SlideShare a Scribd company logo
Canadian Digital Identity
May 28, 2015
Overview
Introduction
Digital Canada 150
Digital ID and Authentication Council of Canada (DIACC)
Government of Canada Credential Federation (GCCF)
Pan-Canadian Identity Standards
Proof of Concept – Identity Validation
Canadian Digital Interchange (CDI)
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Introduction
About 2Keys
• 17 year old employee owned Canadian IT Security company
• Public Sector and Financial Sector
• Managed IAM Security Services
– Systems Integration
– Application Development and Support
– Security Operations Centre
– Service Desk
– Operated under SLA
– On-premise and “in the Cloud”
• Professional Services
– Threat Risk Assessments (TRA)
– Privacy Impact Assessments (PIA)
– Vulnerability Assessments (VA)
– Public Key Infrastructure (PKI)
Digital Trust
Policy
Process
Operations
Technology
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Digital Canada 150
Digital Canada 150 is a Federal Government strategy for Canada's
digital future. Based on 5 pillars:
1. Connecting Canadians
2. Protecting Canadians
3. Economic Opportunities
4. Digital Government
5. Canadian Content
The goals of this strategy are to be achieved before Canada’s
150th birthday in 2017.
Copyright © Identity Summit 2015, all rights reserved.
Digital Canada 150
Connecting Canadians
• Make high speed internet services of at least 5 Mbps available
to 98% of Canadian households.
Protecting Canadians
• New laws and national strategies to protect citizen privacy and
safeguard against cyber bullying and other online threats
(getcybersafe.ca).
Economic Opportunities
• Funding for digital entrepreneurs through the Business
Development Bank of Canada and the Canada Accelerator
and Incubator Program.
Copyright © Identity Summit 2015, all rights reserved.
Digital Canada 150
Digital Government
• Become a a leader in using digital technologies to interact with
Canadians.
• The Open Data Portal (data.gc.ca) provides a single point of
access to government datasets.
• CODE: Canadian Open Data Experience. A 48 hour Hackathon
to build the best apps utilizing data from Canada's Open
Government portal (canadianopendataexperience.ca).
Canadian Content
• Ensure Canadians have easy online access to Canadian
content that will celebrate their history, arts and culture.
• The Memory Project (thememoryproject.com).
Digital ID and Authentication
Council of Canada
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Digital ID and Authentication Council of Canada (DIACC)
• Started in 2012 as a result of recommendations from the
Federal Government’s Task Force for the Payments Systems
Review.
• Goal is to develop a Canadian digital identification and
authentication framework.
• Non-profit coalition of public and private sectors.
• Initial representation from the Federal Government, the
provinces of British Columbia and Ontario, Bank of Montreal,
Desjardin Group, TD Bank, and Telus.
Copyright © Identity Summit 2015, all rights reserved.
Digital ID and Authentication Council of Canada (DIACC)
• Public launch in May 2014.
• Now open to new members.
• Similarities to NSTIC, but not funded by government.
• Dependency on membership fees and private sector funding
handicaps POCs and net new innovation with influences from
specific agendas and existing vendor solutions.
• Membership is growing. More representation from public and
private sectors is required and will stimulate creativity,
innovation, and create value.
Government of Canada
Credential Federation
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Overview
• Authentication as a Service to 27 Federal Government Relying
Parties, securing over 80 online services.
• First step to a digital identity ecosystem.
• Separates credential from identity.
• Each government department is responsible for binding the
credential to an identity, as per their specific requirements.
• Leverage the efficiencies and enhanced security of centralizing
authentication today, while working on a solution for managing
digital identity.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Providing Choice
• Users can choose how they authenticate to Federal
Government online services.
• GCKey – Government of Canada Branded Credential
• Sign In Partner – allows the use of an existing credential from a
participating financial institution.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Sign In Partner
• A commercial service contracted by the Federal Government.
• Allows the use of an existing credential from a financial
institution.
• Currently five financial institutions participate.
• Deemed to be a Level 2 Assurance credential.
• Privacy Protecting*. The financial institutions are not aware of
where their credentials are used, and the relying parties are not
aware of which credential provider was used.
• No identity attributes are exchanged.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
GCKey
• A voluntary, anonymous, user controlled credential.
• Available to everyone: citizens, non-citizens, and businesses.
• User choice. A single credential for access to online services, or
different credentials for different services.
• User Controlled. Created by the user, and can be revoked by
the user.
• Privacy Protecting. No PII collected. Issues a unique persistent
anonymous identifier to each Relying Party.
• Government accredited Level 2 Assurance credential.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
GCKey
• Developed and operated by 2Keys as a Managed Security
Service for the Government of Canada.
• Built on the ForgeRock Platform.
• Operated under SLA of 99.8% uptime with no scheduled login
outages.
• 24 x 7 x 365 Security Operations Centre.
• 24 x 7 x 365 Level 1 and Level 2 Bi-lingual Service Desks.
• Multiple geographically diverse instances.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
GCKey Key Facts
• Go-live date was September 2012.
• Over 7 million credentials issued.
• Over 6 million active credentials in use.
• Over 4 million authentications per month.
• When given a choice, users choose the native GCKey
credential over 3rd party non-government credentials by a factor
or 10 to 1.
Copyright © Identity Summit 2015, all rights reserved.
Government of Canada Credential Federation (GCCF)
Considerations for Public Sector online services:
• Protecting user privacy is non-negotiable.
– There is no business risk calculation to be made. Any privacy breach will be front
page news.
• For web SSO of government online services, global logout is an
absolute must.
– Cannot risk leaving a user unknowingly logged into a service. Must consider the
use of shared kiosks at government service centers and shared computers.
• With BYOC, providers must be carefully vetted – a credential
federation is only as strong as the weakest link.
– How secure is the technical solution? The business processes?
– How susceptible is the service desk to social engineering?
– Is there a natural trust relationship? What’s the tendency for sharing?
Pan-Canadian
Identity Standards
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Pan-Canadian Standards for:
• Trust Framework
• Identity Validation
• Identity Retrieval
• Identity Notifications
Will ensure that all jurisdictions use consistent terminology and
procedures to enable a Pan-Canadian approach to identity
services.
Leverage trusted processes carried out in one jurisdiction for use
by another.
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Standardizing Concepts and Terms
• Personal Information
– Information about an identifiable person
• Identity Information
– Sufficient to ensure uniqueness within a service
– Minimal set of attributes required by the service
• Identifier
– Minimal set of attributes to uniquely identify an entity
• Assigned Identifier
• Identity
• Identity Resolution
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Standardizing Data Sets
• Personal Information Categories
• Associated Data Elements
Standardizing Services
• Identity Validation
• Identity Retrieval
• Identity Notifications
• Identity Resolution
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Core Identity Attributes
• Name
• Date of Birth
• Date of Death
• Sex, Gender, Documented Sex
• Place of Birth
• Place of Death
• Assigned Identifier
• Status
• Address
• Associated Person
Copyright © Identity Summit 2015, all rights reserved.
Pan-Canadian Identity Standards
Value of Standardized Identity Services
• Better delivery of services.
– Improved identity-proofing processes, streamline user enrolment.
• Increased integrity of programs and services.
– Improved data accuracy, real-time validation, fraud detection.
• Improved efficiency and reduced costs.
– Reduced need for physical document inspection and in-person visits.
• Increased velocity of innovation and transformation.
– With standardized services in place, focus will be on delivering new value
adds.
Proof of Concept
Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Identity Attributes as Entitlements
• Attribute Based Access Control.
• Utilize Identity Attributes and their Level of Assurance to drive
service entitlements.
• User asserted identity attributes consider LOA 1.
• Utilize the Pan-Canadian Identity Validation Standard to
promote user asserted identity attributes to LOA 2.
• Attributes validated against existing government authoritative
parties or 3rd party services.
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
Copyright © Identity Summit 2015, all rights reserved.
Proof of Concept – Identity Validation
2Keys Transaction Verification Service
• Real-time user notification and
approval to mobile device.
Canadian Digital Interchange
Putting it all Together
Copyright © Identity Summit 2015, all rights reserved.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
An effort by the Government of Canada, along with Provincial and
Territorial partners, to create a secure, reliable, near real-time,
scalable messaging service to facilitate information exchange (i.e.
identity attributes) across jurisdictions.
The service will:
• Ensure a standardized and comprehensive approach for the
protection of personal information and ensure accountability
from all partners.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
• Ensure identity information disclosure between jurisdictions is
transparent – users will understand how and why their
information is shared.
• Implement a secure and cost-effective solution that will allow
parties to confirm identity information, and provide updated
information between relevant jurisdictions and programs where
legal authority exists to do so.
• Implement a solution without creating any new databases or
repositories of personal information.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
Current Status
• Request for Information has been issued, responses due by
May 29, 2015.
• No commitment yet on whether a Request for Proposal will be
issued.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
2Keys Proposal
• Distributed Architecture
• Based on UMA
• CDI Trust Framework
– Defines the “rules of the road”
• CDI Deployment Profile
– Defines the APIs
– Defines the messages formats
– Defines the data elements
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
Jurisdictional Clouds
• Identity data in Canada is distributed.
• Provinces/Territories are authoritative
on Birth and Death events.
• Federal Government is authoritative on
Immigration status.
• Resource owners should have control
over their data.
• Does not preclude the use of shared
resource among jurisdictions.
Copyright © Identity Summit 2015, all rights reserved.
Canadian Digital Interchange (CDI)
A Digital Identity Ecosystem
• The Canadian Digital Interchange is the beginning of a
standardized Digital Identity Ecosystem, defining a common set
of Identity Services for the public sector, and possibly the private
sector in the future.
• Potential for an Identity Marketplace to emerge, providing a
source of revenue for governments to sustain their services.
Thank You
John Spicer
jspicer@2Keys.ca
Copyright © Identity Summit 2015, all rights reserved.
Ad

More Related Content

What's hot (20)

Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
ForgeRock
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
kantarainitiative
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
ForgeRock
 
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
ForgeRock
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
kantarainitiative
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
kantarainitiative
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
ForgeRock
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
kantarainitiative
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
kantarainitiative
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
ForgeRock
 
Kantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy InternetKantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy Internet
kantarainitiative
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
ForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock
 
Ki overview-2014
Ki overview-2014Ki overview-2014
Ki overview-2014
kantarainitiative
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
kantarainitiative
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
ForgeRock
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
ForgeRock
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
NetIQ
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
ForgeRock
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
ForgeRock
 
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E2015 Identity Summit - Tale of Two Views: B2C vs. B2E
2015 Identity Summit - Tale of Two Views: B2C vs. B2E
ForgeRock
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
kantarainitiative
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
ForgeRock
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
kantarainitiative
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
ForgeRock
 
Kantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy InternetKantara Initiative - Connecting a More Trustworthy Internet
Kantara Initiative - Connecting a More Trustworthy Internet
kantarainitiative
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
ForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
ForgeRock
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
kantarainitiative
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
ForgeRock
 
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
ForgeRock
 
Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
NetIQ
 

Viewers also liked (14)

ForgeRock and the Graph: A Match Made for IRM
ForgeRock and the Graph: A Match Made for IRMForgeRock and the Graph: A Match Made for IRM
ForgeRock and the Graph: A Match Made for IRM
ForgeRock
 
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
ForgeRock
 
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
ForgeRock
 
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
ForgeRock
 
Taking Flexibility to the Next Level
Taking Flexibility to the Next LevelTaking Flexibility to the Next Level
Taking Flexibility to the Next Level
ForgeRock
 
Entitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold RushEntitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold Rush
ForgeRock
 
Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!
ForgeRock
 
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMIdentity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
ForgeRock
 
Dev Ops Geek Fest: Automating the ForgeRock Platform
Dev Ops Geek Fest: Automating the ForgeRock PlatformDev Ops Geek Fest: Automating the ForgeRock Platform
Dev Ops Geek Fest: Automating the ForgeRock Platform
ForgeRock
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
ForgeRock
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
ForgeRock
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016
ForgeRock
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentation
jpelletier123
 
The Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesThe Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory Services
ForgeRock
 
ForgeRock and the Graph: A Match Made for IRM
ForgeRock and the Graph: A Match Made for IRMForgeRock and the Graph: A Match Made for IRM
ForgeRock and the Graph: A Match Made for IRM
ForgeRock
 
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
Identity Summit 2015: AAMC Case Study: The top 5 challenges to a successful I...
ForgeRock
 
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
ForgeRock
 
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
ForgeRock
 
Taking Flexibility to the Next Level
Taking Flexibility to the Next LevelTaking Flexibility to the Next Level
Taking Flexibility to the Next Level
ForgeRock
 
Entitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold RushEntitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold Rush
ForgeRock
 
Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!
ForgeRock
 
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORMIdentity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
Identity Summit 2015: CONTINUOUS IDENTITY PROTECTION FOR THE IDENTITY PLATFORM
ForgeRock
 
Dev Ops Geek Fest: Automating the ForgeRock Platform
Dev Ops Geek Fest: Automating the ForgeRock PlatformDev Ops Geek Fest: Automating the ForgeRock Platform
Dev Ops Geek Fest: Automating the ForgeRock Platform
ForgeRock
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
ForgeRock
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
ForgeRock
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016
ForgeRock
 
Splunk sales presentation
Splunk sales presentationSplunk sales presentation
Splunk sales presentation
jpelletier123
 
The Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory ServicesThe Future is Now: What’s New in ForgeRock Directory Services
The Future is Now: What’s New in ForgeRock Directory Services
ForgeRock
 
Ad

Similar to Identity Summit 2015: 2Keys Canadian Digital Identity (20)

2014 07-19 id cloud summit
2014 07-19 id cloud summit2014 07-19 id cloud summit
2014 07-19 id cloud summit
CloudIDSummit
 
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CloudIDSummit
 
Symbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance Overview
Rosy Kaur
 
apidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptxapidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptx
apidays
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura Stanford
IdentityNorthEvents
 
DIACC Strategic Collaboration to Solve Digital Identity
DIACC Strategic Collaboration to Solve Digital IdentityDIACC Strategic Collaboration to Solve Digital Identity
DIACC Strategic Collaboration to Solve Digital Identity
Digital ID & Authentication Council of Canada
 
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel GroupFintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
FinTech Belgium
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
SoftAge Corporate Presentation
SoftAge Corporate Presentation SoftAge Corporate Presentation
SoftAge Corporate Presentation
Ishita Malhotra
 
Chapter 5 the kyc utility
Chapter 5   the kyc utilityChapter 5   the kyc utility
Chapter 5 the kyc utility
Quan Risk
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
FinTechLabs.io
 
2020 kyriba payment_network
2020 kyriba payment_network2020 kyriba payment_network
2020 kyriba payment_network
Chris-Marty MABELLA
 
Digital Identity In Canada - GovConnect Canada - ottawa - kenmcmillan
Digital Identity In Canada -  GovConnect Canada - ottawa - kenmcmillanDigital Identity In Canada -  GovConnect Canada - ottawa - kenmcmillan
Digital Identity In Canada - GovConnect Canada - ottawa - kenmcmillan
Ken McMillan, PMP, CISSP, ITIL
 
MyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech SingaporeMyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech Singapore
NUS-ISS
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
FinTech Belgium
 
Big data4analytics ai-powered compliance
Big data4analytics   ai-powered complianceBig data4analytics   ai-powered compliance
Big data4analytics ai-powered compliance
Mike Fish
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
SSIMeetup
 
3. Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
3.	Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending3.	Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
3. Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
finstasoftware123
 
3. Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
3.	Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending3.	Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
3. Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
finstasoftware123
 
Eu fintech lab smouy rkhan
Eu fintech lab   smouy rkhanEu fintech lab   smouy rkhan
Eu fintech lab smouy rkhan
StphaneMouy
 
2014 07-19 id cloud summit
2014 07-19 id cloud summit2014 07-19 id cloud summit
2014 07-19 id cloud summit
CloudIDSummit
 
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CloudIDSummit
 
Symbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance Overview
Rosy Kaur
 
apidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptxapidays LIVE India 2022_The Rise of Open Finance.pptx
apidays LIVE India 2022_The Rise of Open Finance.pptx
apidays
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura Stanford
IdentityNorthEvents
 
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel GroupFintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
FinTech Belgium
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
SoftAge Corporate Presentation
SoftAge Corporate Presentation SoftAge Corporate Presentation
SoftAge Corporate Presentation
Ishita Malhotra
 
Chapter 5 the kyc utility
Chapter 5   the kyc utilityChapter 5   the kyc utility
Chapter 5 the kyc utility
Quan Risk
 
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
FinTechLabs.io
 
Digital Identity In Canada - GovConnect Canada - ottawa - kenmcmillan
Digital Identity In Canada -  GovConnect Canada - ottawa - kenmcmillanDigital Identity In Canada -  GovConnect Canada - ottawa - kenmcmillan
Digital Identity In Canada - GovConnect Canada - ottawa - kenmcmillan
Ken McMillan, PMP, CISSP, ITIL
 
MyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech SingaporeMyInfo Product Journey- GovTech Singapore
MyInfo Product Journey- GovTech Singapore
NUS-ISS
 
Big data4analytics ai-powered compliance
Big data4analytics   ai-powered complianceBig data4analytics   ai-powered compliance
Big data4analytics ai-powered compliance
Mike Fish
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
SSIMeetup
 
3. Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
3.	Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending3.	Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
3. Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
finstasoftware123
 
3. Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
3.	Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending3.	Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
3. Empower Informed Decisions: Data-Driven NBFC Software for Smarter Lending
finstasoftware123
 
Eu fintech lab smouy rkhan
Eu fintech lab   smouy rkhanEu fintech lab   smouy rkhan
Eu fintech lab smouy rkhan
StphaneMouy
 
Ad

More from ForgeRock (20)

Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
ForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
ForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
ForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
ForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
ForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
ForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
ForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
ForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
ForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
ForgeRock
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
ForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
ForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
ForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
ForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
ForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
ForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
ForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
ForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
ForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
ForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock
 
Customer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah KhalilCustomer Safeguarding, Fraud and GDPR: Manah Khalil
Customer Safeguarding, Fraud and GDPR: Manah Khalil
ForgeRock
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
ForgeRock
 

Recently uploaded (20)

Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 

Identity Summit 2015: 2Keys Canadian Digital Identity

  • 2. Overview Introduction Digital Canada 150 Digital ID and Authentication Council of Canada (DIACC) Government of Canada Credential Federation (GCCF) Pan-Canadian Identity Standards Proof of Concept – Identity Validation Canadian Digital Interchange (CDI) Copyright © Identity Summit 2015, all rights reserved.
  • 3. Copyright © Identity Summit 2015, all rights reserved. Introduction About 2Keys • 17 year old employee owned Canadian IT Security company • Public Sector and Financial Sector • Managed IAM Security Services – Systems Integration – Application Development and Support – Security Operations Centre – Service Desk – Operated under SLA – On-premise and “in the Cloud” • Professional Services – Threat Risk Assessments (TRA) – Privacy Impact Assessments (PIA) – Vulnerability Assessments (VA) – Public Key Infrastructure (PKI) Digital Trust Policy Process Operations Technology
  • 4. Copyright © Identity Summit 2015, all rights reserved.
  • 5. Copyright © Identity Summit 2015, all rights reserved. Digital Canada 150 Digital Canada 150 is a Federal Government strategy for Canada's digital future. Based on 5 pillars: 1. Connecting Canadians 2. Protecting Canadians 3. Economic Opportunities 4. Digital Government 5. Canadian Content The goals of this strategy are to be achieved before Canada’s 150th birthday in 2017.
  • 6. Copyright © Identity Summit 2015, all rights reserved. Digital Canada 150 Connecting Canadians • Make high speed internet services of at least 5 Mbps available to 98% of Canadian households. Protecting Canadians • New laws and national strategies to protect citizen privacy and safeguard against cyber bullying and other online threats (getcybersafe.ca). Economic Opportunities • Funding for digital entrepreneurs through the Business Development Bank of Canada and the Canada Accelerator and Incubator Program.
  • 7. Copyright © Identity Summit 2015, all rights reserved. Digital Canada 150 Digital Government • Become a a leader in using digital technologies to interact with Canadians. • The Open Data Portal (data.gc.ca) provides a single point of access to government datasets. • CODE: Canadian Open Data Experience. A 48 hour Hackathon to build the best apps utilizing data from Canada's Open Government portal (canadianopendataexperience.ca). Canadian Content • Ensure Canadians have easy online access to Canadian content that will celebrate their history, arts and culture. • The Memory Project (thememoryproject.com).
  • 8. Digital ID and Authentication Council of Canada Copyright © Identity Summit 2015, all rights reserved.
  • 9. Copyright © Identity Summit 2015, all rights reserved. Digital ID and Authentication Council of Canada (DIACC) • Started in 2012 as a result of recommendations from the Federal Government’s Task Force for the Payments Systems Review. • Goal is to develop a Canadian digital identification and authentication framework. • Non-profit coalition of public and private sectors. • Initial representation from the Federal Government, the provinces of British Columbia and Ontario, Bank of Montreal, Desjardin Group, TD Bank, and Telus.
  • 10. Copyright © Identity Summit 2015, all rights reserved. Digital ID and Authentication Council of Canada (DIACC) • Public launch in May 2014. • Now open to new members. • Similarities to NSTIC, but not funded by government. • Dependency on membership fees and private sector funding handicaps POCs and net new innovation with influences from specific agendas and existing vendor solutions. • Membership is growing. More representation from public and private sectors is required and will stimulate creativity, innovation, and create value.
  • 11. Government of Canada Credential Federation Copyright © Identity Summit 2015, all rights reserved.
  • 12. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) Overview • Authentication as a Service to 27 Federal Government Relying Parties, securing over 80 online services. • First step to a digital identity ecosystem. • Separates credential from identity. • Each government department is responsible for binding the credential to an identity, as per their specific requirements. • Leverage the efficiencies and enhanced security of centralizing authentication today, while working on a solution for managing digital identity.
  • 13. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) Providing Choice • Users can choose how they authenticate to Federal Government online services. • GCKey – Government of Canada Branded Credential • Sign In Partner – allows the use of an existing credential from a participating financial institution.
  • 14. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF)
  • 15. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) Sign In Partner • A commercial service contracted by the Federal Government. • Allows the use of an existing credential from a financial institution. • Currently five financial institutions participate. • Deemed to be a Level 2 Assurance credential. • Privacy Protecting*. The financial institutions are not aware of where their credentials are used, and the relying parties are not aware of which credential provider was used. • No identity attributes are exchanged.
  • 16. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) GCKey • A voluntary, anonymous, user controlled credential. • Available to everyone: citizens, non-citizens, and businesses. • User choice. A single credential for access to online services, or different credentials for different services. • User Controlled. Created by the user, and can be revoked by the user. • Privacy Protecting. No PII collected. Issues a unique persistent anonymous identifier to each Relying Party. • Government accredited Level 2 Assurance credential.
  • 17. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF)
  • 18. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) GCKey • Developed and operated by 2Keys as a Managed Security Service for the Government of Canada. • Built on the ForgeRock Platform. • Operated under SLA of 99.8% uptime with no scheduled login outages. • 24 x 7 x 365 Security Operations Centre. • 24 x 7 x 365 Level 1 and Level 2 Bi-lingual Service Desks. • Multiple geographically diverse instances.
  • 19. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) GCKey Key Facts • Go-live date was September 2012. • Over 7 million credentials issued. • Over 6 million active credentials in use. • Over 4 million authentications per month. • When given a choice, users choose the native GCKey credential over 3rd party non-government credentials by a factor or 10 to 1.
  • 20. Copyright © Identity Summit 2015, all rights reserved. Government of Canada Credential Federation (GCCF) Considerations for Public Sector online services: • Protecting user privacy is non-negotiable. – There is no business risk calculation to be made. Any privacy breach will be front page news. • For web SSO of government online services, global logout is an absolute must. – Cannot risk leaving a user unknowingly logged into a service. Must consider the use of shared kiosks at government service centers and shared computers. • With BYOC, providers must be carefully vetted – a credential federation is only as strong as the weakest link. – How secure is the technical solution? The business processes? – How susceptible is the service desk to social engineering? – Is there a natural trust relationship? What’s the tendency for sharing?
  • 21. Pan-Canadian Identity Standards Copyright © Identity Summit 2015, all rights reserved.
  • 22. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Pan-Canadian Standards for: • Trust Framework • Identity Validation • Identity Retrieval • Identity Notifications Will ensure that all jurisdictions use consistent terminology and procedures to enable a Pan-Canadian approach to identity services. Leverage trusted processes carried out in one jurisdiction for use by another.
  • 23. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Standardizing Concepts and Terms • Personal Information – Information about an identifiable person • Identity Information – Sufficient to ensure uniqueness within a service – Minimal set of attributes required by the service • Identifier – Minimal set of attributes to uniquely identify an entity • Assigned Identifier • Identity • Identity Resolution
  • 24. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Standardizing Data Sets • Personal Information Categories • Associated Data Elements Standardizing Services • Identity Validation • Identity Retrieval • Identity Notifications • Identity Resolution
  • 25. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Core Identity Attributes • Name • Date of Birth • Date of Death • Sex, Gender, Documented Sex • Place of Birth • Place of Death • Assigned Identifier • Status • Address • Associated Person
  • 26. Copyright © Identity Summit 2015, all rights reserved. Pan-Canadian Identity Standards Value of Standardized Identity Services • Better delivery of services. – Improved identity-proofing processes, streamline user enrolment. • Increased integrity of programs and services. – Improved data accuracy, real-time validation, fraud detection. • Improved efficiency and reduced costs. – Reduced need for physical document inspection and in-person visits. • Increased velocity of innovation and transformation. – With standardized services in place, focus will be on delivering new value adds.
  • 27. Proof of Concept Identity Validation Copyright © Identity Summit 2015, all rights reserved.
  • 28. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation Identity Attributes as Entitlements • Attribute Based Access Control. • Utilize Identity Attributes and their Level of Assurance to drive service entitlements. • User asserted identity attributes consider LOA 1. • Utilize the Pan-Canadian Identity Validation Standard to promote user asserted identity attributes to LOA 2. • Attributes validated against existing government authoritative parties or 3rd party services.
  • 29. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation
  • 30. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation
  • 31. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation
  • 32. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation
  • 33. Copyright © Identity Summit 2015, all rights reserved. Proof of Concept – Identity Validation 2Keys Transaction Verification Service • Real-time user notification and approval to mobile device.
  • 34. Canadian Digital Interchange Putting it all Together Copyright © Identity Summit 2015, all rights reserved.
  • 35. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) An effort by the Government of Canada, along with Provincial and Territorial partners, to create a secure, reliable, near real-time, scalable messaging service to facilitate information exchange (i.e. identity attributes) across jurisdictions. The service will: • Ensure a standardized and comprehensive approach for the protection of personal information and ensure accountability from all partners.
  • 36. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) • Ensure identity information disclosure between jurisdictions is transparent – users will understand how and why their information is shared. • Implement a secure and cost-effective solution that will allow parties to confirm identity information, and provide updated information between relevant jurisdictions and programs where legal authority exists to do so. • Implement a solution without creating any new databases or repositories of personal information.
  • 37. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) Current Status • Request for Information has been issued, responses due by May 29, 2015. • No commitment yet on whether a Request for Proposal will be issued.
  • 38. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) 2Keys Proposal • Distributed Architecture • Based on UMA • CDI Trust Framework – Defines the “rules of the road” • CDI Deployment Profile – Defines the APIs – Defines the messages formats – Defines the data elements
  • 39. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) Jurisdictional Clouds • Identity data in Canada is distributed. • Provinces/Territories are authoritative on Birth and Death events. • Federal Government is authoritative on Immigration status. • Resource owners should have control over their data. • Does not preclude the use of shared resource among jurisdictions.
  • 40. Copyright © Identity Summit 2015, all rights reserved. Canadian Digital Interchange (CDI) A Digital Identity Ecosystem • The Canadian Digital Interchange is the beginning of a standardized Digital Identity Ecosystem, defining a common set of Identity Services for the public sector, and possibly the private sector in the future. • Potential for an Identity Marketplace to emerge, providing a source of revenue for governments to sustain their services.
  • 41. Thank You John Spicer [email protected] Copyright © Identity Summit 2015, all rights reserved.

Editor's Notes

  • #3: I suspect not many of you have heard of 2Keys, so I’ll give a brief introduction, then I thought I would start with the 10,000 foot view of the federal government’s strategy for a digital Canada, followed by details on a relatively new organization aimed and growing the digital identity space in Canada. I’ll also talk about the current state, introduce the emerging Pan-Canadian identity standards, walk through a proof of concept related to identity validation, and finish with an overview of what’s coming next.
  • #6: Digital Canada 150 represents a comprehensive approach to ensuring Canada can take full advantage of the opportunities in the digital age.
  • #8: Memory Project - Creating a digital online record of the stories from our war veterans.
  • #11: Public launch in May of 2014, and opened their doors to new members.
  • #15: When a user accesses a protected resource, they are presented the chooser page to select their authentication method.
  • #16: You’ll notice the *, while the service is privacy protecting, it does limit the the authentication context at the CSPs. For example, the CSP can still monitor the velocity of authentication requests, but without knowing the source, it can’t tell the difference between a an error at one relying partying causing the use to re-attempt the login, or a compromised account where the attacker is trying to hijack accounts at as many services as he can.
  • #20: GCKey is an anonymous credential, where the user has complete control over creation and revocation. There is a sense of ownership. Many users are non citizens without Canadian bank accounts. Users may not be customers of one of the five financial institutions support Financial credentials are not applicable to business related online services such as Record of Employment and eManifest In Canada, there is not a strong relationship between financial institutions and the government, there is a tendency to use native credentials for native purposes -The second reason (my reason) is there isn't a natural trust relationship between the banks and the government. (Some cynics would argue neither can be trusted!) The federation isn't natural, not in the way that InCommon/CAF is natural to higher education. My belief is that there must be a natural circle of trust, perhaps even when the credential is the only thing being federated (and in an anonymous way). This solution is missing that. A more natural federation might be with provincial gov't credentials/identities - and perhaps that is in the works with recent developments in BC. And given that identity proofing must be repeated by each gov't agency, there are insufficient convenience motivations to overcome the lack of natural trust and use the partner sign-in. Getting a GCKey is a mild pain (one time) but once you have it why would you change? Easy recall of the more frequently used credential (from your bank) is the only reason and likely insufficient. 3rd party CSP are susceptible to social engineering breaches. There are many examples of breaches at banks and telcos by social engineering attacks through the service desks. Not sure who this could be done with GCKey, no PII available at the service desk. There is at the department level, but they have no access to the credential.
  • #21: There is consideration being given to adding telcos as credential providers. In Canada, the major telcos are also in the television business. To access TV shows online, many networks no require you to authenticate with your providers credential to gain access to premium content. My kids are the biggest users of this, so they know credential, and guess what? So do their friends. So while the technical implementation of the credential provider may meet the LOA 2 requirements, the user’s value attached that credential is very low. You get a mismatch is value. The same is true with banking credentials, except it’s the inverse. I attach more value to the credential, and don’t want to use it for anything but banking.
  • #24: Personal Information Information about an identifiable person Identity Information Sufficient to ensure uniqueness within a service Minimal setup of attributes required by the service Identifier Minimal setup of attributes to ensure uniqueness Identity Collection of attributes about a unique entity Assigned Identifier - Generated unique identifier linked to an identity
  • #34: The final piece of the proof of concept dealt with real-time user notifications. This utilized the 2Keys Transaction Verification Service and the 2Keys Smart Token mobile application. When a request is received, a real-time push notification message is sent to the mobile app, the user is presented with the details and asked to approve or decline the request. We believe this service will be a great companion for an UMA authorization server. Consider the classic Alice to Bob sharing use case, now Alice does need to pre-provision the sharing policy, she can approve it in real-time when Bob is ready to use the data.
  • #40: Distributed does not preclude the use of shared resources among jurisdictions, it does not required full distribution. Jurisdictions can collaborate and share costs. The distributed model will allow the CDI to grow over time. Some jurisdictions will lead, others will wait and watch. Follows the model of the API economy.