users in their own jurisdictions, and
designing these systems around resilience, interoperability and interconnection, will allow a global blueprint for digital identity to
emerge.
Which entities need to be involved in an identity system for your area and user group governments, regulators, financial
institutions, consumer groups, others?
What business model that will be sustainable in that situation user pays, relying party pays, government pays? By transaction,
subscription, subsidized through other services?
What governance structure is necessary for the system who should be involved, what should be the extent of their mandate, how
will governance be renewed and refreshed?
What is the minimum viable identity product required for that situation what users should be involved, what services need to be
covered, which entities should be involved, what metrics are being tested?
Which frameworks and standards can be adopted for the identity system?
Which components of the identity stack must be proprietary, and which ones can be outsourced or obtained through partnership?
What is the best method of communicating system functionality and benefits to users?
WORLD ECONOMIC FORUM CORE PROJECT TEAM PROFESSIONAL SERVICES SUPPORT FROM DELOITTE