Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Attendees

Voting participants: Mark Hapner; Richard Wilsher; Martin Smith; Rich Furr 

Non-voting participants: Roger Quint

Staff: Colin Wallis, Ruth Puente

Quorum: 4 of 7. There was quorum.

Agenda

  1. Administration:
    1. Roll Call
    2. AgendaConfirmation
    3. Minutes Approval 2019-05-23 DRAFT Minutes
    4. Action Item Review: action item list
    5. Staff reports and updates -  Director´s Cornerand Keeping up with Kantara May 2019 
    6. LC reports and updates
    7. Call forTweet-worthy items to feed (@KantaraNews or #kantara10)
  2. Discussion
  3. DIACC Request for Review & Comment: Verified Login Component & Verified Login Conformance Profile
    b. NIST 800-63-3 Implementation Guidance Reports
    3. Any Other Business

Minutes Approval

2019-05-23 DRAFT Minutes were approved by Motion. Moved:  Mark Hapner. Unanimous Approval. 

Updates

  • Director´s Corner - May 2019
  • Carin Alliance want to push a hit in the Identity Federation articulate space. They are focused on one of their priorities, which is the Code of conduct; Colin mentioned he is going to DC.
  • Interest on Electronic prescriptions for controlled subtances ABCS and the potential for Kantara to be involved on it (Health Assurance). These are two separate approaches to Kantara to be involved in the Mobile Driver Licenses landscape.
  • Newsletter: May
  • LC update:  Nothing has changed in relation to UMA development since last call, very similar case with Consent Receipt. Consent Receipt going into ISO , they are keen on creating a consent receipt on record standard separately; Kantara is required to help them with a base draft frame.

DIACC Request for Review & Comment: Verified Login Component & Verified Login Conformance Profile

  • Colin mentioned that in a general sense, it does not feel grounded enough.
  • Verified Login Component Overview: There was discussion on the privacy criteria for anonymous identity.
  • The question that arose about giving data to somebody was “should they give you control over that, is it still private data even-though they do not know who you are? Is there some Assessment criteria if such a thing exists?

NIST 800-63-3 Implementation Guidance Reports

Richard Wilsher presented these reports to the IAWG: 

  •   Consistency of terms describing proofing types (Ed. Richard Wilsher)
  •   Scope and Application of ‘Trusted Referees’ (Ed. Richard Wilsher)
  •   Impasse on KBV approval for IAL2 (Ed. Roger Quint)
  •   Guidance on Permitting “Commodity” Hardware for Unsupervised Remote Identity Proofing (Ed. Scott Shorter)
  •   Guidance on Selection of Authoritative Sources (Ed. Scott Shorter)

IAWG has approved these reports:  Guidance on Permitting “Commodity” Hardware for Unsupervised Remote Identity Proofing and 
Guidance on Selection of Authoritative Sources . The other reports will be approved by eBallot. 

Action items

1.     Richard to write a cover letter for NIST and he will adjust the reports as required.

2.     Ruth to emit an eBallot to approve the cover letter and the set of reports for NIST.


  • No labels