Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

IIW Attribute Management Discussion, Washington, DC 2012

  • Distinction between core identity attributes (name, date of birth, biometrics) and acquired attributes
    • Often breaks down along the lines of authentication (core identity or identifier) and authorization (acquired over time)
    • Base attributes, dynamic attributes and particular use case extension are another set of distinctions
  • Another line of distinction around identity and attributes is between the proofing process and the token activation and the attributes of each
  • Differences in attribute control (lifecycle management) vs. attribute brokering (exchange)
  • What is trust elevation?
    • Check with OASIS committee to see how this evolves.
    • Also track the OIX Attribute Exchange work (OIX AX)
  • Can attributes be normalized and characterized by Object Identifiers (OIDs)?
  • Definitions still can be a challenge
    • Authoritative vs. Trusted Attributes
    • Level of Assurance or Level of Confidence
  • How do attributes relate to scopes
    • OpenID Connect provides one take

ISOC-sponsored "Moving forward with an InternetĀ Attribute Infrastructure", Gaithersburg, March 2012

...