...
IIW Attribute Management Discussion, Washington, DC 2012
- Distinction between core identity attributes (name, date of birth, biometrics) and acquired attributes
- Often breaks down along the lines of authentication (core identity or identifier) and authorization (acquired over time)
- Base attributes, dynamic attributes and particular use case extension are another set of distinctions
- Another line of distinction around identity and attributes is between the proofing process and the token activation and the attributes of each
- Differences in attribute control (lifecycle management) vs. attribute brokering (exchange)
- What is trust elevation?
- Check with OASIS committee to see how this evolves.
- Also track the OIX Attribute Exchange work (OIX AX)
- Can attributes be normalized and characterized by Object Identifiers (OIDs)?
- Definitions still can be a challenge
- Authoritative vs. Trusted Attributes
- Level of Assurance or Level of Confidence
- How do attributes relate to scopes
- OpenID Connect provides one take
ISOC-sponsored "Moving forward with an InternetĀ Attribute Infrastructure", Gaithersburg, March 2012
...