On 27-Feb-06, at 1:46 PM, Dave Crocker wrote:

"who you are" is a reasonable place to begin, but does not have quite enough substance to direct technical work. For example, the difference between a person performing in one role, versus another, might or might not require different identities. It might even require some sort of identity "hierarchy".

I see that people will have many personas, but only one identity. Each persona presents a different facet of themselves.


Yes, all of these issues have been discussed in specialized circles for some decades.

The issue I am raising, here, is that the engineering work to be pursued here needs to list specific choices for these things and has to have community agreement on those choices.

Do we need to preclude what is and is not identity? ... if we have an open mechanism for adding to the identity data that can be moved around, we will have a platform for moving around any identity data.

In our ID, we intentionally left out describing the specifics of what could be moved around, our goal was to provide a mechanism for any organization to define properties that could be moved around and defining them as URIs.


So, before there is any discussion of formats and protocol rules, there needs to be an understanding of the capabilities and constraints of the construct "identity" used for this work.

Philips related post I think covers this a little, and his comments point out what I think is an important aspect of identity protocols.

There is an implicit and often overlooked aspect of identity, which is the identity of session between machines. I use the term session here quite broadly, I mean for it to be a way for one machine to know that a message it receives is related to a previous message.

When we talk about identity, there are two aspects, one is the property, and the other is who the property is about. Over 21 is rather useless. The entity at the other end of a session being over 21 is useful. Let's call tying a property to an identifier a claim. In this case, the identifier is the session. But the identifier could be something else that has more permanence. Philip used [EMAIL PROTECTED] as an example. [EMAIL PROTECTED] is over 21] is a claim that will be true the rest of my life (as long as [EMAIL PROTECTED] is associated with me :-)

This leads to me controlling who can say they are [EMAIL PROTECTED] If only I can claim that the a session is associated with [EMAIL PROTECTED], then I will be the only where the claim [EMAIL PROTECTED] is over 21] is considered valid.

Does this clarify your question Dave, or am I missing something?

-- Dick

_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to