The Consumer Identity WG is concerned with those situations in which consumers seek high-value, identity-dependent services, or require access to high-value online resources.  In both cases, “high-value” means that the consumer could potentially suffer considerable loss, or could be significantly harmed, if an imposter were able to obtain those services using the consumer’s identity, or gain access to those online resources belonging to the consumer. 

Definitions of terms used can be found following these Scenarios and Use Cases.


Scenario A

An Identity Provider issues an identity assertion/claim for verification of identity after multifactor authentication of the consumer at Assurance Levels 3 or 4 as defined by NIST 800-63, Kantara Identity Assurance Framework, or the equivalent

Examples:

Use Case 1

Service Provider initiates request for a SAML identity assertion from a trusted Identity Provider

Consumer has had his/her identity verified by a trusted Identity Provider, and has been issued a credential and token for use online. 

  1. Consumer presents credential to the Service Provider.
  2. Service Provider determines whether there exists an Identity Provider that it trusts that can authenticate the credential.
  3. If a trusted Identity Provider can be located, Service Provider redirects the consumer to the Identity Provider, or activates a pop-up window to the Identity Provider.
  4. Consumer presents the credential to the Identity Provider (or credential is presented to the Identity Provider in the redirection process).
  5. Using an authentication protocol, Identity Provider determines whether the consumer possesses and controls an authentication token that corresponds to the presented credential.  If so, the credential has been successfully authenticated.
  6. If the credential is successfully authenticated by means of the token, Identity Provider assumes that the person presenting the credential is the same person whose identity was initially verified by the Identity Provider, and to whom it issued the credential.  Identity Provider returns a secure SAML (or equivalent) identity assertion to the Service Provider / Relying Party containing a set of  verified identifier values pertaining to the consumer.  If the credential is not successfully authenticated, Identity Provider returns that information to Service Provider in the same manner.

Use Case 2

Service Provider initiates request for a verified identity claim by invoking a selector / active client and a managed Information Card

Consumer has had his/her identity verified by an Identity Provider, and has been issued a managed Information Card and token for use online.

  1. Consumer requests an identity-dependent service from a Service Provider.
  2. Service Provider returns its identity policy to the consumer’s computer, stating the identifiers that must be verified in order to obtain the service.
  3. If the consumer has a managed Information Card residing in the consumer’s selector/active client that corresponds to those identifiers, and which was issued by an Identity Provider trusted by the Service Provider, then the selector/active client displays the card on the consumer’s screen, and the consumer selects the card.
  4. Consumer authenticates to the Identity Provider using the appropriate token.
  5. If authentication is successful, Identity Provider returns (via consumer) a verified and cryptographically-signed identity assertion (called a Claim) to the Service Provider / Relying Party containing the necessary identifier values pertaining to the consumer.

Use Case 3

Service Provider requests Personally Identifiable Information (PII) from the consumer to establish identity

The Service Provider has access to a credit bureau or other data service that is used to verify the credit staus of the consumer, or to verify an identity claim on the basis of knowledge-based authentication.  The Service Provider collects PII from someone seeking to establish a new relationship, and submits it to the credit bureau / data service, where it is matched against a record on file with the credit bureau / data service. There are two alternative subcases:

Subcase 3a

Credit bureau or data service is unaware of any digital identity credentials associated with the person whose PII was submitted 

This subcase is equivalent to the current mode of operation.   A credit bureau reports on the credit status of the person whose PII it matched.  A data service prompts for knowledge-based questions to verify identity.  There is no use of digital identity credentials for further verification of identity.

Subcase 3b

Credit bureau or data service is aware that a digital identity credential has been issued by some Identity Provider to the person whose PII it matched, and is willling to act as an intermediary to facilitate identity authentication

  1. Consumer presents his/her PII to the Service Provider in order to establish an identity claim for the purpose of obtaining a new identity-dependent service.
  2. Service Provider provides PII to the credit bureau or data service.
  3. Credit bureau or data service matches PII to one of its records, which corresponds to a particular consumer, and identifies an Identity Provider that can authenticate the identity claim, if one exists.
  4. In a yet to be defined way, the credit bureau or data service facilitates an interaction between the Identity Provider, the person who presented the PII and is claiming an identity, and the Service Provider.  The outcome of this interaction is a notification to the Service Provider that allows the Service Provider to determine, with a high degree of confidence, whether this person is who he/she claims to be.  Note: It is possible that the credit bureau or data service could be the Identity Provider.

Scenario B

An Identity Provider issues an identity assertion/claim for verification of one or more personal attributes after authentication of the consumer at an appropriate Assurance Level as defined byNIST 800-63, Kantara Identity Assurance Framework, or the equivalent

A consumer wishes to obtain a service from a Service Provider that is dependent on one or more personal attributes (e.g., age, membership in some organization, etc.), but does not want to divulge his/her identity to the Service Provider.

Use Case 1

Service Provider initiates request for a SAML identity assertion from a trusted Identity Provider

Consumer has had his/her personal attributes verified by an Identity Provider, and has been issued a credential and token for use online.

  1. Consumer requests an attribute-dependent service from a Service Provider, and presents a credential to the Service Provider.
  2. Service Provider determines whether there exists an Identity Provider that it trusts that can authenticate the credential.
  3. If a trusted Identity Provider can be located, Service Provider redirects the consumer to the Identity Provider, or activates a pop-up window to the Identity Provider.
  4. Consumer presents the credential to the Identity Provider (or credential is presented to the Identity Provider in the redirection process).
  5. Using an authentication protocol, Identity Provider determines whether the consumer possesses and controls an authentication token that corresponds to the presented credential.  If so, the credential has been successfully authenticated.
  6. If the credential is successfully authenticated by means of the token, Identity Provider assumes that the person presenting the credential is the same person whose personal attributes were initially verified by the Identity Provider, and to whom it issued the credential.  Identity Provider returns a secure SAML (or equivalent) identity assertion to the Service Provider / Relying Party containing a set of relevant attribute values pertaining to the consumer.  If the credential is not successfully authenticated, Identity Provider returns that information to Service Provider in the same manner.

Use Case 2

Service Provider initiates request for a verified identity claim by invoking a selector / active client and a managed Information Card

Consumer has had his/her personal attributes verified by an Identity Provider, and has been issued a managed Information Card and token for use online.

  1. Consumer requests an attribute-dependent service from a Service Provider.
  2. Service Provider returns its identity policy to the consumer’s computer, stating the personal attributes that must be verified in order to obtain the service.
  3. If the consumer has a managed Information Card residing in the consumer’s selector/active client that corresponds to those attributes, and which was issued by an Identity Provider trusted by the Service Provider, then the selector/active client displays the card on the consumer’s screen, and the consumer selects the card.
  4. Consumer authenticates to the Identity Provider using the appropriate token.
  5. If authentication is successful, Identity Provider returns (via consumer) a verified and cryptographically-signed identity assertion (called a Claim) to the Service Provider / Relying Party containing the necessary attribute values pertaining to the consumer.
     

Scenario C

Consumer access to existing high-value online resources, records, or accounts using strong authentication

A consumer needs to access, on a repeated basis, some high-value, online resource that the consumer has previously enrolled in, such as an online financial account, online payment account, online medical records, etc.  Access to these resources requires "strong" authentication; i.e. usually multifactor authentication requiring a password together with some other type of token.

Use Case 1

Personal X.509 certificate

  1. Service Provider initially binds the consumer’s certificate (containing the consumer’s public key) to the online resource/account.
  2. Returning consumer presents the certificate to identify the resource/account he/she is seeking access to.
  3. Consumer uses the corresponding private key as a token to authenticate a claim of authorization to access the online resource/account, according to a well-defined challenge/response authentication protocol. 

Use Case 2

OpenID using strong authentication

  1. Service Provider initially binds an OpenID URL or email address, or an OpenID represented in a selector/active client, to the online resource/account.
  2. When attempting to access the protected resource, the returning consumer presents the OpenID, and is redirected to the appropriate OpenID Identity Provider (OP).
  3. Authentication occurs via a strong authentication method, such as a challenge/response protocol involving the consumer’s digital certificate and private key, or by presentation of a one-time password.  (Authentication by static password is deemed to be “low assurance” authentication, and not permitted).
  4. An identity assertion is sent from OP to Service Provider / Relying Party containing the authentication result.

Use Case 3

Self-issued Information Card based on X.509 certificate

  1. Service Provider initially binds the consumer’s self-issued Information Card to the online resource/account.
  2. When attempting to access the protected resource, the Service Provider sends a message to the consumer’s computer, causing the consumer’s selector/active client to display the appropriate self-issued Information Card.
  3. Consumer selects the Information Card and “unlocks” the card using a PIN or password.
  4. A cryptographically-signed electronic message is returned to the Service Provider / Relying Party, affirming (or negating) that the authorized self-issued Information Card has been presented.

Definitions