Jericho Forum Identity Commandments v1.0 PDF
Jericho Forum Identity Commandments v1.0 PDF
“Identity” Commandments
®
The Jericho Forum Identity, Entitlement & Access Management (IdEA) Commandments define the
principles that must be observed when planning an identity eco-system.
Whilst building on “good practice”, these commandments specifically address those areas that will
allow “identity” processes to operate on a global, de-perimeterised scale; this necessitates open and
interoperable standards and a commitment to implement such standards by both identity providers
and identity consumers1.
The IdEA commandments serve as a benchmark by which Identity, Entitlement and Access
Management concepts, solutions, standards and systems can be assessed and measured. They are
supported by a Jericho Forum IdEA Glossary and other related documents. They also build on the
higher level Jericho Forum Commandments, in particular Commandments 2, 8, 9 and 10.
unique identifiers 5
• A Principal or resource owner may choose when to create a Persona (Identity) and related
Unique Identifier, and which attributes are connected to that persona.
1
Jericho Commandment #4 and #8 apply to ensuring open, secure and interoperable standards
2
A core identifier may refer to a physical, biological or digital entity
3
Serial pseudo-anonymity: guarantees the same entity in multiple interactions without being able to identify the actual entity
4
A 3rd party (e.g. organisation) may choose to create a shadow or internal identifier for an entity for internal purposes
5
We consider this as something that should be enshrined in privacy law; and/or in UN Declaration of Human Rights
Always refer to www.jerichoforum.org to ensure you have the latest version Version 1.0 - May 2011
Identity Commandments
• Persona (including serial pseudo-anonymous persona) must inherit strong and verifiable
sameness from the core identifier without compromising or exposing the core identifier.
• Personas must be identifiable as unique, in the context of their usage and interaction.
• An individual persona may use several distinct unique identifiers.
5. Persona must, in specific use cases, be able to be seen as the same
• It must be possible for an entity to substitute one persona for their currently-interacting
persona, without disrupting the trustworthiness of its relationships.
• Multiple interactions with some third-parties may require that the interacting persona is
consistent over time, and an entity cannot interact multiple times using separate persona. For
example; in voting where an entity may only have one vote.
6
Much of this principle reflects the NSTIC “fair information practice principles” (fipps)
7
EU Data Protection Principles # 4
8
The strength of validation (and hence trust) may range from weak for a self asserted attribute to strong in the case of an authoritative
source
Always refer to www.jerichoforum.org to ensure you have the latest version Version 1.0 - May 2011
Identity Commandments
Entitlement management and resource access
9. A resource owner must define Entitlement (Resource Access Rules)
• Resource access rules should be simple9 and minimal, thus ensuring attribute requests are
minimised10, and avoiding the over exposure of attributes from different persona11.
• Where resources have multiple owners each owner should be able to set their subset of rights.
10. Access decisions must be relevant, valid and bi-directional
• Access must be granted based on rules evaluated using current (valid) attributes.
• Attributes that have a temporal component may affect access and entitlement rules.
• Requests for attributes should, wherever possible, use attribute derivation to minimise the
exposure of attributes. For example: Are you 18?12 Rather than request the Date of Birth.
• If logging access decisions, the attributes together with the logic used at the time of the
decision, and the outcome, should be recorded.
• Entitlement rules may drive a (bi-directional) negotiation as part of a transaction set-up
process, which results in access with reduced functionality.
identified, and trusted, by other entities. This applies even if the membership of the collective
body is secret.
• A persona representing multiple entities should be clearly identifiable as a collective persona.
9
Jericho Forum Commandment #2
10
EU Data Protection Principles # 3
11
Risk: Over exposure allows the potential aggregation of identities to derive the core identity
12
The correct way is to query “were you born before [today’s date – 18 years]”
13
This accepts that, for example, non-preauthorisation of a healthcare record may result in the death of the entity
14
A collective body consists of a collection of entities (e.g. corporation, family, help desk) that operates with a single (collective) persona
Always refer to www.jerichoforum.org to ensure you have the latest version Version 1.0 - May 2011
Identity Commandments
Conclusion
The shift from Enterprise and Application or System Centric Identity and Access Management to
User and Resource Centric Identity, Entitlement and Access Management holds the triple
promises of Lower Cost, Higher Security/Trust and Increased Flexibility. These benefits will have a
major positive impact on the way the world will innovate and trade. The new frame must however be
managed with the context created by these Commandments to gain these benefits.
There is also a major infrastructure investment required to create the next generation “Identity”
Management approach. This investment in turn requires a shift in the business model and the
enthusiastic uptake of the services that will encourage a cultural shift that will value Transparency as
much as it does Privacy. Open access to the reputation of entities will go a long way to raising the e-
Trust barrier.
These definitions are clarified and expanded in the Jericho Forum Identity Glossary.
Jericho Forum®
Always refer to www.jerichoforum.org to ensure you have the latest version Version 1.0 - May 2011