Coder Social home page Coder Social logo

richardbergquist / digital-identity-information-principles Goto Github PK

View Code? Open in Web Editor NEW
0.0 1.0 0.0 293 KB

Recommendation of digital identity information principles to be adopted by organisations. The principles aim to set up a foundation for identity information based on good identity practice.

License: Apache License 2.0

digital-identity-information-principles's Introduction

Digital Identity Information Principles

1 Document Control

Version 1.2.1
Status Recommended
This document is a recommendation of digital identity information principles to be adopted by organisations.
The principles aim to set up a foundation for identity information based on good identity practice.

2 About Digital Identity Information

2.1 Identity and Digital Identity

Identity is a fundamental human social construct to enable trust and context between people. Digital identity is a technology metaphor for human identity to allow trust in digital world.

This document takes the following convention

  • In the context of the broader human social construct the term "Identity" is used.
  • In the context of identity in digital interactions the term "Digital Identity" is used.
  • Digital Identity is a subset of Identity

identity-construct

2.2 Digital Identity and Trust

The purpose of digital identity is to allow people and organisations to trust one another.

The Flow of Trust in Identity

Figure 1 – The Flow of Trust in Identity

Trust in digital identity is a two-way system:

  • Organisations, in exchange for streamlined digital services with broad customer reach, must trust the authenticity of the customer's digital identity in order to provide authorised and secured access to their systems.
  • People, in exchange for personalised services, must trust the organisation to act as good stewards of their digital identity. As good stewards they must manage the information to prevent harm to the person's privacy and reputation.

Digital identity and customer experience are intrinsically linked. Customers place high value in the level of trust and respect in the way their identity data is treated by organisations.

3 Aim

Organisations that collect and mange digital identity information do so for a number of reasons that include:

  • Offering online services, either to extend customer reach or it provide new channels to drive business models
  • Applying security via identity management
  • Profiling customers to understand their usage and habits.

Organisations must accept that the collection of digital identity information comes with the added responsibility of acting as good stewards of their customer's data. Organisations that fail to respect their obligations run the risk of damaging their trust and reputation, resulting in failure of digital service adoption.

The following principles are aimed at assisting organisations in how they manage their customer's identity information to provide a sound footing with regards to identity, privacy, and security.

4 Digital Identity Information Principles

IP-ID Principle
IP-1 Digital identity must be at the centre of an organisation to provide trusted customer experience.

Customers place high value in the level of trust and respect in the way their identity data is treated by organisations. Organisations that offer good experiences in their services that treat digital identity information will be trusted and therefore more preferred. To provide trust organisations must have a common and consistent source of digital identity information.
IP-2 Identity is unique to a person.

A customer shall have a maximum of one digital identity across all their digital interactions with an organisation. Managing multiple un-associated digital identities that relate to a single person implies an organisation does not know who their customers are.
IP-3 Digital identity information belongs to its owner.

Digital identity information is held by an organisation under the trust that it will be respected and managed in keeping with the owner's legal entitlement to privacy. To comply with the principles in the Privacy Act the information may be only lawfully collected and used for its stated purposes.
IP-4 Digital identity information is an asset.

Digital identity is an asset to the customer, inline with IP-3, as they are the owners of their data. As an asset it needs to align to the cultural and social expectations of the owner. In New Zealand, tikanga Māori perspectives in managing digital identity are relevant [^1].

Digital identity is an asset to the organisation who are custodians of the data. The information is valuable to the organisation as insight on who their customers are. As an asset, the customer's identity must be secured and safeguarded to mitigate risk against loss or theft by the organisation.

Digital identity information is an orthogonal domain in an organisation's infostructure. As such:
  • It should be contained in a single source of truth, and not sharded over silos or tenants.
  • It should not be mixed with application specific data. Instead, application data should be separated and linked to it via a single identifier.
  • Where information is required to be shared from the single source of truth to application systems (e.g., biographic or data or passwords) due to technical reasons, the reconciliation of the data must be automated to ensure accuracy and currency.
IP-5 Digital identity information is mission critical.

Identity based digital services are essential to customers. These services are subject to availability and responsiveness that is commensurate with their mission criticality.
The information:
  • Must be safeguarded against loss.
  • Must be accessible.
  • Must not incur degraded access over time or system usage.
IP-6 Digital identity information is only passed to 'Justifiable Parties'.

Justifiable Parties are systems or actors that have trusted relationships with an organisation and where the customer is informed of the full nature of the data sharing arrangements of their digital identity information.
IP-7 Minimal disclosure for constrained use.

Where digital identity information is required to be shared between system actors only the minimal amount of information is shared. This aims to constrain the proliferation of unnecessary transfer of information and thereby avoid the responsibilities that system actors then have in storing the information.
IP-8 Customer in control.

Customers must give explicit consent for the release of their digital identity information whenever it is shared and/or provided to a service. Consent must be audited.
IP-9 Identity has personas.

An identity can have many personas, but a persona belongs to a single identity.
IP-10 Minimise the use of identifiers for digital identity.

Systems and organisations generate identifiers to manage their customers. If identifiers are shared without an intentional privacy design, then it opens up data matching techniques across information boundaries. The correlated views create damaging overreaches of the intended purposes of collection in each system.
Therefore:
  • Organisational identifiers should not be shared across organisational boundaries.
  • System identifiers should not be shared across system boundaries, unless the systems are explicitly intended to be linked.

5 Identity Credential Policy Principles

IC-ID Principle
IC-1 A credential is an authenticator that is possessed and/or controlled by a user that authoritatively binds the user to a registered digital identity.
Examples include username/password, pin, token, biometric, federated login (government, social etc)
IC-2 An identity may have multiple credential types as distinct credentials mapped to their digital identity.
IC-3 A customer may only have one credential of each type.

More explicitly, this implies a customer never has to manage multiple passwords, pins, biometrics or tokens for authenticate to the organisation.

Consequently, each credential type shall have one security policy for that credential. For example, in the case of username/passwords there must be a consistent password policy irrespective of the digital service the customer is using.

6 Implications

The above principles are statements that assist in building an intentional architecture that provides the best outcome for identity and customer experience.

However, there will be a need to balance these with emergent designs for initiatives that are delivering outcomes for an organisation.

The following are implications that are likely to incur identity debit as intentional architecture is balanced with emergent designs.

IMP-ID Implication
IMP-1 Data Cleansing

Applications that maintain or reference customer identity may require data cleansing to de-duplicate records that represent multiple identities for the same customer.
IMP-2 Identity Proliferation and Reconciliation

If identity information is copied, staged and propagated between systems then there is no single source of truth. This may result in data reconciliation processes.
IMP-3 Alignment of Data Models.

When these applications or services align to a common identity platform with a single view of the customer, it will also imply that their policies will also have to align. Password complexity, lifetime, reuse, controlled words are all examples. As much as possible applications or services should use identifiers to align to a common identity root (see IP-10). Applications may need to augment identity data with further application specific attributes if alignment to the common identity root is not possible. If so, this must occur in application stores and not in the common root identity store. Care should be taken not to incur debt against the problem of IMP-2.
IMP-4 Single Identity and Privacy Requests

IP-2 makes that statement that "a customer shall have a maximum of one identity across all their digital interactions with an organisation. Managing multiple un-associated identities that relate to a single person implies an organisation does not know who their customers are."
While it is possible that a customer may elect to create multiple different accounts that are unlinked, it does carry privacy implications. If a customer makes a request under the privacy act to view their records held by the organisation, then all information held is the expectation. However, for customers with unlinked accounts will make the expectation difficult to meet. The best position is for the organisation to use identity verification processes to bind the customer using evidence of identity to a unique identity record in the organisation.

References

[1]: See https://digitalidentity.nz/2021/10/27/the-emerging-framework-of-digital-identity-in-nz/

digital-identity-information-principles's People

Contributors

richardbergquist avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.