Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

 (Release Candidate DRAFT 1, 5/4/2015)

Table of Contents
 

Executive Summary

Integration of External Identities into internal systems, either single Service Providers or institutional identity and access management systems, can afford multiple benefits, for example:

...

A Relying Party is a network service that receives identity information from an Identity Provider. An Relying Party may be a Service Provider, an Identity Provider or both (in the case of “gateway” implementations).

 

...

Characterizing External Identity Use Cases

...

We leave such cases and the trust relationships that must exist between the Identity Provider and the Relying Party for future study.

 

...

Trustworthiness of External Identities

...

  • Does the institution trust the External Identity’s Attributes sufficiently to perform its own local “identity proofing” or “External Identity re-linking” against the asserted Attributes as part of an account recovery process?

  • If not, what additional user verification must the Institution manage locally for purposes of allowing future account recovery?

 

...

Architectural Patterns for Integrating External Identities

...

The invitation use case is in contrast to the “Just In Time” or “front-channel” provisioning model, where a system is configured to create an Internal Identity on-the-fly using the Identifier and identity Attributes provided in an authentication assertion. It also contrasts with “back end provisioning”, where provisioning is done out of band and is typically driven by independent business rules.

 

...

Criteria for Evaluating Identity Providers

...

  • Are there terms the External provider applies that are potentially in conflict with general campus policies?

  • Is there a cost to the user or the organization to leverage the IDs?

  • What 3rd party certifications or audits are available to confirm function of service?

  • API limitations (number of allowed authentication per unit time)

 

...

Conclusion

Integration of External Identities into internal systems can afford multiple benefits. These benefits do not come without a cost, however: The trustworthiness and other aspects of External Identity Providers’ operations must be assessed, and the External Identity Provider’s technology must be integrated into the local system.