IAWG Meeting Minutes 2012-06-21
Status:
Attendees:
Voter Name | 21 June 2012 Attendance |
Bill Braithwaite | X |
Myisha Frazier-McElveen | X |
Rich Furr | |
Linda Goettler | X |
Sarbari Gupta |
|
Helen Hill | X |
Scott Shorter | X |
Colin Soutar | X |
Richard Wilsher | X |
Non-voting:
Andrew Hughes
Nathan Faut
Apologies:
Staff: Joni Brennan, Pat Roder
1. ADMINISTRATIVE:
a) Roll Call – Quorum was achieved since there were 7 voting members out of 9 on the call.
b) Motion for Minutes: Linda moved to approve the Meeting Minutes from 6/7/12 and the motion was seconded by Colin.
c) Agenda confirmation: Agenda confirmed.
2. KAR
- The motion to adopt Kantara IAF-3310 KAR v0-3 as the base document for the editing perspective with a formal call for comments and an editor assigned was re-made by William. It was seconded by Rich and was approved.
- Mark had volunteered to be the editor on the 6/14/12 call. Richard and Scott also volunteered.
- Richard and Scott agreed to contact Mark and work together to edit KAR v0-3. (ACTION ITEM)
3. IAWG ROADMAP
- The group then discussed the Q3 effort of drafting the pseudonymous approach of decoupling credentials from identities.
- Ken, Colin, Andrew and David formed a sub-team to address this issue.
- Andrew agreed to champion this effort and to provide an update to the IAWG in 3 weeks. (ACTION ITEM)
4. OUTREACH
- The group continued to discuss the development of a list of end-user communities who may leverage Kantara’s Identity Assurance Program.
- Industrial control systems, such as power plants and smart grid, were identified as a possible industry for outreach. Standards bodies such as ISA99 and ISO27004 were also mentioned.
- Andrew suggested the Justice sector may be a possible candidate for outreach and supplied a link to the Justice sector organization that is working on identity federation (http://gfipm.net/index.html).
- The content of the proposed outreach material was discussed including use cases for the general public as well as for business to business, value propositions, and a cost/benefit analysis of being assessed.
- Colin volunteered to prepare a first draft of this material. (ACTION ITEM)
5. EVENTS
Due to time constraints, the discussion of this item was deferred until the next conference call on June 21, 2012. (ACTION ITEM)
6. AOB
Due to time constraints, the discussion of this item was deferred until the next conference call on June 28, 2012. (ACTION ITEM)
7. ACTION ITEMS
Due to time constraints, the discussion of this item was deferred until the next conference call on June 28, 2012. (ACTION ITEM)
6/21/12 Action Items
Action Item | Assigned To | Status | Description | Comments |
20120621-01 | Mark Lundin, Scott Shorter, and Richard Wilsher | Open | Contact each other and work together to address the editing of IAF-3310 KAR v0-3 |
|
20120621-02 | Ken Dagg, Colin Souter, Andrew Hughes and David Wasley | Open | Begin working as a sub-group to develop a position statement, use cases, and gap analysis for the pseudonymous approach and report to IAWG in 3 weeks (7/12/12) |
|
20120621-03 | Colin Souter | Open | Prepare first draft of an Outreach paper that describes what Kantara has to offer and how it can provide an organization with a high value service. |
|
20120621-04 | IAWG | Open | Discuss IAWG Events on the 6/21/12 call. |
|
20120621-05 | IAWG | Open | Discuss AOB on the 6/21/12 call. |
|
20120621-06 | IAWG | Open | Review Action Items on the 6/21/12 call. |
|
6/14/12 Action Items
Action Item | Assigned To | Status | Description | Comments |
20120614-01 | IAWG | Closed | Provide comments on Kantara IAF-3310 KAR v0-3 to Mark Lundin | See AI 20120621-01 |
20120614-02 | Ken, Colin, Andrew | Closed | Begin working as a sub-group to develop a position statement, use cases, and gap analysis for the pseudonymous approach | See AI 20120621-02 |
20120614-03 | IAWG | Closed | Add an item to the IAWG’s workstream to develop an Outreach paper that describes what Kantara has to offer and how it can provide an organization with a high value service. | See AI 20120621-03 |
20120614-04 | IAWG | Closed | Discuss IAWG Events on the 6/21/12 call. | See AI 20120621-04 |
20120614-05 | IAWG | Closed | Discuss AOB on the 6/21/12 call. | See AI 20120621-05 |
20120614-06 | IAWG | Closed | Review Action Items on the 6/21/12 call. | See AI 20120621-06 |
6/7/12 Action Items
Action Item | Assigned To | Status | Description | Comments |
20120607-01 | Myisha, Nathan, Scott, and Joe | Closed | Based on evidence produced (if any), assessors to determine best path forward (see June 7, 2012 notes) | This item was closed on 6/14/12. |
20120607-02 | Joni | Open | Move the alignment to NIST 800-63-1 to Q3 on the Roadmap. |
|
20120607-03 | Joni | Closed | Create a position statement which outlines how the pseudonymous approach benefits Kantara. | Sub-team formed on 6/14/12. See item 20120614-02. |
20120607-04 | IAWG – Champion Needed | Closed | Perform a gap analysis for the pseudonymous approach which spells out the work that needs to be done. | Sub-team formed on 6/14/12. See item 20120614-02. |
20120606-05 | IAWG – Champion Needed | Closed | Develop use cases for the pseudonymous approach. | Sub-team formed on 6/14/12. See item 20120614-02. |
20120607-06 | IAWG | Closed | Review Roadmap’s Q4 deliverables on next call. | This item was closed on 6/14/12. |
20120607-07 | Chair | Ongoing | Review Roadmap progress at the beginning and end of each quarter. |
|
20120607-08 | IAWG | Ongoing | Compile a list of end-user communities who may leverage Kantara’s Identity Assurance Program. |
|
20120607-09 | Chair | Closed | Move discussion of AOB items to June 14 agenda | This item was closed on 6/14/12. See item 20120614-05. |
Adjourn
The meeting ended at 8:00 am PDT.