Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

Kantara Initiative Identity Assurance WG Teleconference

Table of Contents
maxLevel3
minLevel3
typeflat
separatorpipe

 

Info

DRAFT Meeting Minutes - IAWG approval required

 

Date and Time

Agenda

  1. Administration:
    1. Roll Call
    2. Agenda Confirmation
    3. Minutes approval: 
    4. Action Item Review
    5. Staff reports and updates
    6. Assurance Review Board (ARB) and Leadership Council (LC) reports and updates
    7. Call for Tweet-worthy items to feed (@KantaraNews or #kantara)
  2. Discussion
    1.  Plan for response to NIST 800-63 RFC
  3. AOB
    1.  
    Adjourn

 Attendees

Link to IAWG Roster

As of 2015-01-22, quorum is 6 of 11

info
Note

Use the Info box below to record the meeting quorum status

 

Meeting

...

 did not achieve quorum.

Voting

  • Ken Dagg (C)
  • Scott Shorter (S)
  • Adam Madlin
  • Cathy Tilton

Non-Voting

  • Peter Alterman
  • Angela Rey
  • Ann Racuya-Robbins

Staff

  •  

Regrets

...

  • Andrew Hughes
  • Richard Wilsher

 

...

...

  • Andrew Hughes

...

...

  • Richard Wilsher

...

Info
titleSelected Non-Voting members for Cut/Paste
  • Bill Braithwaite
  • Björn Sjöholm
  • Susan Schreiner
  • Jeff Stollman

...

Notes & Minutes

Administration 

Minutes Approval

No motion to approve.

Action Item Review

See the Action Items Log wiki page

Staff Updates

Leadership Council (LC) Updates
  •  Kantara liaison subcommittee reports that comments were submitted on ISO/IEC 29003.
  • Peter Alterman points out the idea that identity proofing has been put into operation by many entities, rather than encompass the lessons learned the document seems to try to create to create a new intellectual structure for identity proofings.  Section 6.2 has a table with "core", "additional" and "identity proofing process". The categorization is not useful, national schemes often do specify national schemes, the concept of unique identity in a context not previously defined in the document, inclusion of identity proofing processes creates an unnecessary processes.  Uniqueness comes from validated expressions of identity.  Proofing identity requires establishing uniqueness, which is achieved by validated assertion of entity descriptors.
ARB

A number of CSP applications they are working through as well as a number of assessor organizations.

Discussion

Process for comment on the RFC from NIST 800-63.  Scott offered to produce and compile comments.

Angela Rey asks what is the format for how we should submit.  Scott says any format will be accepted.

Ken mentions that we should comment on the scope of the document, extending beyond  

Ken mentions outcome based requirements, for example there should be data retention, but the document does not have to specify exactly the retention period.

...

Peter brings up ISO 29115, based on risk and risk mitigation.

 

AOB

 

Carry-forward Items

 

...


Scott offers to produce comments by 5/7/2015.  Minority opinions will be presented as well as consensus.

AOB

 

 

Next Meeting

...