From dix-bounces@ietf.org Mon Apr 03 03:20:28 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FQJMP-0004Gv-Lk; Mon, 03 Apr 2006 03:20:25 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FQJMO-0004Gq-Il
	for dix@ietf.org; Mon, 03 Apr 2006 03:20:24 -0400
Received: from zproxy.gmail.com ([64.233.162.205])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FQJML-0002VS-7b
	for dix@ietf.org; Mon, 03 Apr 2006 03:20:24 -0400
Received: by zproxy.gmail.com with SMTP id x3so1653117nzd
	for <dix@ietf.org>; Mon, 03 Apr 2006 00:20:20 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com;
	h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references;
	b=RoZtK3qIAyET7LZ4YH7aLrD+CvFB3m3X8eneNn6kP5CrymigtsYTmNUFz27B3HTYFj05Dgk5gXLsrRUBwjEz1G7f0wcyzseWWh0y4rSZ77D5vsNsq0DlrfkHvQwlA9VxB2mPMys4QaYhtnoI6JfDH3wiUVfvjm/lRk5T8b/DguA=
Received: by 10.36.251.49 with SMTP id y49mr1960329nzh;
	Mon, 03 Apr 2006 00:20:20 -0700 (PDT)
Received: by 10.36.178.1 with HTTP; Mon, 3 Apr 2006 00:20:20 -0700 (PDT)
Message-ID: <a9699fd20604030020w6274c186xf10ce33479e6cb0d@mail.gmail.com>
Date: Mon, 3 Apr 2006 09:20:20 +0200
From: "Thomas Broyer" <t.broyer@gmail.com>
To: yadis@lists.danga.com
In-Reply-To: <a9699fd20604010356y7a5981aey438fa2500e4c0c71@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=WINDOWS-1252
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
References: <a9699fd20604010356y7a5981aey438fa2500e4c0c71@mail.gmail.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 5011df3e2a27abcc044eaa15befcaa87
Cc: dix@ietf.org, trackback-protocol@sixapart.com
Subject: [dix] OpenID using HTTP WWW-Authenticate/Authorization
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

[Resent, as it seems it didn't make its way through the approval
processes. I'm now subscribed to all three lists Cc'd here but please
follow-up on the Yadis list as it's also the official list for OpenID
discussions]

Hi there,

A few days ago, James M Snell [1] suggested a new HTTP Authentication
Scheme (which he was asked to removed, but that's another story) for a
user-agent to "claim" an digitally verifiable identity, giving several
examples among which one using OpenID.

I started thinking a bit and wrote to James about it:
> I've been thinking a bit about how a browser extension could handle
> Claim authentication, particularly using OpenID.
>
> It seems to me that it would lead to separating the protocol in two
> parts =96because their couldn't be redirects=96, and always use the 'dumb=
'
> mode (e.g. without the "associate" step):
>  1. the "consumer" server sends a 401 with scheme=3Dopenid and giving an
> openid.return_to URL and optionally an openid.trust_root
>  2. the browser asks the user for his identity URL and issues the
> OpenID "checkid_immediate" request to the "identity server" (HTTP-GET
> the provided URL and find the <link rel=3D"openid.server"/> and optional
> <link rel=3D"openid.delegate"/>, then HTTP-GET the "openid.server" URL
> with additional query string parameters)
>  3. if the response contains an openid.user_setup_url, the browser
> tells the user the identification failed and give him the option to go
> to that URL to authorize the "consumer site"; the user also has the
> option to retry the authentication (needed after coming back from the
> openid.user_setup_url)
>  4. if the response does not contain an openid.user_setup_url and
> contains the "positive assertion" query string arguments, the browser
> "parses" them and send them in the "Authorization: Claim" header.
>  5. when the "consumer" server receives the "Authorization: Claim"
> header, it issues the OpenID "check_authentication" request to verify
> the claimed identity
>
> However, while thinking about it, I wonder whether you didn't go a bit
> too far: HTTP-Auth is extensible, and you're trying to build an
> extensible auth-scheme on top of that. Your 6 examples could also be
> implemented each within its own HTTP-Auth scheme, like this:
> Authorization: OpenID identity=3D"http://www.snellspace.com/",
> assoc_handle=3Dxxx, signed=3D"mode,identity", sig=3D"xxx" [other params,
> such as snonce, cnonce, created, etc.]

But, initially, James proposed this new auth-scheme in the context of
the Trackback Protocol [2] (mailing list Cc'd here), so I came to
thinking (even) more about it and it seems there's a need for
delegation, because you shouldn't have to have a preexisting
relationship with ping'd sites (I think you shouldn't even have to
really create a relationship, where you'd authorized the ping'd site)
and you shouldn't have to "manually" authorize each ping'd site to
verify your OpenID.

Here's the scenario:
 1. Beth identifies to her blog's web-based admin panel at beth.bloghost.co=
m
 2. she posts a new entry, and the blog service now have to perform
the "trackback thing"
 3. for each URL that needs to be ping'd, the blog service asks Beth's
Identity Server a single-use token, identifying itself using its own
Identity URL (see below; it also means Beth has previously authorized
her blog service to ask for such tokens, but the blog service could
send Beth to her user_setup_url in case of error)
 4. the blog system now pings the trackback URLs, identiying itself
using Beth Identity URL (here's the new delegation need) and providing
the single-use token it previously retrieved as the assoc_handle
 5. the ping'd trackback service verifies the claimed identity
sendding a mode=3Dcheck_authentication request to Beth's Identity Server

Notes:
As Beth don't want to have to authorize each and every service she
trackbacks, the assoc_handle has to be "use once exactly".
OpenID has to be extended to allow Beth's blog service to ask for an
assoc_handle in the name of Beth, for use (verification) by another
Relying Party.
Beth's blog service has to have an Identity URL so that it can
identifies itself to Beth's Identity Server, using an Authorization
HTTP header as described above.


All this thinking is based on OpenID, but I've read that LID could
allow it without the need to be extended. If that's the case, please
tell me how: I started reading lid.netmesh.org but I must say that
it's really hard to follow (I saw many profiles but I didn't understand
how really they all work together).


As there have been discussions recently on the DIX [3] list about
non-browser based needs, I'm also Cc'ing the DIX mailing list.


[1] http://www.snellspace.com
[2] http://www.lifewiki.net/trackback/
[3] http://www.dixs.org
--
Thomas Broyer

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 05 00:14:34 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FQzPc-0002RJ-O4; Wed, 05 Apr 2006 00:14:32 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FQzPb-0002RE-HT
	for dix@ietf.org; Wed, 05 Apr 2006 00:14:31 -0400
Received: from tama5.ecl.ntt.co.jp ([129.60.39.102])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FQzPZ-0001dF-Kz
	for dix@ietf.org; Wed, 05 Apr 2006 00:14:31 -0400
Received: from vcs3.rdh.ecl.ntt.co.jp (vcs3.rdh.ecl.ntt.co.jp [129.60.39.110])
	by tama5.ecl.ntt.co.jp (8.13.6/8.13.6) with ESMTP id k354ERYx024046
	for <dix@ietf.org>; Wed, 5 Apr 2006 13:14:28 +0900 (JST)
Received: from mfs3.rdh.ecl.ntt.co.jp (mfs3.rdh.ecl.ntt.co.jp [129.60.39.112])
	by vcs3.rdh.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id
	k354ERPK002425
	for <dix@ietf.org>; Wed, 5 Apr 2006 13:14:27 +0900 (JST)
Received: from nttmail3.ecl.ntt.co.jp ([129.60.39.100])
	by mfs3.rdh.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id
	k354EQ5e019080
	for <dix@ietf.org>; Wed, 5 Apr 2006 13:14:26 +0900 (JST)
Received: from eclscan3.m.ecl.ntt.co.jp (eclscan3.m.ecl.ntt.co.jp
	[129.60.5.69])
	by nttmail3.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id
	k354EQeQ017802
	for <dix@ietf.org>; Wed, 5 Apr 2006 13:14:26 +0900 (JST)
Received: from eclscan3.m.ecl.ntt.co.jp (localhost [127.0.0.1])
	by eclscan3.m.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id
	k354EP5N010044
	for <dix@ietf.org>; Wed, 5 Apr 2006 13:14:25 +0900 (JST)
Received: from imb.m.ecl.ntt.co.jp (imb.m.ecl.ntt.co.jp [129.60.5.226])
	by eclscan3.m.ecl.ntt.co.jp (8.12.11/8.12.11) with ESMTP id
	k354EPJ4010026
	for <dix@ietf.org>; Wed, 5 Apr 2006 13:14:25 +0900 (JST)
Received: from [127.0.0.1] ([129.60.16.7])
	by imb.m.ecl.ntt.co.jp (8.13.4/8.13.4) with ESMTP id k354ENuA021543
	for <dix@ietf.org>; Wed, 5 Apr 2006 13:14:25 +0900 (JST)
Message-ID: <44334437.5000101@lab.ntt.co.jp>
Date: Wed, 05 Apr 2006 13:14:47 +0900
From: Kenji Takahashi <takahashi.kenji@lab.ntt.co.jp>
User-Agent: Thunderbird 1.5 (Windows/20051201)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 3002fc2e661cd7f114cb6bae92fe88f1
Subject: [dix] CFP: ACM CCS2006 Workshop on Digital Identity Management
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Just an FYI.  The attached is a call for papers for ACM CCS2006 Workshop 
on Digital Identity Management. 
Also you can find the information at www2.pflab.ecl.ntt.co.jp/dim2006

Kenji Takahashi
NTT
Tokyo, Japan

[Call for Papers]
ACM CCS2006 Workshop on Digital Identity Management
November 3, George Mason University, Fairfax, VA, USA

 The Second Workshop on Digital Identity Management will explore the 
relevance of User Centric Identity Management as an organizing principle 
for digital identity. It is designed to bring together practitioners, 
corporate researchers and academics to explore the newly emerging "User 
Centric" technologies for identity management. 
 Our society is facing challenges that lead us to consider fundamental 
changes in managing identities, the global scale deployment of stronger 
authentication and privacy protection beyond simple password and 
patched-work solutions. User centric identity management is currently 
viewed as a useful high-level organizing principle for designing 
solutions to meet these challenges and is being actively pursued both in 
industry and academia. 
 User centric identity shifts the focus from domain-centric identity 
management to the users themselves, giving them greater flexibility in 
how and where they store their identities, control over how those 
identities are used and shared, and stronger assurances of good 
privacy.  Despite the acceptance of the value of user-centric 
technologies, there is no universally recognized set of criteria by 
which user-centrism can be measured. For some, the term means identity 
hosted on the client, for others it means giving the user more options 
as to where on the network they store their identity, etc. 
 The goal of the workshop is to lay the foundation and agenda for 
further research and development in this area. Under the broad umbrella 
of user-centric identity, we are soliciting papers from researchers and 
practitioners on topics including, (but not limited to):

- Basic principles - what makes an identity system user-centric?
- Client-hosted identity
- Consistent UI for identity transactions
- Identity lifecycle management
- Identity Metasystem
- Identity theft prevention
- Privacy-enhancing identity management
- Private Credentials
- Social networks
- Strong authentication
- Unlinkability of Transactions
- URI-based identity systems

Important Dates:
 Paper submissions due    :  July 7, 2006
 Acceptance notifications :  August 4, 2006
 Camera ready copy        :  August 21, 2006
 CCS Conference          :  October 31 ? November 2, 2006
 DIM Workshop          :  November 3, 2006

Chair:
 Atsuhiro Goto, NTT, Japan

Program Committee:
 Gail-Joon Ahn, University of North Carolina Charlotte, USA
 Elisa Bertino, Purdue University, USA
 Stefan Brands, Credentica, Canada
 Jan Camenisch, IBM Zurich Lab, Switzerland
 David Chadwick, University of Kent, UK
 Johannes Ernst, NetMesh, USA
 Hidehito Gomi, NEC, Japan
 Dick Hardt, Sxip, USA
 Brian LaMacchia, Microsoft, USA  
 Paul Madsen, NTT, Canada
 Eve Maler, Sun Microsystems, USA
 Toshihiko Matsuo, NTT Data, Japan
 Birgit Pfitzmann, IBM Zurich Lab, Switzerland   
 Ravi Sandhu, George Mason University and TriCipher, USA
 Angela Sasse, University College London, UK
 Diana Smetters, PARC, USA
 Tsuyoshi Takagi, Future University - Hakodate, Japan
 Kenji Takahashi, NTT, Japan

For further information:
 Write to ccs2006-dim_at_lab.ntt.co.jp or visit 
www2.pflab.ecl.ntt.co.jp/dim2006


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Mon Apr 10 14:16:30 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FT0w9-0001fB-Lb; Mon, 10 Apr 2006 14:16:29 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FT0w7-0001eR-Oy
	for dix@ietf.org; Mon, 10 Apr 2006 14:16:27 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FT0w5-0004lB-JN
	for dix@ietf.org; Mon, 10 Apr 2006 14:16:27 -0400
Received: from [10.0.1.2] (adsl-69-106-230-221.dsl.pltn13.pacbell.net
	[69.106.230.221]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3AIGJwP088581
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Mon, 10 Apr 2006 11:16:20 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
To: Digital Identity Exchange <dix@ietf.org>
Message-Id: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
Content-Type: multipart/mixed; boundary=Apple-Mail-13-1029535651
From: John Merrells <merrells@sxip.com>
Date: Mon, 10 Apr 2006 11:16:16 -0700
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-0.7 required=5.0 tests=AWL, BAYES_00, URIBL_OB_SURBL 
	autolearn=no version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 59da4bdfb55194488c2119a3e9cb65b0
Subject: [dix] draft-merrells-use-cases-01
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

--Apple-Mail-13-1029535651
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=US-ASCII;
	delsp=yes;
	format=flowed


Based on feedback and contributed text I've revised the
draft use cases document.

Added:

1) More browser based use cases. In particular many examples of  
'claims'.
2) Rob and Lisa's non-bowser based use cases.
3) Brief introductory section on goals of the group.

Further comments / contributions are most welcome.

John



--Apple-Mail-13-1029535651
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; x-unix-mode=0777;
	name="draft-merrells-use-cases-01.txt"
Content-Disposition: attachment;
	filename=draft-merrells-use-cases-01.txt





Network Working Group                                        J. Merrells
Internet-Draft                                             Sxip Identity
Expires: September 2, 2006                                    March 2006


                 Digital Identity Exchange - Use Cases
                    draft-merrells-use-cases-01.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on September 2, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   This document describes the motivating use cases for DIX, the Digital
   Identity Exchange protocol.










Merrells                Expires September 2, 2006               [Page 1]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Table of Contents

   1.  Requirements notation  . . . . . . . . . . . . . . . . . . . .  4
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.  Goals  . . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
   4.  Definitions  . . . . . . . . . . . . . . . . . . . . . . . . .  7
   5.  Browser Based Use Cases  . . . . . . . . . . . . . . . . . . .  8
     5.1.  B1 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.2.  B2 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.3.  B3 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.4.  B4 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.5.  B5 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.6.  B6 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     5.7.  B7 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     5.8.  B8 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     5.9.  B9 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     5.10. B10  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.11. B11  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.12. B12  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.13. B13  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.14. B14  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.15. B15  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.16. B16  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.17. B17  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.18. B18  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.19. B19  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.20. B20  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.21. B21  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.22. B22  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.23. B23  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.24. B24  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.25. B25  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.26. B26  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.27. B27  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.28. B28  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.29. B29  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.30. B30  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.31. B31  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.32. B32  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.33. B33  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
   6.  Non Browser Based Use Cases  . . . . . . . . . . . . . . . . . 14
     6.1.  NB1 - REST . . . . . . . . . . . . . . . . . . . . . . . . 14
     6.2.  NB2  . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     6.3.  NB3 - WebDAV . . . . . . . . . . . . . . . . . . . . . . . 14
     6.4.  NB4 - AtomPub  . . . . . . . . . . . . . . . . . . . . . . 14
     6.5.  NB5 - XCAP and SIMPLE  . . . . . . . . . . . . . . . . . . 14
     6.6.  NB6 - CalDAV . . . . . . . . . . . . . . . . . . . . . . . 15
     6.7.  NB7 - IMAP/POP3 and CalDAV . . . . . . . . . . . . . . . . 15



Merrells                Expires September 2, 2006               [Page 2]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


     6.8.  NB8 - RSS, Web, and CalDAV . . . . . . . . . . . . . . . . 15
   7.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 16
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 17
   9.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 18
   Intellectual Property and Copyright Statements . . . . . . . . . . 19













































Merrells                Expires September 2, 2006               [Page 3]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


1.  Requirements notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].














































Merrells                Expires September 2, 2006               [Page 4]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


2.  Introduction

   The use cases below describe various scenarios for the Digital
   Identity Exchnage (DIX) protocol [dmd0].















































Merrells                Expires September 2, 2006               [Page 5]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


3.  Goals

   The goals of the protocol are:

   Identity Information Exchange:

      The primary goal of any DIX protocol is to automate the exchange
      of Identity Information over the Internet.


   Ease of Adoption:

      Any DIX protocol must provide the lowest possible barriers to
      adoption to ensure wide-spread usage of the protocol.


   Internet Scale:

      Any DIX protocol must provide an Internet scale solution to
      identity information exchange.


   Privacy:

      Any DIX protocol must ensure that all aspects of user privacy can
      be maintained.

























Merrells                Expires September 2, 2006               [Page 6]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


4.  Definitions

   The following terms and their definitions are drawn from the lexicon
   of 'The Identity gang', a community of thought leaders in the user-
   centric digital identity space. [identitygang].

      Digital Identity - The transmission of digital representation of a
      set of Claims made by one Party about itself or another Digital
      Subject, to one or more other Parties.

      Identity Agent - An agent acting on behalf of the user.

      Identifier - An identifying attribute for a set of attributes.

      Identity Data / Identity Information - A set of attributes.

      Claim - An assertion made by a Claimant of the value or values of
      one or more attributes of a Digital Subject, typically an
      assertion which is disputed or in doubt.
































Merrells                Expires September 2, 2006               [Page 7]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


5.  Browser Based Use Cases

   Some use cases are dependent upon others, so should be perused in
   order.  Beth is our protagonist throughout; a typical Internet user,
   but she's a bit of a geek.

5.1.  B1

   Beth receives an email from a friend introducing her to a new
   website, geeknews.com, a techie news site.  She wishes to sign up so
   that she can read some articles.  She sees an IN button, which she
   clicks.  Her identity agent displays a screen informing her that
   geeknews.com is requesting some data, her first name.  She enters
   'Beth' at the prompt, provides consent and the data is sent to the
   site.

5.2.  B2

   Beth browses to geekdate.com, she clicks an IN button.  Her identity
   agent informs her that geekdate.com is requesting some data, her
   first name.  Her agent already has this data.  She provides consent
   and the data is sent to the site.

5.3.  B3

   Beth decides to create a profile at geekdate.com.  She sees an IN
   button, which she clicks.  Her identity agent displays a screen
   informing her that geekdate.com is requesting some data, an
   Identifier.  She provides consent and the data is sent to the site.

5.4.  B4

   Beth decides to flesh out her profile at geekdate.com.  Geekdate.com
   displays a registration form.  One field requests a URL of a photo of
   her.  Beside it is a SAVE button.  She enters the URL and clicks the
   button.  Her identity agent displays a screen informing her that this
   data item can be stored.  She decides that she wants to be able to
   provide that data to other sites.  She provides consent and the data
   is stored by her agent.

5.5.  B5

   Geeknews.com offers Beth the option to build up a readership
   preferences profile over time, the benefit being that the site will
   tailor its content to her interests.  She decides to take up the
   offer, she sees an IN button, which she clicks.  Her identity agent
   informs her that geeknews.com is requesting some data, an Identifier.
   She selects an existing identifier that represents a subset of her



Merrells                Expires September 2, 2006               [Page 8]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   identity, which is used for a subset of the sites she has a
   relationship with.  She provides consent and the data is sent to the
   site.

5.6.  B6

   Geeknews.com offers Beth the option to build up a readership
   preferences profile over time, the benefit being that the site will
   tailor its content to her interests.  She decides to take up the
   offer, she sees an IN button, which she clicks.  Her identity agent
   informs her that geeknews.com is requesting some data, an Identifier.
   She selects an existing identifier that represents a subset of her
   identity, which is used for a subset of the sites she has a
   relationship with.  She provides consent and the data is sent to the
   site.

5.7.  B7

   Beth wants to have multiple identifiers, for different aspects of
   herself, her personas.  She wants to have a 'home' persona for
   identity data that she releases to her personal sites, such as
   geeknews.com.  She wants to have a separate 'work' persona for
   identity data that she releases to work-related sites, such as
   helpdesk.com.  She wants some of her identity data to be the same for
   her different personas, and other data to be different.

5.8.  B8

   [Assumptions: Beth has visited geeknews and geekdate before and has
   informed her identity agent that she consents to a relationship with
   them.]  Beth starts her day with a strong coffee and a perusal of
   geeknews.com.  She starts her computer and authenticates herself to
   the operating system.  By that authentication mechanism she has also
   authenticated herself to her identity agent, as her vendor of that
   system has hooked it into the operating system's authentication
   system.  She browses to geeknews.com and clicks the IN button and is
   directly shown the content, no further clicks.  She then browses to
   geekdate.com, she clicks the IN button and is directly presented with
   her profile no further clicks.

5.9.  B9

   Beth's identity agent prompts her to provide a 'spoken name'.  Using
   the multimedia capabilities of her computer she records her spoken
   name; an mp3 of her saying 'Beth'.  She later browses to
   voicebox.com, which runs a voicemail service, she opts to create an
   account and the site requests some properties, amongst which is a
   request for her spoken name.  She provides consent and the data is



Merrells                Expires September 2, 2006               [Page 9]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   sent to the site.

5.10.  B10

   Beth purchases a book from an online store, as she's checking out the
   store makes her an offer: 10% off for completion of a demographic
   survey.  She's tempted, but how many data fields are there?  One
   hundred!  Too many to be worth the effort.  But it happens to be
   commonly requested data, which she has already entered during
   previous exchanges with other sites.  So, she completes the remaining
   fields, saving them to her identity agent for future reuse.  She
   provides consent and the data is sent to the site.

5.11.  B11

   Beth has invested significant effort in building up a persona and
   reputation around a specific identifier, her 'home' identifier.  But,
   she has become dissatisfied with her identity agent and so decides to
   switch vendors.  She establishes the new agent and migrates her
   identity data from the old one to the new one.  She then administers
   her identifier so that her new identity agent is authoritative for
   authentication and provision of identity data.

5.12.  B12

   Whilst in town Beth stops off at an Internet Cafe to check her email.
   She goes to her webmail account, which requires that she identity
   herself.  Her Identity Agent prompts her for consent and provides her
   identifier so that she can gain access to her email.

5.13.  B13

   Beth visits a website that requests some identity information.  Her
   Identity Agent warns her that satisfying the request would contravene
   her established privacy policy.

5.14.  B14

   Beth moves house, so she changes the home address information stored
   by her Identity Agent.  Her Identity Agent offers to notify all
   relying parties to whom she has previously provided her home address.

5.15.  B15

   Beth is a frequent traveler on Galactic Air, whose site offers a
   claim of membership for use at affiliate sites.  She acquires a
   membership claim, which her Identity Agent stores for her.




Merrells                Expires September 2, 2006              [Page 10]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


5.16.  B16

   Beth visits a Galactic Air affiliate site that provides discounted
   travel insurance for frequent travelers.  She presents her Galactic
   Air membership claim and receives a discount.

5.17.  B17

   Beth visits a rental cars site.  She opts out of the offered drivers
   insurance as she is covered by her travel insurance.  To complete the
   booking the site requests a claim that she has valid insurance.  Her
   identity agent is unable to satisfy the request so provides a list of
   suggested sources.  Beth picks her insurance provider and her
   identity agent acquires the required claim and presents it to the
   rental car site.

5.18.  B18

   A couple of months later Beth books another trip.  The travel site
   requests her claim of Galactic Air membership.  Her identity agent
   finds that the claim has expired, so refreshes it by requesting an
   updated claim from galacticair.com.

5.19.  B19

   Beth leaves work and goes to the bus stop.  Whilst waiting for the
   next bus home she uses her smart phone to browse geeknews.com.  Her
   Identity Agent provides her with the same ease of browsing that she
   experiences on her work and home computers.

5.20.  B20

   Beth is ending her day at work.  She leaves work and waits for the
   next bus home.  Her friend calls and invites her to the movies.  She
   uses her phone to browse to the movies.com to find out what's
   playing.  The site requests her current location, which she consents
   to release via her Identity Agent.

5.21.  B21

   Beth signs up with a financial services site, BigPicture.com, which
   provides an aggregate view of her finances.  She provides the site
   with agency rights over each of her existing bank accounts.

5.22.  B22

   Beth goes to an auction side, ibay.com.  Her Identity Agent shows a
   signed graphic of ibay.com for releasing data.  Beth knows that she's



Merrells                Expires September 2, 2006              [Page 11]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   dealing with ibay.com, and not an impostor.

5.23.  B23

   Beth visits her online bank, which requires the use of a strong
   authentication mechanism.  She authenticates to her Identity Agent
   using a two-factor device indicated by the bank to be an acceptable
   mechanism.

5.24.  B24

   Adam uses a service to acquire a verified email claim.  With it he
   can prove that he owns his email address, Adam@example.com, without
   having to go through a verification process.

5.25.  B25

   Beth gives her friend, Adam@example.com, access to her photos.  Adam
   receives an email from Beth inviting him to view her photos.  He goes
   to the site, which requests a verified email claim.  He presents his
   claim and gains access to the photos Beth has published for him.

5.26.  B26

   Adam decides to create a profile at geekdate.com. geekdate.com
   requests an Identifier.  He instructs his identity agent to create an
   identifier specific to his relationship with geekdate.com.

5.27.  B27

   Adam visits a site that requires that he prove he is over 21.  He
   provides the site with a claim that he is over 21 from the government
   of his country of residence, gov.ca.  The site is unable to find out
   who Adam is from gov.ca.

5.28.  B28

   Adam returns to the same site.  He must again prove that he is over
   21.  He provides a claim, but the site cannot tell that it is Adam
   that has returned again to the site.

5.29.  B29

   Adam heavily frequents two gambling sites, goldenslots.com and
   luckydice.com.  He uses the same identifier across both sites as he
   wants them to know he is the same person.





Merrells                Expires September 2, 2006              [Page 12]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


5.30.  B30

   Beth provides a claim from galacticair.com to many different
   websites.  She wants all of the sites to know that she is the same
   person providing the claim, so she can receive a free flight at the
   end of the year.

5.31.  B31

   Beth's employer has partnered with a local university to provide it's
   staff with access to online courses.  She signs up for some modules
   at the university admissions website acquiring an enrollment claim.
   She then browses to the computer science school website to sign up
   for an advanced programming course.  The site requests claims that
   she is an employee, that she has previously completed some basic
   introdBtory modules, and that she has been enrolled.

5.32.  B32

   Beth is shopping online for a new laptop computer.  She visits an
   online site that caters to recently graduated professionals.  She
   selects a machine and investigates the lease options available.  To
   work out the monthly payment the site requests some claims: A claim
   that she's an alumni of a university, so that the site can include an
   appropriately branded tote bag.  A claim that she's a member of
   Galactic Air, so that she can be credited with airmiles for her
   purchase.  And, a claim from a credit scoring agency that she has a
   'good' credit rating.

5.33.  B33

   Beth is at home checking her work email, she has an email from a
   colleague assigning a customer support issue to her.  The company
   help desk system is provided by helpdesk.com, an on-demand
   application provider.  She clicks through a link in the email to the
   page that describes the issue.  Helpdesk.com requests a claim that
   Beth is an employee of 'Nano Software Inc', which she provides from
   her Identity Agent, and she gains access to the page.













Merrells                Expires September 2, 2006              [Page 13]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


6.  Non Browser Based Use Cases

6.1.  NB1 - REST

   Beth wants to use QOPO.com for printing her pictures that are stored
   in flackr.  She visits QOPO.com and her identity agent is instructed
   to acquire a token from flackr.  Her Identity Agent retrieves the
   token from flackr and presents it to QOPO.com.  QOPO.com passes the
   token over the REST based web service that flackr provides to
   retrieve her photos for printing.

6.2.  NB2

   Beth is a big fan of Rocky Gervas and listens to his podcast
   fanatically.  The Rocky Gervas show recently started charging a small
   fee for the podcast.  Her media player polls the podcast
   periodically.  When polled the site requests a claim from Beth's
   Identity Agent asserting that Beth has paid for the podcast.  Beth's
   Identity Agent retrieves the claim presents it to the site and the
   latest episode of The Rocky Gervas show is downloaded.

6.3.  NB3 - WebDAV

   At work Beth uses her website editing software (a WebDAV client) to
   publish some company confidential content to their extranet.  Beth is
   collaborating with Charles at another company, who requires access to
   the content.  Beth configures the extranet to allow Charles access.
   Charles uses his website editing software (also a WebDAV client) to
   fetch the content.  The extranet site requests identity information,
   which his client presents from his Identity agent, and he is able to
   edit the content.

6.4.  NB4 - AtomPub

   Beth uses a blogging client (AtomPub) to both post content to her
   blog and to add comments on other people's blog postings.  Her client
   uses her identity agent to associate identifying information (her
   blog url and favicon) with her comments.

6.5.  NB5 - XCAP and SIMPLE

   Beth uses her instant messaging client (a SIMPLE client) to
   communicate with her friends.  She uses her client to update her
   profile information (via XCAP), adding a new friend.  Her client
   didn't need to authenticate to her XCAP server, as she had already
   authenticated herself to her identity agent.





Merrells                Expires September 2, 2006              [Page 14]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


6.6.  NB6 - CalDAV

   Beth needs to arrange a conference call with Charles.  She uses her
   calendaring software (a CalDAV client) to publish her free-busy time
   to Charles.  Charles uses his calendaring software (also a CalDAV
   client) to fetch Beth's free-busy time.  Beth's calendar publisher
   requests some identity information of Charle's client.  It's provided
   from his identity agent and he is able to book a time for the call.

6.7.  NB7 - IMAP/POP3 and CalDAV

   At work Beth uses both calendaring (CalDAV) and email
   (IMAP,POP3,SMTP) clients to manage her time and messages.  Her
   identity agent authenticates her as owning the identifier that both
   clients use to identify her.  In this way she need only authenticate
   once to her identity agent instead of twice, once to each client.

6.8.  NB8 - RSS, Web, and CalDAV

   Beth works in a distributed workgroup collaborating with colleagues,
   individual contractors, and employees of partner companies.  The
   calendaring information she has access to is available via CalDAV,
   RSS, and HTTP/HTML.  Each of her software clients uses her identity
   agent to ensure she need only authenticate once, instead of once per
   client.


























Merrells                Expires September 2, 2006              [Page 15]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


7.  Acknowledgements

   The editor acknowledges the use case contributions made by Dick
   Hardt, Robert Yates, Lisa Dusseault and Laurie Rae.















































Merrells                Expires September 2, 2006              [Page 16]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


8.  Security Considerations

   None.

9.  References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [dmd0]     Merrells, J., "draft-merrells-dix-00.txt", March 2006.

   [identitygang]
              The Identity Gang, "http://identitygang.org/Lexicon",
              March 2006.





































Merrells                Expires September 2, 2006              [Page 17]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Author's Address

   John Merrells
   Sxip Identity
   798 Beatty Street
   Vancouver, BC  V6B 2M1
   Canada

   Email: merrells@sxip.com
   URI:   http://sxip.com/









































Merrells                Expires September 2, 2006              [Page 18]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Merrells                Expires September 2, 2006              [Page 19]
=0C


--Apple-Mail-13-1029535651
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--Apple-Mail-13-1029535651--




From dix-bounces@ietf.org Tue Apr 11 13:08:49 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTMMC-0006RR-7d; Tue, 11 Apr 2006 13:08:48 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTMMB-0006RM-9u
	for dix@ietf.org; Tue, 11 Apr 2006 13:08:47 -0400
Received: from sinclair.provo.novell.com ([137.65.81.169])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTMM9-0001lS-W9
	for dix@ietf.org; Tue, 11 Apr 2006 13:08:47 -0400
Received: from INET-PRV-MTA by sinclair.provo.novell.com
	with Novell_GroupWise; Tue, 11 Apr 2006 11:08:41 -0600
Message-Id: <443B8E1F.0A7A.00E4.0@novell.com>
X-Mailer: Novell GroupWise Internet Agent 7.0.1 Beta 
Date: Tue, 11 Apr 2006 11:08:15 -0600
From: "Tom Doman" <TDoman@novell.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] draft-merrells-use-cases-01
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
In-Reply-To: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
X-Spam-Score: 0.0 (/)
X-Scan-Signature: b19722fc8d3865b147c75ae2495625f2
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

John,

This is good stuff John!

I have a question about use case B3.  What is the "Identifier" being =
requested by geekdate.com and how did Beth provide it?  She gave consent =
and the "data" was sent but, what data?  Maybe you're trying to be a bit =
vague here as in the "Identifier" in B5, B6, etc. to leave it more open =
but could you perhaps provide some examples of some of Beth's "Identifiers"=
?  I think that would clarify this for me.  I'm assuming that these =
"Identifiers" are becoming "personas" in later use cases, is this correct?

Thanks,
Tom

>>> John Merrells <merrells@sxip.com> 4/10/2006 12:16:16 pm >>>

Based on feedback and contributed text I've revised the
draft use cases document.

Added:

1) More browser based use cases. In particular many examples of =20
'claims'.
2) Rob and Lisa's non-bowser based use cases.
3) Brief introductory section on goals of the group.

Further comments / contributions are most welcome.

John




_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Apr 11 19:41:14 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTSTy-0002Ti-0H; Tue, 11 Apr 2006 19:41:14 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTSTw-0002Td-Mf
	for dix@ietf.org; Tue, 11 Apr 2006 19:41:12 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTSTu-0002gc-9T
	for dix@ietf.org; Tue, 11 Apr 2006 19:41:12 -0400
Received: from [10.0.1.2] (adsl-69-106-230-221.dsl.pltn13.pacbell.net
	[69.106.230.221]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3BNf6wu072870
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Tue, 11 Apr 2006 16:41:06 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
In-Reply-To: <443B8E1F.0A7A.00E4.0@novell.com>
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
	<443B8E1F.0A7A.00E4.0@novell.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <A9BD329D-4AAC-46D9-8A81-A27283917204@sxip.com>
Content-Transfer-Encoding: 7bit
From: John Merrells <merrells@sxip.com>
Subject: Re: [dix] draft-merrells-use-cases-01
Date: Tue, 11 Apr 2006 16:41:05 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-2.2 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 21c69d3cfc2dd19218717dbe1d974352
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 11-Apr-06, at 10:08 AM, Tom Doman wrote:

> I have a question about use case B3.

Hmm, it's a bit brief isn't it. Maybe it needs to be beefed up.
It should probably suggest that geekdate.com verifies that
Beth does in fact own the identifier she provides.

> What is the "Identifier" being requested by geekdate.com and how  
> did Beth provide it?  She gave consent and the "data" was sent but,  
> what data?

The data is the identifier... and maybe whatever additional data is  
needed to verify that identifier.

> Maybe you're trying to be a bit vague here as in the "Identifier"  
> in B5, B6, etc. to leave it more open but could you perhaps provide  
> some examples of some of Beth's "Identifiers"?

Well there's are multiple possible solutions.
On the list, both URLs and email addresses have been suggested.
draft-merrells-dix suggests URLs, such as:

http:/www.home.com/beth

> I think that would clarify this for me.  I'm assuming that these  
> "Identifiers" are becoming "personas" in later use cases, is this  
> correct?

Yes, B7 introduces this:

Beth wants to have multiple identifiers, for different aspects of  
herself, her personas.
She wants to have a 'home' persona for identity data that she  
releases to her personal sites, such as geeknews.com.
She wants to have a separate 'work' persona for identity data that  
she releases to work-related sites, such as helpdesk.com.
She wants some of her identity data to be the same for her different  
personas, and other data to be different.

John



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 12 07:00:21 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTd58-0006rv-Uf; Wed, 12 Apr 2006 07:00:18 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTd56-0006rq-S3
	for dix@ietf.org; Wed, 12 Apr 2006 07:00:16 -0400
Received: from lucius.provo.novell.com ([137.65.81.172])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTd56-0000YR-Ih
	for dix@ietf.org; Wed, 12 Apr 2006 07:00:16 -0400
Received: from INET-PRV1-MTA by lucius.provo.novell.com
	with Novell_GroupWise; Wed, 12 Apr 2006 05:00:11 -0600
Message-Id: <443D2B8F.A648.00B6.0@novell.com>
X-Mailer: Novell GroupWise Internet Agent 7.0 
Date: Wed, 12 Apr 2006 05:01:27 -0600
From: "Haripriya S" <sharipriya@novell.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] draft-merrells-use-cases-01
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
In-Reply-To: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 244a2fd369eaf00ce6820a760a3de2e8
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

Hi,

The use cases draft made lot of things clearer to me. I went through
the document, and have a few comments. I have not followed the recent
discussions in the list since my membership had some issues, so ignore
if some of my comments are already covered in the list or obvious.

1. B6 and B7 look the same.

2.  B11: The  sentence 'Beth administers her identitier'  is not very
clear? Probably an example using email or URL as an identifier can help
here.

3. B12: (internet cafe case) Should we call out that that she first has
to authenticate with her identity agent?

4. B13: Can we have an example of a simple privacy policy here, so this
becomes clearer?

5. B14: Can the identity agent also do a similar operation if the user
wants to discontinue her relationship with a particular service (should
the agent be able to carry out the deprovisioning/deleting of the user
information stored at the service site)?

6. B16: The identity agent should present the membership claim, not the
user.

7. B21: The relationship of the identity agent to the site acting as
agency for the bank account is not clear. 

8. B27: The last sentence is not very clear. Does it mean "the site can
verify Adam is over 21 but cannot get any other details of Adam
including who he is (anonymous transaction?)"?

9. B29 and B30: I understood these use-cases to mean that a user can
use either the same identifier(B29) or the same claim(B30) to different
sites to enable them to correlate that it is the same user using their
services. Is that a right understanding?

10. Can the user have more than one identity agent? Is this an allowed
scenario, for which use cases are required? Imagine a
organization-recommened identity agent, and a personal choice?

Thanks and Regards,
Haripriya S.
 
>>> John Merrells <merrells@sxip.com> 04/10/06 11:46 PM >>> 

Based on feedback and contributed text I've revised the
draft use cases document.

Added:

1) More browser based use cases. In particular many examples of  
'claims'.
2) Rob and Lisa's non- bowser based use cases.
3) Brief introductory section on goals of the group.

Further comments / contributions are most welcome.

John




_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 12 14:31:58 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTk8B-0004xp-Hg; Wed, 12 Apr 2006 14:31:55 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTk8A-0004xh-7v
	for dix@ietf.org; Wed, 12 Apr 2006 14:31:54 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTk89-00088b-Rs
	for dix@ietf.org; Wed, 12 Apr 2006 14:31:54 -0400
Received: from [192.168.6.212] (dhcp212.sxip.com [192.168.6.212])
	(authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3CIVpLd001623
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Wed, 12 Apr 2006 11:31:51 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
In-Reply-To: <443D2B8F.A648.00B6.0@novell.com>
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
	<443D2B8F.A648.00B6.0@novell.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <B8A41753-00AC-4662-8667-2DAEEE4D86FF@sxip.com>
Content-Transfer-Encoding: 7bit
From: John Merrells <merrells@sxip.com>
Subject: Re: [dix] draft-merrells-use-cases-01
Date: Wed, 12 Apr 2006 11:31:50 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-102.2 required=5.0 tests=AWL,BAYES_00,
	USER_IN_WHITELIST autolearn=ham version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ff03b0075c3fc728d7d60a15b4ee1ad2
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 12-Apr-06, at 4:01 AM, Haripriya S wrote:

> 1. B6 and B7 look the same.

Actually B5 and B6 are identical - oops.

B6 says Beth can share an identifier across multiple sites.

B7 says Beth can have multiple identifiers.

Should I make that clearer?

> 2.  B11: The  sentence 'Beth administers her identitier'  is not very
> clear? Probably an example using email or URL as an identifier can  
> help
> here.

Agreed. I don't want to presuppose the identifier design decision
though, which is why I used the vague term 'administer'. I can't
think of a way around that... 'she does something that makes her
identifier managed by another identity agent'

> 3. B12: (internet cafe case) Should we call out that that she first  
> has
> to authenticate with her identity agent?

In all these cases her identity agent should authenticate her to
ensure she is Beth. I think what you're pointing out is how the
webmail service knows that she is who she says she is? This
is also an issue with B3, which I've added some text to fix. B12
could say....

Her identity agent displays a screen informing her that webmail.com  
is requesting some data, an identifier.
She provides consent and the identifier and identifier verification  
data is sent to the site.
webmail.com uses the verification data to verify that Beth owns the  
identifier her agent provided.


> 4. B13: Can we have an example of a simple privacy policy here, so  
> this
> becomes clearer?

Good idea.

Beth visits a website to purchase some books.
The site requests some identity information, her shipping address.
Her Identity Agent warns her that satisfying the request would  
contravene her established privacy policy.
The website wishes to pass her address to affilliated companies so  
that they may send her valuable promotional offers,
but Beth has a privacy policy that not allow unsolicited mail to be  
sent to her shipping address.

> 5. B14: Can the identity agent also do a similar operation if the user
> wants to discontinue her relationship with a particular service  
> (should
> the agent be able to carry out the deprovisioning/deleting of the user
> information stored at the service site)?

Hmm. Interesting thought. I suspect that most Membersites would
not be interested in implementing deprovisioning/deletion... I guess
the identity agent could send a bunch of null values to the MS. I
need to think about that more.

> 6. B16: The identity agent should present the membership claim, not  
> the
> user.

Thanks.

> 7. B21: The relationship of the identity agent to the site acting as
> agency for the bank account is not clear.

Rewritten.

Beth signs up with a financial services site, BigPicture.com, which  
provides an aggregate view of her finances.
To provide its service BigPicture.com requires access to her existing  
bank accounts.
Beth wishes to securely provide agency rights to BigPicture.com, so  
she acquires the appropriate access tokens from her existing bank  
account providers and stores them with her Identity Agent.
She then presents the access tokens to BigPicture.com so that it can  
access her account data.

Better?

> 8. B27: The last sentence is not very clear. Does it mean "the site  
> can
> verify Adam is over 21 but cannot get any other details of Adam
> including who he is (anonymous transaction?)"?

Yes. Rewritten:

Adam visits a site that requires that he prove he is over 21.
He provides the site with a claim that he is over 21, issues by the  
government of his country of residence, gov.ca.
The claim contains no other information about Adam and the site is  
unable to use the claim to discover more information about Adam.

Clearer?

> 9. B29 and B30: I understood these use-cases to mean that a user can
> use either the same identifier(B29) or the same claim(B30) to  
> different
> sites to enable them to correlate that it is the same user using their
> services. Is that a right understanding?

Yes.

> 10. Can the user have more than one identity agent? Is this an allowed
> scenario, for which use cases are required? Imagine a
> organization-recommened identity agent, and a personal choice?

Yes and yes. I should add a use case that makes that clear.

Thanks for your close reading of the text and your very useful comments.

John


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 12 14:42:41 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTkIa-0001qr-UL; Wed, 12 Apr 2006 14:42:40 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTkIZ-0001qm-LE
	for dix@ietf.org; Wed, 12 Apr 2006 14:42:39 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTkIZ-0000Ct-Bi
	for dix@ietf.org; Wed, 12 Apr 2006 14:42:39 -0400
Received: from [192.168.6.212] (dhcp212.sxip.com [192.168.6.212])
	(authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3CIgbIP001985
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Wed, 12 Apr 2006 11:42:37 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
In-Reply-To: <B8A41753-00AC-4662-8667-2DAEEE4D86FF@sxip.com>
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
	<443D2B8F.A648.00B6.0@novell.com>
	<B8A41753-00AC-4662-8667-2DAEEE4D86FF@sxip.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <2CC138E0-E352-4343-88DD-B63730BAC876@sxip.com>
Content-Transfer-Encoding: 7bit
From: John Merrells <merrells@sxip.com>
Subject: Re: [dix] draft-merrells-use-cases-01
Date: Wed, 12 Apr 2006 11:42:37 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-102.6 required=5.0 tests=BAYES_00, USER_IN_WHITELIST 
	autolearn=ham version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 798b2e660f1819ae38035ac1d8d5e3ab
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 12-Apr-06, at 11:31 AM, John Merrells wrote:

>> 10. Can the user have more than one identity agent? Is this an  
>> allowed
>> scenario, for which use cases are required? Imagine a
>> organization-recommened identity agent, and a personal choice?
>
> Yes and yes. I should add a use case that makes that clear.\

Added:

Beth has many computing devices in her life, running different  
operating systems and different application software.
She makes her own choices about her own computing environment, but  
she has little choice when the software is bundled by the device  
manufacturer or at work where she is subject to her employer's policies.
A consequence is that she has multiple Identity Agents, which she  
uses for managing different personas.

John


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 12 14:52:15 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTkRq-0004fr-Uo; Wed, 12 Apr 2006 14:52:14 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTkRp-0004cE-5B
	for dix@ietf.org; Wed, 12 Apr 2006 14:52:13 -0400
Received: from mx1.redhat.com ([66.187.233.31])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTkRn-0000S5-V1
	for dix@ietf.org; Wed, 12 Apr 2006 14:52:13 -0400
Received: from int-mx1.corp.redhat.com (int-mx1.corp.redhat.com
	[172.16.52.254])
	by mx1.redhat.com (8.12.11.20060308/8.12.11) with ESMTP id
	k3CIqBDL023063 for <dix@ietf.org>; Wed, 12 Apr 2006 14:52:11 -0400
Received: from potter.sfbay.redhat.com (potter.sfbay.redhat.com [172.16.27.15])
	by int-mx1.corp.redhat.com (8.12.11.20060308/8.11.6) with ESMTP id
	k3CIqBfk015111 for <dix@ietf.org>; Wed, 12 Apr 2006 14:52:11 -0400
Received: from [172.16.25.166] (dhcp-172-16-25-166.sfbay.redhat.com
	[172.16.25.166])
	by potter.sfbay.redhat.com (8.12.8/8.12.8) with ESMTP id k3CIqATq021158
	for <dix@ietf.org>; Wed, 12 Apr 2006 14:52:10 -0400
Message-ID: <443D4C54.9060300@redhat.com>
Date: Wed, 12 Apr 2006 11:52:04 -0700
From: Pete Rowley <prowley@redhat.com>
User-Agent: Mozilla Thunderbird 1.0.7-1.1.fc4 (X11/20050929)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] draft-merrells-use-cases-01
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>	<443D2B8F.A648.00B6.0@novell.com>
	<B8A41753-00AC-4662-8667-2DAEEE4D86FF@sxip.com>
In-Reply-To: <B8A41753-00AC-4662-8667-2DAEEE4D86FF@sxip.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f66b12316365a3fe519e75911daf28a8
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1080984943=="
Errors-To: dix-bounces@ietf.org

This is a cryptographically signed message in MIME format.

--===============1080984943==
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature";
	micalg=sha1; boundary="------------ms070109000301070600070601"

This is a cryptographically signed message in MIME format.

--------------ms070109000301070600070601
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

John Merrells wrote:

>
> Agreed. I don't want to presuppose the identifier design decision
> though, which is why I used the vague term 'administer'. I can't
> think of a way around that... 'she does something that makes her
> identifier managed by another identity agent'

She then *delegates* authority for her identifier to her new identity 
agent so that it is authoritative for authentication and provision of 
identity data.

-- 
Pete


--------------ms070109000301070600070601
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms070109000301070600070601--


--===============1080984943==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--===============1080984943==--




From dix-bounces@ietf.org Wed Apr 12 14:53:36 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTkTA-0005d3-G0; Wed, 12 Apr 2006 14:53:36 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTkT9-0005cy-KE
	for dix@ietf.org; Wed, 12 Apr 2006 14:53:35 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTkT9-0000Tf-AQ
	for dix@ietf.org; Wed, 12 Apr 2006 14:53:35 -0400
Received: from [192.168.6.212] (dhcp212.sxip.com [192.168.6.212])
	(authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3CIqmxV002524
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Wed, 12 Apr 2006 11:53:32 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
In-Reply-To: <443D4C54.9060300@redhat.com>
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>	<443D2B8F.A648.00B6.0@novell.com>
	<B8A41753-00AC-4662-8667-2DAEEE4D86FF@sxip.com>
	<443D4C54.9060300@redhat.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <AC0F8C03-6E05-4C42-A26E-DEB35C6D60ED@sxip.com>
Content-Transfer-Encoding: 7bit
From: John Merrells <merrells@sxip.com>
Subject: Re: [dix] draft-merrells-use-cases-01
Date: Wed, 12 Apr 2006 11:53:32 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-102.6 required=5.0 tests=AWL,BAYES_00,
	USER_IN_WHITELIST autolearn=ham version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 79899194edc4f33a41f49410777972f8
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 12-Apr-06, at 11:52 AM, Pete Rowley wrote:

> John Merrells wrote:
>
>>
>> Agreed. I don't want to presuppose the identifier design decision
>> though, which is why I used the vague term 'administer'. I can't
>> think of a way around that... 'she does something that makes her
>> identifier managed by another identity agent'
>
> She then *delegates* authority for her identifier to her new  
> identity agent so that it is authoritative for authentication and  
> provision of identity data.

Yeah! Nice.

John



_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 12 15:00:38 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTkZx-00015m-QT; Wed, 12 Apr 2006 15:00:37 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTkZw-00015h-S7
	for dix@ietf.org; Wed, 12 Apr 2006 15:00:36 -0400
Received: from zproxy.gmail.com ([64.233.162.199])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTkZs-0000hC-K0
	for dix@ietf.org; Wed, 12 Apr 2006 15:00:36 -0400
Received: by zproxy.gmail.com with SMTP id x3so1424643nzd
	for <dix@ietf.org>; Wed, 12 Apr 2006 12:00:32 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com;
	h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:content-disposition:references;
	b=SYZtWFwZRqnWo+s9mBgeX7VnOvY7gMfBdHusW78FqeOdLI42bkqZwJPid5yQhzKIOSpCg2pj/aqxza2tGtG4t9sZwFIkZZBuM70VP9OBF/HZuZZzTUL66EL00KcKodal63d6ZZU42Fcjn5Eg5ZYs+X5MRX4HRM6+GP/hj8Esagg=
Received: by 10.36.251.16 with SMTP id y16mr1893352nzh;
	Wed, 12 Apr 2006 12:00:32 -0700 (PDT)
Received: by 10.36.178.1 with HTTP; Wed, 12 Apr 2006 12:00:31 -0700 (PDT)
Message-ID: <a9699fd20604121200x22ff8b4bi9ce41d884ba75188@mail.gmail.com>
Date: Wed, 12 Apr 2006 21:00:32 +0200
From: "Thomas Broyer" <t.broyer@gmail.com>
To: "Digital Identity Exchange" <dix@ietf.org>
Subject: Re: [dix] draft-merrells-use-cases-01
In-Reply-To: <2CC138E0-E352-4343-88DD-B63730BAC876@sxip.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=WINDOWS-1252
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
	<443D2B8F.A648.00B6.0@novell.com>
	<B8A41753-00AC-4662-8667-2DAEEE4D86FF@sxip.com>
	<2CC138E0-E352-4343-88DD-B63730BAC876@sxip.com>
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7baded97d9887f7a0c7e8a33c2e3ea1b
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

2006/4/12, John Merrells <merrells@sxip.com>:
> >> 10. Can the user have more than one identity agent? Is this an
> >> allowed scenario, for which use cases are required? Imagine a
> >> organization-recommened identity agent, and a personal choice?
> >
> > Yes and yes. I should add a use case that makes that clear.\
>
> Added:
>
> Beth has many computing devices in her life, running different
> operating systems and different application software.
> She makes her own choices about her own computing environment, but
> she has little choice when the software is bundled by the device
> manufacturer or at work where she is subject to her employer's policies.
> A consequence is that she has multiple Identity Agents, which she
> uses for managing different personas.

I first thought that the Identity Agent were a web-based service, not
some piece of software you would have to install on your "computing
device".
This is:
 - what's done today by other distributed identity systems (OpenID,
LID, Passport, etc.)
 - what's suggested by draft-merrells-dix-00 and -01

How about the "cyber caf=E9" use case? How does Beth acceed her
identities and personnas if the Identity Agent is a "local" piece of
software and not a web-based service?

I also think the protocol must have a "dumb, web-based" profile =E0 la
OpenID or LID, using HTTP redirects combined with basic HTTP-Auth ; a
profile for using web-based services from a "bare" computer (e.g. in a
cyber caf=E9, where you cannot install anything, or a mobile device with
limited capabilities and extensibility =96e.g. a mobile phone=96). I think
SAML also has such a profile.

This is IMO a requirement for a distributed identity system.

--
Thomas Broyer

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 12 15:17:39 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTkqQ-0006xO-Rf; Wed, 12 Apr 2006 15:17:38 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTkqP-0006xJ-QM
	for dix@ietf.org; Wed, 12 Apr 2006 15:17:37 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTkqP-0001TS-Fb
	for dix@ietf.org; Wed, 12 Apr 2006 15:17:37 -0400
Received: from [192.168.6.212] (dhcp212.sxip.com [192.168.6.212])
	(authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3CJHXDG003398
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Wed, 12 Apr 2006 12:17:34 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
In-Reply-To: <a9699fd20604121200x22ff8b4bi9ce41d884ba75188@mail.gmail.com>
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
	<443D2B8F.A648.00B6.0@novell.com>
	<B8A41753-00AC-4662-8667-2DAEEE4D86FF@sxip.com>
	<2CC138E0-E352-4343-88DD-B63730BAC876@sxip.com>
	<a9699fd20604121200x22ff8b4bi9ce41d884ba75188@mail.gmail.com>
Content-Type: text/plain; charset=WINDOWS-1252; delsp=yes; format=flowed
Message-Id: <AA169261-70C3-4D58-A634-F072C70CD089@sxip.com>
Content-Transfer-Encoding: quoted-printable
From: John Merrells <merrells@sxip.com>
Subject: Re: [dix] draft-merrells-use-cases-01
Date: Wed, 12 Apr 2006 12:17:17 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-102.6 required=5.0 tests=BAYES_00, USER_IN_WHITELIST 
	autolearn=ham version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 02ec665d00de228c50c93ed6b5e4fc1a
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 12-Apr-06, at 12:00 PM, Thomas Broyer wrote:

> I first thought that the Identity Agent were a web-based service, not
> some piece of software you would have to install on your "computing
> device".

 From Beth's perspective the agent software could be either local or
remote.

I think my use case went too far in making it sound like local software.

> This is:
>  - what's done today by other distributed identity systems (OpenID,
> LID, Passport, etc.)

Indeed.

You could argue that Infocard solves many of these usecases with
local software.

>  - what's suggested by draft-merrells-dix-00 and -01

Correct. dmd1 is focused on the existing browser case. Building on
dmd1 you could devise smarter clients that provided Beth with a
better experience.

> How about the "cyber caf=E9" use case? How does Beth acceed her
> identities and personnas if the Identity Agent is a "local" piece of
> software and not a web-based service?

We're getting into implementation here, but yes it could be a remote
service, or it could be in something that Beth carries around with her.

> I also think the protocol must have a "dumb, web-based" profile =E0 la
> OpenID or LID, using HTTP redirects combined with basic HTTP-Auth ; a
> profile for using web-based services from a "bare" computer (e.g. in a
> cyber caf=E9, where you cannot install anything, or a mobile device with
> limited capabilities and extensibility =96e.g. a mobile phone=96). I think
> SAML also has such a profile.
> This is IMO a requirement for a distributed identity system.

I think we're all in agreement.

Clearer? Less device oriented...

<section title=3D"B34"><t>
Beth has many computing environments in her life, running different=20=20
operating systems and different application software.
She makes her own choices about her own computing environment, but=20=20
she has little choice when the software is within a device or when=20=20
she's at work, where she is subject to her employer's policies.
A consequence is that she uses multiple Identity Agents, which she=20=20
uses for managing different personas.
</t>

The first two sentences are just motivation... the last line is the=20=20
important statement.

John


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 12 17:05:08 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTmWR-0003nd-M7; Wed, 12 Apr 2006 17:05:07 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTmWQ-0003nY-Ix
	for dix@ietf.org; Wed, 12 Apr 2006 17:05:06 -0400
Received: from laweleka.osafoundation.org ([204.152.186.98])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTmWQ-00087y-6y
	for dix@ietf.org; Wed, 12 Apr 2006 17:05:06 -0400
Received: from localhost (localhost [127.0.0.1])
	by laweleka.osafoundation.org (Postfix) with ESMTP id 41A30142277
	for <dix@ietf.org>; Wed, 12 Apr 2006 14:05:05 -0700 (PDT)
Received: from laweleka.osafoundation.org ([127.0.0.1])
	by localhost (laweleka.osafoundation.org [127.0.0.1]) (amavisd-new,
	port 10024) with ESMTP id 05194-01 for <dix@ietf.org>;
	Wed, 12 Apr 2006 14:05:04 -0700 (PDT)
Received: from [192.168.1.100] (c-67-161-46-163.hsd1.ca.comcast.net
	[67.161.46.163]) (using TLSv1 with cipher RC4-SHA (128/128 bits))
	(No client certificate requested)
	by laweleka.osafoundation.org (Postfix) with ESMTP id 8E8BB14226E
	for <dix@ietf.org>; Wed, 12 Apr 2006 14:05:04 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v746.2)
In-Reply-To: <Pine.LNX.4.63.0603241241280.10659@perf.cac.washington.edu>
References: <C048499A.12238%peter.davis@neustar.biz>
	<Pine.LNX.4.63.0603240023190.24346@perf.cac.washington.edu>
	<EB815417-62D7-4EF1-8413-5FD83065546F@netmesh.us>
	<Pine.LNX.4.63.0603241241280.10659@perf.cac.washington.edu>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <3322896C-F52B-490C-8813-D0686B25E621@osafoundation.org>
Content-Transfer-Encoding: 7bit
From: Lisa Dusseault <lisa@osafoundation.org>
Subject: Re: Various User Agent Support (was: Re: [dix] DIX use cases)
Date: Wed, 12 Apr 2006 14:04:58 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.746.2)
X-Virus-Scanned: by amavisd-new and clamav at osafoundation.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On Mar 24, 2006, at 12:57 PM, RL 'Bob' Morgan wrote:

>
>> FYI: Yadis and LID were explicitly designed to be usable by  
>> software that doesn't have a GUI, and OpenID can be used that way  
>> as well.
>
> Another thing that might be said here is that there's nothing in  
> the SAML web browser profiles that requires a UI either.  Though  
> the fact that identity-provider discovery is not covered in those  
> profiles (except for the Common Domain Cookie approach which is not  
> broadly applicable) does mean that in some deployments (not all by  
> any means) a UI is used to do discovery.  The YADIS discovery  
> method could well be used to initiate a SAML web browser profile  
> flow too (and I think some people might even be working on how to  
> do this).
>
> But the SAML browser profiles do require browser features that tend  
> not to be found in other HTTP user agents, or to put it in more of  
> standards way, are not required to be in them for compliance with  
> the HTTP-based spec they are implementing.  It is my impression  
> that these specs (eg WebDAV) aren't actually very specific about  
> which HTTP user agent features are mandatory (though I could be  
> wrong about that), which if true may need fixing.

In the next version of WebDAV (just went through WG last call  
recently so maybe it's almost done),  we attempt to be more specific  
about which HTTP features are mandatory, though some of our  
discussions were inconclusive so we didn't add more restrictions in  
every case.

Related to authentication, we required Digest support even in  
RFC2518, so that didn't change.

There wouldn't be much of a chance at all to require HTML or forms  
support -- which isn't even required of browsers.  Heh.

Lisa

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Apr 13 00:56:32 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FTtsc-0000ZP-L4; Thu, 13 Apr 2006 00:56:30 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FTtsb-0000Yd-Vn
	for dix@ietf.org; Thu, 13 Apr 2006 00:56:29 -0400
Received: from public.id2-vpn.continvity.gns.novell.com ([195.33.99.129]
	helo=gwia-smtp.id2.novell.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FTtsa-0005Sk-Jj
	for dix@ietf.org; Thu, 13 Apr 2006 00:56:29 -0400
Received: from [192.168.1.2] (l4-client.id2.novell.com [::ffff:149.44.117.251])
	by gwia-smtp.id2.novell.com with ESMTP (TLS encrypted);
	Thu, 13 Apr 2006 05:56:11 +0100
Message-ID: <443DDA2C.1030709@novell.com>
Date: Thu, 13 Apr 2006 10:27:16 +0530
From: Jaimon Jose <jjaimon@novell.com>
User-Agent: Thunderbird 1.5 (X11/20051201)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>,  merrells@sxip.com
Subject: Re: [dix] draft-merrells-use-cases-01
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
In-Reply-To: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 21c69d3cfc2dd19218717dbe1d974352
Cc: 
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: jjaimon@novell.com, Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

John,
John Merrells wrote the following on 04/10/2006 11:46 PM:
> Based on feedback and contributed text I've revised the
> draft use cases document.
>
> Added:
>
> 1) More browser based use cases. In particular many examples of 'claims'.
> 2) Rob and Lisa's non-bowser based use cases.
> 3) Brief introductory section on goals of the group.
>
> Further comments / contributions are most welcome.
It was a good idea to have a use cases document.  It makes things
clearer for the ongoing discussions.

I have few clarifications/comments on the use cases..
B12 - Where does the agent live?  B8 states that the agent is integrated
to Operating system.  If so, can we expect the agent will be available
even in a computer in the internet caf'e?  ( or Is it left to the
implementation of the agent? ). 
Where does the agent get Beths identity data?  Is it stored remote or
something that she can carry around with her?  If so, how does she
transfer it to the agent? ( usb, smartcard or something simiar?  Is it
again implementation specific? )

B17.  A mention of how identity agent can be administered will be good. 
For eg.  how does she inform the agent if she switches the insurance
provider?

B19.  This is use case suggests that the identity data may be stored
remote so that any device can retrieve the data.  The same adds a
constraint that user needs to have access to online identity data
always.  This may be difficult if the agent is expected to acquire the
claim and present to local applications in her computer ( for eg. local
mails ) while she is not connected through her ISP.


B27&B28.  Not very clear on what we are trying to convey here in the
context of identity agent.  It appears to be the current problem if the
site doesn't store a cookie when Adam visited first time.. ( I may be
missing something. )

Thanks
--jaimon

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Apr 13 13:20:36 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FU5Uh-0008Dq-QH; Thu, 13 Apr 2006 13:20:35 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FU5Uh-0008Dl-7w
	for dix@ietf.org; Thu, 13 Apr 2006 13:20:35 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FU5Ug-0003wG-TG
	for dix@ietf.org; Thu, 13 Apr 2006 13:20:35 -0400
Received: from [192.168.6.212] (dhcp212.sxip.com [192.168.6.212])
	(authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3DHKXGd037906
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT);
	Thu, 13 Apr 2006 10:20:33 -0700 (PDT)
	(envelope-from merrells@sxip.com)
In-Reply-To: <443DDA2C.1030709@novell.com>
References: <E774B7FB-CC08-41C2-91B0-D16F221D5CB5@sxip.com>
	<443DDA2C.1030709@novell.com>
Mime-Version: 1.0 (Apple Message framework v749.3)
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <76B59567-BB64-4685-9FB6-572D5D44AE34@sxip.com>
Content-Transfer-Encoding: 7bit
From: John Merrells <merrells@sxip.com>
Subject: Re: [dix] draft-merrells-use-cases-01
Date: Thu, 13 Apr 2006 10:20:33 -0700
To: jjaimon@novell.com
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-102.6 required=5.0 tests=BAYES_00, USER_IN_WHITELIST 
	autolearn=ham version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 082a9cbf4d599f360ac7f815372a6a15
Cc: Digital Identity Exchange <dix@ietf.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


Thanks for your comments.

On 12-Apr-06, at 9:57 PM, Jaimon Jose wrote:

> I have few clarifications/comments on the use cases..
> B12 - Where does the agent live?  B8 states that the agent is  
> integrated
> to Operating system.  If so, can we expect the agent will be available
> even in a computer in the internet caf'e?  ( or Is it left to the
> implementation of the agent? ).
> Where does the agent get Beths identity data?  Is it stored remote or
> something that she can carry around with her?  If so, how does she
> transfer it to the agent? ( usb, smartcard or something simiar?  Is it
> again implementation specific? )

That's all implementation specific stuff. An identity agent could be a
service in the sky, on her computer, on a device she carries about
with her or where ever.

> B17.  A mention of how identity agent can be administered will be  
> good.
> For eg.  how does she inform the agent if she switches the insurance
> provider?

That's implementation specific too. I nice identity agent would make
Beth's life as easy as possible. In the use case I'm trying to get over
the idea that a membersite can request a claim that Beth does not
have and she has to acquire one from somewhere.

> B19.  This is use case suggests that the identity data may be stored
> remote so that any device can retrieve the data.  The same adds a
> constraint that user needs to have access to online identity data
> always.  This may be difficult if the agent is expected to acquire the
> claim and present to local applications in her computer ( for eg.  
> local
> mails ) while she is not connected through her ISP.

Again implementation specific. Beth's phone could access the remote
data or the data could be local, or both. Beth could have sync'd her
phone before she left the office so has a local snapshot of her
identity data.

> B27&B28.  Not very clear on what we are trying to convey here in the
> context of identity agent.  It appears to be the current problem if  
> the
> site doesn't store a cookie when Adam visited first time.. ( I may be
> missing something. )

B27 and B28 motivate the design of claims, rather than an identity
agent.

All your questions seem to be from the viewpoint of how would one
design and build an identity agent. That's not what these use cases
were written to address. What we need to standardize is the protocol
that the parties talk and to some extend the format of the stuff that's
moved between them.

John




_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Apr 18 00:24:12 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVhl0-0002Yv-2Z; Tue, 18 Apr 2006 00:24:06 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVhhj-0001QC-GY
	for dix@ietf.org; Tue, 18 Apr 2006 00:20:43 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVhhg-0002NV-7m
	for dix@ietf.org; Tue, 18 Apr 2006 00:20:43 -0400
Received: from [192.168.1.66] (adsl-69-106-251-0.dsl.pltn13.pacbell.net
	[69.106.251.0]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3I4KUdT096790
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Mon, 17 Apr 2006 21:20:30 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
To: Digital Identity Exchange <dix@ietf.org>
Message-Id: <BD240299-9541-4724-9293-A1A727958C5F@sxip.com>
Content-Type: multipart/mixed; boundary=Apple-Mail-11--476896285
From: John Merrells <merrells@sxip.com>
Date: Mon, 17 Apr 2006 21:20:28 -0700
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-0.2 required=5.0 tests=AWL,BAYES_00,HTML_50_60,
	HTML_MESSAGE,URIBL_OB_SURBL,URIBL_SBL autolearn=no version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 9e853307a9b954b689e7e27ead420458
X-Mailman-Approved-At: Tue, 18 Apr 2006 00:24:04 -0400
Subject: [dix] draft-merrells-use-cases-02
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

--Apple-Mail-11--476896285
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=US-ASCII;
	delsp=yes;
	format=flowed


Here's an update to the use cases draft that incorporates the  
comments on the list over the past week.

John



--Apple-Mail-11--476896285
Content-Transfer-Encoding: 7bit
Content-Type: text/html; x-unix-mode=0644;
	name="draft-merrells-use-cases-02.html"
Content-Disposition: attachment;
	filename=draft-merrells-use-cases-02.html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en"><head><title>Digital Identity Exchange - Use Cases</title>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="description" content="Digital Identity Exchange - Use Cases">
<meta name="generator" content="xml2rfc v1.30 (http://xml.resource.org/)">
<style type='text/css'>
<!--
    body {
        font-family: verdana, charcoal, helvetica, arial, sans-serif;
        margin: 2em;
        font-size: small ; color: #000000 ; background-color: #ffffff ; }
    .title { color: #990000; font-size: x-large ;
        font-weight: bold; text-align: right;
        font-family: helvetica, monaco, "MS Sans Serif", arial, sans-serif;
        background-color: transparent; }
    .filename { color: #666666; font-size: 18px; line-height: 28px;
        font-weight: bold; text-align: right;
        font-family: helvetica, arial, sans-serif;
        background-color: transparent; }
    td.rfcbug { background-color: #000000 ; width: 30px ; height: 30px ;
        text-align: justify; vertical-align: middle ; padding-top: 2px ; }
    td.rfcbug span.RFC { color: #666666; font-weight: bold; text-decoration: none;
        background-color: #000000 ;
        font-family: monaco, charcoal, geneva, "MS Sans Serif", helvetica, verdana, sans-serif;
        font-size: x-small ; }
    td.rfcbug span.hotText { color: #ffffff; font-weight: normal; text-decoration: none;
        text-align: center ;
        font-family: charcoal, monaco, geneva, "MS Sans Serif", helvetica, verdana, sans-serif;
        font-size: x-small ; background-color: #000000; }
    /* info code from SantaKlauss at http://www.madaboutstyle.com/tooltip2.html */
    div#counter{margin-top: 100px}

    a.info{
        position:relative; /*this is the key*/
        z-index:24;
        text-decoration:none}

    a.info:hover{z-index:25; background-color:#990000 ; color: #ffffff ;}

    a.info span{display: none}

    a.info:hover span.info{ /*the span will display just on :hover state*/
        display:block;
        position:absolute;
        font-size: smaller ;
        top:2em; left:2em; width:15em;
        padding: 2px ;
        border:1px solid #333333;
        background-color:#eeeeee; color:#990000;
        text-align: left ;}

     A { font-weight: bold; }
     A:link { color: #990000; background-color: transparent ; }
     A:visited { color: #333333; background-color: transparent ; }
     A:active { color: #333333; background-color: transparent ; }

    p { margin-left: 2em; margin-right: 2em; }
    p.copyright { font-size: x-small ; }
    p.toc { font-size: small ; font-weight: bold ; margin-left: 3em ;}
    table.toc { margin: 0 0 0 3em; padding: 0; border: 0; vertical-align: text-top; }
    td.toc { font-size: small; font-weight: bold; vertical-align: text-top; }

    span.emph { font-style: italic; }
    span.strong { font-weight: bold; }
    span.verb, span.vbare { font-family: "Courier New", Courier, monospace ; }

    span.vemph { font-style: italic; font-family: "Courier New", Courier, monospace ; }
    span.vstrong { font-weight: bold; font-family: "Courier New", Courier, monospace ; }
    span.vdeluxe { font-weight: bold; font-style: italic; font-family: "Courier New", Courier, monospace ; }

    ol.text { margin-left: 2em; margin-right: 2em; }
    ul.text { margin-left: 2em; margin-right: 2em; }
    li { margin-left: 3em;  }

    pre { margin-left: 3em; color: #333333;  background-color: transparent;
        font-family: "Courier New", Courier, monospace ; font-size: small ;
        text-align: left;
        }

    h3 { color: #333333; font-size: medium ;
        font-family: helvetica, arial, sans-serif ;
        background-color: transparent; }
    h4 { font-size: small; font-family: helvetica, arial, sans-serif ; }

    table.bug { width: 30px ; height: 15px ; }
    td.bug { color: #ffffff ; background-color: #990000 ;
        text-align: center ; width: 30px ; height: 15px ;
         }
    td.bug A.link2 { color: #ffffff ; font-weight: bold;
        text-decoration: none;
        font-family: monaco, charcoal, geneva, "MS Sans Serif", helvetica, sans-serif;
        font-size: x-small ; background-color: transparent }

    td.header { color: #ffffff; font-size: x-small ;
        font-family: arial, helvetica, sans-serif; vertical-align: top;
        background-color: #666666 ; width: 33% ; }
    td.author { font-weight: bold; margin-left: 4em; font-size: x-small ; }
    td.author-text { font-size: x-small; }
    table.full { vertical-align: top ; border-collapse: collapse ;
        border-style: solid solid solid solid ;
        border-color: black black black black ;
        font-size: small ; text-align: center ; }
    table.headers, table.none { vertical-align: top ; border-collapse: collapse ;
        border-style: none;
        font-size: small ; text-align: center ; }
    table.full th { font-weight: bold ;
        border-style: solid ;
        border-color: black black black black ; }
    table.headers th { font-weight: bold ;
        border-style: none none solid none;
        border-color: black black black black ; }
    table.none th { font-weight: bold ;
        border-style: none; }
    table.full td {
        border-style: solid solid solid solid ;
        border-color: #333333 #333333 #333333 #333333 ; }
    table.headers td, table.none td { border-style: none; }

    hr { height: 1px }
-->
</style>
</head>
<body>
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<table summary="layout" width="66%" border="0" cellpadding="0" cellspacing="0"><tr><td><table summary="layout" width="100%" border="0" cellpadding="2" cellspacing="1">
<tr><td class="header">Network Working Group</td><td class="header">J. Merrells</td></tr>
<tr><td class="header">Internet-Draft</td><td class="header">Sxip Identity</td></tr>
<tr><td class="header">Expires: September 2, 2006</td><td class="header">March 2006</td></tr>
</table></td></tr></table>
<div align="right"><span class="title"><br />Digital Identity Exchange - Use Cases</span></div>
<div align="right"><span class="title"><br />draft-merrells-use-cases-02.txt</span></div>

<h3>Status of this Memo</h3>
<p>
By submitting this Internet-Draft,
each author represents that any applicable patent or other IPR claims of which
he or she is aware have been or will be disclosed,
and any of which he or she becomes aware will be disclosed,
in accordance with Section&nbsp;6 of BCP&nbsp;79.</p>
<p>
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups.
Note that other groups may also distribute working documents as
Internet-Drafts.</p>
<p>
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any time.
It is inappropriate to use Internet-Drafts as reference material or to cite
them other than as &ldquo;work in progress.&rdquo;</p>
<p>
The list of current Internet-Drafts can be accessed at
<a href='http://www.ietf.org/ietf/1id-abstracts.txt'>http://www.ietf.org/ietf/1id-abstracts.txt</a>.</p>
<p>
The list of Internet-Draft Shadow Directories can be accessed at
<a href='http://www.ietf.org/shadow.html'>http://www.ietf.org/shadow.html</a>.</p>
<p>
This Internet-Draft will expire on September 2, 2006.</p>

<h3>Copyright Notice</h3>
<p>
Copyright &copy; The Internet Society (2006).</p>

<h3>Abstract</h3>

<p>This document describes the motivating use cases 
		for DIX, the Digital Identity Exchange protocol.
</p><a name="toc"></a><br /><hr />
<h3>Table of Contents</h3>
<p class="toc">
<a href="#anchor1">1.</a>&nbsp;
Requirements notation<br />
<a href="#anchor2">2.</a>&nbsp;
Introduction<br />
<a href="#anchor3">3.</a>&nbsp;
Goals<br />
<a href="#anchor4">4.</a>&nbsp;
Definitions<br />
<a href="#anchor5">5.</a>&nbsp;
Browser Based Use Cases<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor6">5.1.</a>&nbsp;
B1<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor7">5.2.</a>&nbsp;
B2<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor8">5.3.</a>&nbsp;
B3<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor9">5.4.</a>&nbsp;
B4<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor10">5.5.</a>&nbsp;
B5<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor11">5.6.</a>&nbsp;
B6<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor12">5.7.</a>&nbsp;
B7<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor13">5.8.</a>&nbsp;
B8<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor14">5.9.</a>&nbsp;
B9<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor15">5.10.</a>&nbsp;
B10<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor16">5.11.</a>&nbsp;
B11<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor17">5.12.</a>&nbsp;
B12<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor18">5.13.</a>&nbsp;
B13<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor19">5.14.</a>&nbsp;
B14<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor20">5.15.</a>&nbsp;
B15<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor21">5.16.</a>&nbsp;
B16<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor22">5.17.</a>&nbsp;
B17<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor23">5.18.</a>&nbsp;
B18<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor24">5.19.</a>&nbsp;
B19<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor25">5.20.</a>&nbsp;
B20<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor26">5.21.</a>&nbsp;
B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor27">5.22.</a>&nbsp;
B22<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor28">5.23.</a>&nbsp;
B23<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor29">5.24.</a>&nbsp;
B24<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor30">5.25.</a>&nbsp;
B25<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor31">5.26.</a>&nbsp;
B26<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor32">5.27.</a>&nbsp;
B27<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor33">5.28.</a>&nbsp;
B28<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor34">5.29.</a>&nbsp;
B29<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor35">5.30.</a>&nbsp;
B30<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor36">5.31.</a>&nbsp;
B31<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor37">5.32.</a>&nbsp;
B32<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor38">5.33.</a>&nbsp;
B33<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor39">5.34.</a>&nbsp;
B34<br />
<a href="#anchor40">6.</a>&nbsp;
Non Browser Based Use Cases<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor41">6.1.</a>&nbsp;
NB1 - REST<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor42">6.2.</a>&nbsp;
NB2<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor43">6.3.</a>&nbsp;
NB3 - WebDAV<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor44">6.4.</a>&nbsp;
NB4 - AtomPub<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor45">6.5.</a>&nbsp;
NB5 - XCAP and SIMPLE<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor46">6.6.</a>&nbsp;
NB6 - CalDAV<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor47">6.7.</a>&nbsp;
NB7 - IMAP/POP3 and CalDAV<br />
&nbsp;&nbsp;&nbsp;&nbsp;<a href="#anchor48">6.8.</a>&nbsp;
NB8 - RSS, Web, and CalDAV<br />
<a href="#anchor49">7.</a>&nbsp;
Acknowledgements<br />
<a href="#anchor50">8.</a>&nbsp;
Security Considerations<br />
<a href="#rfc.references1">9.</a>&nbsp;
References<br />
<a href="#rfc.authors">&#167;</a>&nbsp;
Author's Address<br />
<a href="#rfc.copyright">&#167;</a>&nbsp;
Intellectual Property and Copyright Statements<br />
</p>
<br clear="all" />

<a name="anchor1"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.1"></a><h3>1.&nbsp;Requirements notation</h3>

<p>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL",
            "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
            and "OPTIONAL" in this document are to be interpreted as
            described in <a class="info" href="#RFC2119">[RFC2119]<span> (</span><span class="info">Bradner, S., &ldquo;Key words for use in RFCs to Indicate Requirement Levels,&rdquo; March&nbsp;1997.</span><span>)</span></a>.
</p>
<a name="anchor2"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.2"></a><h3>2.&nbsp;Introduction</h3>

<p>The use cases below describe various scenarios for the Digital Identity Exchnage (DIX) protocol <a class="info" href="#dmd1">[dmd1]<span> (</span><span class="info">Merrells, J., &ldquo;draft-merrells-dix-01.txt,&rdquo; March&nbsp;2006.</span><span>)</span></a>.
</p>
<a name="anchor3"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.3"></a><h3>3.&nbsp;Goals</h3>

<p>
	The goals of the protocol are:

    </p>
<blockquote class="text"><dl>
<dt>Identity Information Exchange:</dt>
<dd>

            <br />
 

The primary goal of any DIX protocol is to automate the exchange of Identity Information over the Internet.

            <br />
<br />

        
</dd>
<dt>Ease of Adoption:</dt>
<dd>

            <br />
 

Any DIX protocol must provide the lowest possible barriers to adoption to ensure wide-spread usage of the protocol. 

            <br />
<br />

        
</dd>
<dt>Internet Scale:</dt>
<dd>

            <br />
 

Any DIX protocol must provide an Internet scale solution to identity information exchange.

            <br />
<br />

        
</dd>
<dt>Privacy:</dt>
<dd>

            <br />
 

Any DIX protocol must ensure that all aspects of user privacy can be maintained.

            <br />
<br />

        
</dd>
</dl></blockquote><p>

</p>
<a name="anchor4"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.4"></a><h3>4.&nbsp;Definitions</h3>

<p>
The following terms and their definitions are drawn from the lexicon of 'The Identity gang', a community of thought leaders in the user-centric digital identity space. <a class="info" href="#identitygang">[identitygang]<span> (</span><span class="info">The Identity Gang, &ldquo;http://identitygang.org/Lexicon,&rdquo; March&nbsp;2006.</span><span>)</span></a>.
</p>
<blockquote class="text"><dl>
<dt></dt>
<dd>Digital Identity - The transmission of digital representation of a set of Claims made by one Party about itself or another Digital Subject, to one or more other Parties.
</dd>
<dt></dt>
<dd>Identity Agent - An agent acting on behalf of the user.
</dd>
<dt></dt>
<dd>Identifier - An identifying attribute for a set of attributes.
</dd>
<dt></dt>
<dd>Identity Data / Identity Information - A set of attributes.
</dd>
<dt></dt>
<dd>Claim - An assertion made by a Claimant of the value or values of one or more attributes of a Digital Subject, typically an assertion which is disputed or in doubt.
</dd>
</dl></blockquote><p>


</p>
<a name="anchor5"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5"></a><h3>5.&nbsp;Browser Based Use Cases</h3>

<p>
Some use cases are dependent upon others, so should be perused in order. 
Beth is our protagonist throughout; a typical Internet user, but she's a bit of a geek.

</p>
<a name="anchor6"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.1"></a><h3>5.1.&nbsp;B1</h3>

<p>Beth receives an email from a friend introducing her to a new website, geeknews.com, a techie news site. 
She wishes to sign up so that she can read some articles. She sees an IN button, which she clicks. 
Her identity agent displays a screen informing her that geeknews.com is requesting some data, her first name. 
She enters 'Beth' at the prompt, provides consent and the data is sent to the site. 
</p>
<a name="anchor7"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.2"></a><h3>5.2.&nbsp;B2</h3>

<p>
Beth browses to geekdate.com, she clicks an IN button. 
Her identity agent informs her that geekdate.com is requesting some data, her first name. 
Her agent already has this data. 
She provides consent and the data is sent to the site.

</p>
<a name="anchor8"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.3"></a><h3>5.3.&nbsp;B3</h3>

<p>
Beth decides to create a profile at geekdate.com. 
She sees an IN button, which she clicks. 
Her identity agent displays a screen informing her that geekdate.com is requesting some data, an identifier. 
She provides consent and the identifier and identifier verification data is sent to the site.
Geekdate.com uses the verification data to verify that Beth owns the identifier her agent provided.  

</p>
<a name="anchor9"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.4"></a><h3>5.4.&nbsp;B4</h3>

<p>
Beth decides to create a new profile at geekdate.com.  She sees an IN
button, which she clicks.  Her identity agent displays a screen
informing her that geekdate.com is requesting some data, an
Identifier.  She instructs her identity agent to create an identifier
specific to her relationship with geekdate.com.  She provides consent
and the data is sent to the site.

</p>
<a name="anchor10"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.5"></a><h3>5.5.&nbsp;B5</h3>

<p>
Beth decides to flesh out her profile at geekdate.com. 
Geekdate.com displays a registration form. 
One field requests a URL of a photo of her. 
Beside it is a SAVE button. 
She enters the URL and clicks the button.  
Her identity agent displays a screen informing her that this data item can be stored. 
She decides that she wants to be able to provide that data to other sites.
She provides consent and the data is stored by her agent. 

</p>
<a name="anchor11"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.6"></a><h3>5.6.&nbsp;B6</h3>

<p>
Geeknews.com offers Beth the option to build up a readership preferences profile over time, the benefit being that the site will tailor its content to her interests. 
She decides to take up the offer, she sees an IN button, which she clicks. 
Her identity agent informs her that geeknews.com is requesting some data, an Identifier. 
She selects an existing identifier that represents a subset of her identity, which is used for a subset of the sites she has a relationship with.
She provides consent and the data is sent to the site.  

</p>
<a name="anchor12"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.7"></a><h3>5.7.&nbsp;B7</h3>

<p>
Beth wants to have multiple identifiers, for different aspects of herself, her personas.
She wants to have a 'home' persona for identity data that she releases to her personal sites, such as geeknews.com.
She wants to have a separate 'work' persona for identity data that she releases to work-related sites, such as helpdesk.com.
She wants some of her identity data to be the same for her different personas, and other data to be different. 

</p>
<a name="anchor13"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.8"></a><h3>5.8.&nbsp;B8</h3>

<p>
[Assumptions: Beth has visited geeknews and geekdate before and has informed her identity agent that she consents to a relationship with them.]
Beth starts her day with a strong coffee and a perusal of geeknews.com. 
She starts her computer and authenticates herself to the operating system. 
By that authentication mechanism she has also authenticated herself to her identity agent, as her vendor of that system has hooked it into the operating system's authentication system. 
She browses to geeknews.com and clicks the IN button and is directly shown the content, no further clicks. 
She then browses to geekdate.com, she clicks the IN button and is directly presented with her profile no further clicks. 

</p>
<a name="anchor14"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.9"></a><h3>5.9.&nbsp;B9</h3>

<p>
Beth's identity agent prompts her to provide a 'spoken name'. 
Using the multimedia capabilities of her computer she records her spoken name; an mp3 of her saying 'Beth'. 
She later browses to voicebox.com, which runs a voicemail service, she opts to create an account and the site requests some properties, amongst which is a request for her spoken name. 
She provides consent and the data is sent to the site.  

</p>
<a name="anchor15"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.10"></a><h3>5.10.&nbsp;B10</h3>

<p>
Beth purchases a book from an online store, as she's checking out the store makes her an offer: 10% off for completion of a demographic survey. 
She's tempted, but how many data fields are there? 
One hundred!  Too many to be worth the effort.
But it happens to be commonly requested data, which she has already entered during previous exchanges with other sites. 
So, she completes the remaining fields, saving them to her identity agent for future reuse. 
She provides consent and the data is sent to the site.  

</p>
<a name="anchor16"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.11"></a><h3>5.11.&nbsp;B11</h3>

<p>
Beth has invested significant effort in building up a persona and reputation around a specific identifier, her 'home' identifier. 
But, she has become dissatisfied with her identity agent and so decides to switch vendors. 
She establishes a new agent and migrates her identity data from the old one to the new one. 
She then delegates authority for her identifier to her new identity agent for authentication and provision of identity data. 

</p>
<a name="anchor17"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.12"></a><h3>5.12.&nbsp;B12</h3>

<p>
Whilst in town Beth stops off at an Internet Cafe to check her email. 
She goes to her webmail account, which requires that she identity herself. 
Her Identity Agent prompts her for consent and provides her identifier so that she can gain access to her email.

</p>
<a name="anchor18"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.13"></a><h3>5.13.&nbsp;B13</h3>

<p>
Beth visits a website to purchase some books. 
The site requests some identity information, her shipping address. 
Her Identity Agent warns her that satisfying the request would contravene her established privacy policy.
The website wishes to pass her address to affiliated companies so that they may send her valuable promotional offers, 
but Beth has a privacy policy that not allow unsolicited mail to be sent to her shipping address. 

</p>
<a name="anchor19"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.14"></a><h3>5.14.&nbsp;B14</h3>

<p>
Beth moves house, so she changes the home address information stored by her Identity Agent. 
Her Identity Agent offers to notify all relying parties to whom she has previously provided her home address. 

</p>
<a name="anchor20"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.15"></a><h3>5.15.&nbsp;B15</h3>

<p>
Beth is a frequent traveler on Galactic Air, whose site offers a claim of membership for use at affiliate sites. 
She acquires a membership claim, which her Identity Agent stores for her. 

</p>
<a name="anchor21"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.16"></a><h3>5.16.&nbsp;B16</h3>

<p>
Beth visits a Galactic Air affiliate site that provides discounted travel insurance for frequent travelers. 
She presents her Galactic Air membership claim from her Identity Agent and receives a discount.

</p>
<a name="anchor22"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.17"></a><h3>5.17.&nbsp;B17</h3>

<p>
Beth visits a rental cars site. 
She opts out of the offered drivers insurance as she is covered by her travel insurance.
To complete the booking the site requests a claim that she has valid insurance.
Her identity agent is unable to satisfy the request so provides a list of suggested sources.
Beth picks her insurance provider and her identity agent acquires the required claim and presents it to the rental car site.

</p>
<a name="anchor23"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.18"></a><h3>5.18.&nbsp;B18</h3>

<p>
A couple of months later Beth books another trip.
The travel site requests her claim of Galactic Air membership.
Her identity agent finds that the claim has expired, so refreshes it by requesting an updated claim from galacticair.com.

</p>
<a name="anchor24"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.19"></a><h3>5.19.&nbsp;B19</h3>

<p>
Beth leaves work and goes to the bus stop.
Whilst waiting for the next bus home she uses her smart phone to browse geeknews.com.
Her Identity Agent provides her with the same ease of browsing that she experiences on her work and home computers.

</p>
<a name="anchor25"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.20"></a><h3>5.20.&nbsp;B20</h3>

<p>
Beth is ending her day at work. 
She leaves work and waits for the next bus home. 
Her friend calls and invites her to the movies. 
She uses her phone to browse to the movies.com to find out what's playing. 
The site requests her current location, which she consents to release via her Identity Agent. 

</p>
<a name="anchor26"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.21"></a><h3>5.21.&nbsp;B21</h3>

<p>
Beth signs up with a financial services site, BigPicture.com, which provides an aggregate view of her finances. 
To provide its service BigPicture.com requires access to her existing bank accounts.
Beth wishes to securely provide agency rights to BigPicture.com, so she acquires the appropriate access tokens from her existing bank account providers and stores them with her Identity Agent.
She then presents the access tokens to BigPicture.com so that it can access her account data. 

</p>
<a name="anchor27"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.22"></a><h3>5.22.&nbsp;B22</h3>

<p>
Beth goes to an auction side, ibay.com. 
Her Identity Agent shows a signed graphic of ibay.com for releasing data. 
Beth knows that she's dealing with ibay.com, and not an impostor.

</p>
<a name="anchor28"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.23"></a><h3>5.23.&nbsp;B23</h3>

<p>
Beth visits her online bank, which requires the use of a strong authentication mechanism. 
She authenticates to her Identity Agent using a two-factor device indicated by the bank to be an acceptable mechanism. 

</p>
<a name="anchor29"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.24"></a><h3>5.24.&nbsp;B24</h3>

<p>
Adam uses a service to acquire a verified email claim. 
With it he can prove that he owns his email address, Adam@example.com, without having to go through a verification process.

</p>
<a name="anchor30"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.25"></a><h3>5.25.&nbsp;B25</h3>

<p>
Beth gives her friend, Adam@example.com, access to her photos.  
Adam receives an email from Beth inviting him to view her photos. 
He goes to the site, which requests a verified email claim. 
He presents his claim and gains access to the photos Beth has published for him.

</p>
<a name="anchor31"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.26"></a><h3>5.26.&nbsp;B26</h3>

<p>
Adam decides to create a profile at geekdate.com. 
geekdate.com requests an Identifier. 
He instructs his identity agent to create an identifier specific to his relationship with geekdate.com. 

</p>
<a name="anchor32"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.27"></a><h3>5.27.&nbsp;B27</h3>

<p>
Adam visits a site that requires that he prove he is over 21. 
He provides the site with a claim that he is over 21, issues by the government of his country of residence, gov.ca. 
The claim contains no other information about Adam and the site is unable to use the claim to discover more information about Adam. 

</p>
<a name="anchor33"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.28"></a><h3>5.28.&nbsp;B28</h3>

<p>
Adam returns to the same site. 
He must again prove that he is over 21. 
He provides a claim, but the site cannot tell that it is Adam that has returned again to the site.

</p>
<a name="anchor34"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.29"></a><h3>5.29.&nbsp;B29</h3>

<p>
Adam heavily frequents two gambling sites, goldenslots.com and luckydice.com. 
He uses the same identifier across both sites as he wants them to know he is the same person. 

</p>
<a name="anchor35"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.30"></a><h3>5.30.&nbsp;B30</h3>

<p>
Beth provides a claim from galacticair.com to many different websites. 
She wants all of the sites to know that she is the same person providing the claim, so she can receive a free flight at the end of the year. 

</p>
<a name="anchor36"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.31"></a><h3>5.31.&nbsp;B31</h3>

<p>
Beth's employer has partnered with a local university to provide it's staff with access to online courses. 
She signs up for some modules at the university admissions website acquiring an enrollment claim. 
She then browses to the computer science school website to sign up for an advanced programming course. 
The site requests claims that she is an employee, that she has previously completed some basic introductory modules, and that she has been enrolled. 

</p>
<a name="anchor37"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.32"></a><h3>5.32.&nbsp;B32</h3>

<p>
Beth is shopping online for a new laptop computer. 
She visits an online site that caters to recently graduated professionals. 
She selects a machine and investigates the lease options available. 
To work out the monthly payment the site requests some claims: 
A claim that she's an alumni of a university, so that the site can include an appropriately branded tote bag. 
A claim that she's a member of Galactic Air, so that she can be credited with airmiles for her purchase. 
And, a claim from a credit scoring agency that she has a 'good' credit rating.

</p>
<a name="anchor38"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.33"></a><h3>5.33.&nbsp;B33</h3>

<p>
Beth is at home checking her work email, she has an email from a colleague assigning a customer support issue to her. 
The company help desk system is provided by helpdesk.com, an on-demand application provider. 
She clicks through a link in the email to the page that describes the issue. 
Helpdesk.com requests a claim that Beth is an employee of 'Nano Software Inc', which she provides from her Identity Agent, and she gains access to the page.

</p>
<a name="anchor39"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.5.34"></a><h3>5.34.&nbsp;B34</h3>

<p>
Beth has many computing devices in her life, running different operating systems and different application software.
She makes her own choices about her own computing environment, but she has little choice when the software is bundled by the device manufacturer or at work where she is subject to her employer's policies. 
A consequence is that she has multiple Identity Agents, which she uses for managing different personas. 

</p>
<a name="anchor40"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6"></a><h3>6.&nbsp;Non Browser Based Use Cases</h3>

<a name="anchor41"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6.1"></a><h3>6.1.&nbsp;NB1 - REST</h3>

<p>
Beth wants to use QOPO.com for printing her pictures that are stored in flackr.  
She visits QOPO.com and her identity agent is instructed to acquire a token from flackr.  
Her Identity Agent retrieves the token from flackr and presents it to QOPO.com.  
QOPO.com passes the token over the REST based web service that flackr provides to retrieve her photos for printing.
</p>
<a name="anchor42"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6.2"></a><h3>6.2.&nbsp;NB2</h3>

<p>
Beth is a big fan of Rocky Gervas and listens to his podcast fanatically.  
The Rocky Gervas show recently started charging a small fee for the podcast.  
Her media player polls the podcast periodically. 
When polled the site requests a claim from Beth's Identity Agent asserting that Beth has paid for the podcast. 
Beth's Identity Agent retrieves the claim presents it to the site and the latest episode of The Rocky Gervas show is downloaded.
</p>
<a name="anchor43"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6.3"></a><h3>6.3.&nbsp;NB3 - WebDAV</h3>

<p>
At work Beth uses her website editing software (a WebDAV client) to publish some company confidential content to their extranet.
Beth is collaborating with Charles at another company, who requires access to the content.
Beth configures the extranet to allow Charles access.
Charles uses his website editing software (also a WebDAV client) to fetch the content.
The extranet site requests identity information, which his client presents from his Identity agent, and he is able to edit the content. 
</p>
<a name="anchor44"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6.4"></a><h3>6.4.&nbsp;NB4 - AtomPub</h3>

<p>
Beth uses a blogging client (AtomPub) to both post content to her blog and to add comments on other people's blog postings.
Her client uses her identity agent to associate identifying information (her blog url and favicon) with her comments.

</p>
<a name="anchor45"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6.5"></a><h3>6.5.&nbsp;NB5 - XCAP and SIMPLE</h3>

<p>
Beth uses her instant messaging client (a SIMPLE client) to communicate with her friends.
She uses her client to update her profile information (via XCAP), adding a new friend.
Her client didn't need to authenticate to her XCAP server, as she had already authenticated herself to her identity agent.
</p>
<a name="anchor46"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6.6"></a><h3>6.6.&nbsp;NB6 - CalDAV</h3>

<p>
Beth needs to arrange a conference call with Charles.
She uses her calendaring software (a CalDAV client) to publish her free-busy time to Charles.
Charles uses his calendaring software (also a CalDAV client) to fetch Beth's free-busy time.
Beth's calendar publisher requests some identity information of Charle's client.
It's provided from his identity agent and he is able to book a time for the call.
</p>
<a name="anchor47"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6.7"></a><h3>6.7.&nbsp;NB7 - IMAP/POP3 and CalDAV</h3>

<p>
At work Beth uses both calendaring (CalDAV) and email (IMAP,POP3,SMTP) clients to manage her time and messages.
Her identity agent authenticates her as owning the identifier that both clients use to identify her.
In this way she need only authenticate once to her identity agent instead of twice, once to each client. 
</p>
<a name="anchor48"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.6.8"></a><h3>6.8.&nbsp;NB8 - RSS, Web, and CalDAV</h3>

<p>
Beth works in a distributed workgroup collaborating with colleagues, individual contractors, and employees of partner companies.
The calendaring information she has access to is available via CalDAV, RSS, and HTTP/HTML. 
Each of her software clients uses her identity agent to ensure she need only authenticate once, instead of once per client.
</p>
<a name="anchor49"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.7"></a><h3>7.&nbsp;Acknowledgements</h3>

<p>The editor acknowledges the use case contributions made by Dick Hardt, Robert Yates, Lisa Dusseault and Laurie Rae.
</p>
<a name="anchor50"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<a name="rfc.section.8"></a><h3>8.&nbsp;Security Considerations</h3>

<p>None.
</p>
<a name="rfc.references1"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<h3>9.&nbsp;References</h3>
<table width="99%" border="0">
<tr><td class="author-text" valign="top"><a name="RFC2119">[RFC2119]</a></td>
<td class="author-text"><a href="mailto:sob@harvard.edu">Bradner, S.</a>, &ldquo;<a href="ftp://ftp.isi.edu/in-notes/rfc2119.txt">Key words for use in RFCs to Indicate Requirement Levels</a>,&rdquo; BCP&nbsp;14, RFC&nbsp;2119, March&nbsp;1997 (<a href="ftp://ftp.isi.edu/in-notes/rfc2119.txt">TXT</a>, <a href="http://xml.resource.org/public/rfc/html/rfc2119.html">HTML</a>, <a href="http://xml.resource.org/public/rfc/xml/rfc2119.xml">XML</a>).</td></tr>
<tr><td class="author-text" valign="top"><a name="dmd1">[dmd1]</a></td>
<td class="author-text">Merrells, J., &ldquo;draft-merrells-dix-01.txt,&rdquo; March&nbsp;2006.</td></tr>
<tr><td class="author-text" valign="top"><a name="identitygang">[identitygang]</a></td>
<td class="author-text">The Identity Gang, &ldquo;http://identitygang.org/Lexicon,&rdquo; March&nbsp;2006.</td></tr>
</table>

<a name="rfc.authors"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<h3>Author's Address</h3>
<table width="99%" border="0" cellpadding="0" cellspacing="0">
<tr><td class="author-text">&nbsp;</td>
<td class="author-text">John Merrells</td></tr>
<tr><td class="author-text">&nbsp;</td>
<td class="author-text">Sxip Identity</td></tr>
<tr><td class="author-text">&nbsp;</td>
<td class="author-text">798 Beatty Street</td></tr>
<tr><td class="author-text">&nbsp;</td>
<td class="author-text">Vancouver, BC  V6B 2M1</td></tr>
<tr><td class="author-text">&nbsp;</td>
<td class="author-text">Canada</td></tr>
<tr><td class="author" align="right">Email:&nbsp;</td>
<td class="author-text"><a href="mailto:merrells@sxip.com">merrells@sxip.com</a></td></tr>
<tr><td class="author" align="right">URI:&nbsp;</td>
<td class="author-text"><a href="http://sxip.com/">http://sxip.com/</a></td></tr>
</table>
<a name="rfc.copyright"></a><br /><hr />
<table summary="layout" cellpadding="0" cellspacing="2" class="bug" align="right"><tr><td class="bug"><a href="#toc" class="link2">&nbsp;TOC&nbsp;</a></td></tr></table>
<h3>Intellectual Property Statement</h3>
<p class='copyright'>
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed
to pertain to the implementation or use of the technology
described in this document or the extent to which any license
under such rights might or might not be available; nor does it
represent that it has made any independent effort to identify any
such rights.
Information on the procedures with respect to
rights in RFC documents can be found in BCP&nbsp;78 and BCP&nbsp;79.</p>
<p class='copyright'>
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available,
or the result of an attempt made to obtain a general license or
permission for the use of such proprietary rights by implementers or
users of this specification can be obtained from the IETF on-line IPR
repository at <a href='http://www.ietf.org/ipr'>http://www.ietf.org/ipr</a>.</p>
<p class='copyright'>
The IETF invites any interested party to bring to its attention
any copyrights,
patents or patent applications,
or other
proprietary rights that may cover technology that may be required
to implement this standard.
Please address the information to the IETF at <a href='mailto:ietf-ipr@ietf.org'>ietf-ipr@ietf.org</a>.</p>
<h3>Disclaimer of Validity</h3>
<p class='copyright'>
This document and the information contained herein are provided
on an &ldquo;AS IS&rdquo; basis and THE CONTRIBUTOR,
THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY),
THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM
ALL WARRANTIES,
EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.</p>
<h3>Copyright Statement</h3>
<p class='copyright'>
Copyright &copy; The Internet Society (2006).
This document is subject to the rights,
licenses and restrictions contained in BCP&nbsp;78,
and except as set forth therein,
the authors retain all their rights.</p>
<h3>Acknowledgment</h3>
<p class='copyright'>
Funding for the RFC Editor function is currently provided by the
Internet Society.</p>
</body></html>

--Apple-Mail-11--476896285
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed



--Apple-Mail-11--476896285
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; x-unix-mode=0644;
	name="draft-merrells-use-cases-02.txt"
Content-Disposition: attachment;
	filename=draft-merrells-use-cases-02.txt




Network Working Group                                        J. Merrells
Internet-Draft                                             Sxip Identity
Expires: September 2, 2006                                    March 2006


                 Digital Identity Exchange - Use Cases
                    draft-merrells-use-cases-02.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on September 2, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   This document describes the motivating use cases for DIX, the Digital
   Identity Exchange protocol.










Merrells                Expires September 2, 2006               [Page 1]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Table of Contents

   1.  Requirements notation  . . . . . . . . . . . . . . . . . . . .  4
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.  Goals  . . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
   4.  Definitions  . . . . . . . . . . . . . . . . . . . . . . . . .  7
   5.  Browser Based Use Cases  . . . . . . . . . . . . . . . . . . .  8
     5.1.  B1 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.2.  B2 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.3.  B3 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.4.  B4 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.5.  B5 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.6.  B6 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     5.7.  B7 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     5.8.  B8 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     5.9.  B9 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     5.10. B10  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.11. B11  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.12. B12  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.13. B13  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.14. B14  . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     5.15. B15  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.16. B16  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.17. B17  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.18. B18  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.19. B19  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.20. B20  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.21. B21  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     5.22. B22  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.23. B23  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.24. B24  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.25. B25  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.26. B26  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.27. B27  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     5.28. B28  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.29. B29  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.30. B30  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.31. B31  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.32. B32  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.33. B33  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
     5.34. B34  . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
   6.  Non Browser Based Use Cases  . . . . . . . . . . . . . . . . . 15
     6.1.  NB1 - REST . . . . . . . . . . . . . . . . . . . . . . . . 15
     6.2.  NB2  . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
     6.3.  NB3 - WebDAV . . . . . . . . . . . . . . . . . . . . . . . 15
     6.4.  NB4 - AtomPub  . . . . . . . . . . . . . . . . . . . . . . 15
     6.5.  NB5 - XCAP and SIMPLE  . . . . . . . . . . . . . . . . . . 15
     6.6.  NB6 - CalDAV . . . . . . . . . . . . . . . . . . . . . . . 16



Merrells                Expires September 2, 2006               [Page 2]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


     6.7.  NB7 - IMAP/POP3 and CalDAV . . . . . . . . . . . . . . . . 16
     6.8.  NB8 - RSS, Web, and CalDAV . . . . . . . . . . . . . . . . 16
   7.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 17
   8.  Security Considerations  . . . . . . . . . . . . . . . . . . . 18
   9.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 18
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 19
   Intellectual Property and Copyright Statements . . . . . . . . . . 20












































Merrells                Expires September 2, 2006               [Page 3]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


1.  Requirements notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].














































Merrells                Expires September 2, 2006               [Page 4]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


2.  Introduction

   The use cases below describe various scenarios for the Digital
   Identity Exchnage (DIX) protocol [dmd1].















































Merrells                Expires September 2, 2006               [Page 5]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


3.  Goals

   The goals of the protocol are:

   Identity Information Exchange:

      The primary goal of any DIX protocol is to automate the exchange
      of Identity Information over the Internet.


   Ease of Adoption:

      Any DIX protocol must provide the lowest possible barriers to
      adoption to ensure wide-spread usage of the protocol.


   Internet Scale:

      Any DIX protocol must provide an Internet scale solution to
      identity information exchange.


   Privacy:

      Any DIX protocol must ensure that all aspects of user privacy can
      be maintained.

























Merrells                Expires September 2, 2006               [Page 6]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


4.  Definitions

   The following terms and their definitions are drawn from the lexicon
   of 'The Identity gang', a community of thought leaders in the user-
   centric digital identity space. [identitygang].

      Digital Identity - The transmission of digital representation of a
      set of Claims made by one Party about itself or another Digital
      Subject, to one or more other Parties.

      Identity Agent - An agent acting on behalf of the user.

      Identifier - An identifying attribute for a set of attributes.

      Identity Data / Identity Information - A set of attributes.

      Claim - An assertion made by a Claimant of the value or values of
      one or more attributes of a Digital Subject, typically an
      assertion which is disputed or in doubt.
































Merrells                Expires September 2, 2006               [Page 7]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


5.  Browser Based Use Cases

   Some use cases are dependent upon others, so should be perused in
   order.  Beth is our protagonist throughout; a typical Internet user,
   but she's a bit of a geek.

5.1.  B1

   Beth receives an email from a friend introducing her to a new
   website, geeknews.com, a techie news site.  She wishes to sign up so
   that she can read some articles.  She sees an IN button, which she
   clicks.  Her identity agent displays a screen informing her that
   geeknews.com is requesting some data, her first name.  She enters
   'Beth' at the prompt, provides consent and the data is sent to the
   site.

5.2.  B2

   Beth browses to geekdate.com, she clicks an IN button.  Her identity
   agent informs her that geekdate.com is requesting some data, her
   first name.  Her agent already has this data.  She provides consent
   and the data is sent to the site.

5.3.  B3

   Beth decides to create a profile at geekdate.com.  She sees an IN
   button, which she clicks.  Her identity agent displays a screen
   informing her that geekdate.com is requesting some data, an
   identifier.  She provides consent and the identifier and identifier
   verification data is sent to the site.  Geekdate.com uses the
   verification data to verify that Beth owns the identifier her agent
   provided.

5.4.  B4

   Beth decides to create a new profile at geekdate.com.  She sees an IN
   button, which she clicks.  Her identity agent displays a screen
   informing her that geekdate.com is requesting some data, an
   Identifier.  She instructs her identity agent to create an identifier
   specific to her relationship with geekdate.com.  She provides consent
   and the data is sent to the site.

5.5.  B5

   Beth decides to flesh out her profile at geekdate.com.  Geekdate.com
   displays a registration form.  One field requests a URL of a photo of
   her.  Beside it is a SAVE button.  She enters the URL and clicks the
   button.  Her identity agent displays a screen informing her that this



Merrells                Expires September 2, 2006               [Page 8]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   data item can be stored.  She decides that she wants to be able to
   provide that data to other sites.  She provides consent and the data
   is stored by her agent.

5.6.  B6

   Geeknews.com offers Beth the option to build up a readership
   preferences profile over time, the benefit being that the site will
   tailor its content to her interests.  She decides to take up the
   offer, she sees an IN button, which she clicks.  Her identity agent
   informs her that geeknews.com is requesting some data, an Identifier.
   She selects an existing identifier that represents a subset of her
   identity, which is used for a subset of the sites she has a
   relationship with.  She provides consent and the data is sent to the
   site.

5.7.  B7

   Beth wants to have multiple identifiers, for different aspects of
   herself, her personas.  She wants to have a 'home' persona for
   identity data that she releases to her personal sites, such as
   geeknews.com.  She wants to have a separate 'work' persona for
   identity data that she releases to work-related sites, such as
   helpdesk.com.  She wants some of her identity data to be the same for
   her different personas, and other data to be different.

5.8.  B8

   [Assumptions: Beth has visited geeknews and geekdate before and has
   informed her identity agent that she consents to a relationship with
   them.]  Beth starts her day with a strong coffee and a perusal of
   geeknews.com.  She starts her computer and authenticates herself to
   the operating system.  By that authentication mechanism she has also
   authenticated herself to her identity agent, as her vendor of that
   system has hooked it into the operating system's authentication
   system.  She browses to geeknews.com and clicks the IN button and is
   directly shown the content, no further clicks.  She then browses to
   geekdate.com, she clicks the IN button and is directly presented with
   her profile no further clicks.

5.9.  B9

   Beth's identity agent prompts her to provide a 'spoken name'.  Using
   the multimedia capabilities of her computer she records her spoken
   name; an mp3 of her saying 'Beth'.  She later browses to
   voicebox.com, which runs a voicemail service, she opts to create an
   account and the site requests some properties, amongst which is a
   request for her spoken name.  She provides consent and the data is



Merrells                Expires September 2, 2006               [Page 9]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   sent to the site.

5.10.  B10

   Beth purchases a book from an online store, as she's checking out the
   store makes her an offer: 10% off for completion of a demographic
   survey.  She's tempted, but how many data fields are there?  One
   hundred!  Too many to be worth the effort.  But it happens to be
   commonly requested data, which she has already entered during
   previous exchanges with other sites.  So, she completes the remaining
   fields, saving them to her identity agent for future reuse.  She
   provides consent and the data is sent to the site.

5.11.  B11

   Beth has invested significant effort in building up a persona and
   reputation around a specific identifier, her 'home' identifier.  But,
   she has become dissatisfied with her identity agent and so decides to
   switch vendors.  She establishes a new agent and migrates her
   identity data from the old one to the new one.  She then delegates
   authority for her identifier to her new identity agent for
   authentication and provision of identity data.

5.12.  B12

   Whilst in town Beth stops off at an Internet Cafe to check her email.
   She goes to her webmail account, which requires that she identity
   herself.  Her Identity Agent prompts her for consent and provides her
   identifier so that she can gain access to her email.

5.13.  B13

   Beth visits a website to purchase some books.  The site requests some
   identity information, her shipping address.  Her Identity Agent warns
   her that satisfying the request would contravene her established
   privacy policy.  The website wishes to pass her address to affiliated
   companies so that they may send her valuable promotional offers, but
   Beth has a privacy policy that not allow unsolicited mail to be sent
   to her shipping address.

5.14.  B14

   Beth moves house, so she changes the home address information stored
   by her Identity Agent.  Her Identity Agent offers to notify all
   relying parties to whom she has previously provided her home address.






Merrells                Expires September 2, 2006              [Page 10]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


5.15.  B15

   Beth is a frequent traveler on Galactic Air, whose site offers a
   claim of membership for use at affiliate sites.  She acquires a
   membership claim, which her Identity Agent stores for her.

5.16.  B16

   Beth visits a Galactic Air affiliate site that provides discounted
   travel insurance for frequent travelers.  She presents her Galactic
   Air membership claim from her Identity Agent and receives a discount.

5.17.  B17

   Beth visits a rental cars site.  She opts out of the offered drivers
   insurance as she is covered by her travel insurance.  To complete the
   booking the site requests a claim that she has valid insurance.  Her
   identity agent is unable to satisfy the request so provides a list of
   suggested sources.  Beth picks her insurance provider and her
   identity agent acquires the required claim and presents it to the
   rental car site.

5.18.  B18

   A couple of months later Beth books another trip.  The travel site
   requests her claim of Galactic Air membership.  Her identity agent
   finds that the claim has expired, so refreshes it by requesting an
   updated claim from galacticair.com.

5.19.  B19

   Beth leaves work and goes to the bus stop.  Whilst waiting for the
   next bus home she uses her smart phone to browse geeknews.com.  Her
   Identity Agent provides her with the same ease of browsing that she
   experiences on her work and home computers.

5.20.  B20

   Beth is ending her day at work.  She leaves work and waits for the
   next bus home.  Her friend calls and invites her to the movies.  She
   uses her phone to browse to the movies.com to find out what's
   playing.  The site requests her current location, which she consents
   to release via her Identity Agent.

5.21.  B21

   Beth signs up with a financial services site, BigPicture.com, which
   provides an aggregate view of her finances.  To provide its service



Merrells                Expires September 2, 2006              [Page 11]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   BigPicture.com requires access to her existing bank accounts.  Beth
   wishes to securely provide agency rights to BigPicture.com, so she
   acquires the appropriate access tokens from her existing bank account
   providers and stores them with her Identity Agent.  She then presents
   the access tokens to BigPicture.com so that it can access her account
   data.

5.22.  B22

   Beth goes to an auction side, ibay.com.  Her Identity Agent shows a
   signed graphic of ibay.com for releasing data.  Beth knows that she's
   dealing with ibay.com, and not an impostor.

5.23.  B23

   Beth visits her online bank, which requires the use of a strong
   authentication mechanism.  She authenticates to her Identity Agent
   using a two-factor device indicated by the bank to be an acceptable
   mechanism.

5.24.  B24

   Adam uses a service to acquire a verified email claim.  With it he
   can prove that he owns his email address, Adam@example.com, without
   having to go through a verification process.

5.25.  B25

   Beth gives her friend, Adam@example.com, access to her photos.  Adam
   receives an email from Beth inviting him to view her photos.  He goes
   to the site, which requests a verified email claim.  He presents his
   claim and gains access to the photos Beth has published for him.

5.26.  B26

   Adam decides to create a profile at geekdate.com. geekdate.com
   requests an Identifier.  He instructs his identity agent to create an
   identifier specific to his relationship with geekdate.com.

5.27.  B27

   Adam visits a site that requires that he prove he is over 21.  He
   provides the site with a claim that he is over 21, issues by the
   government of his country of residence, gov.ca.  The claim contains
   no other information about Adam and the site is unable to use the
   claim to discover more information about Adam.





Merrells                Expires September 2, 2006              [Page 12]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


5.28.  B28

   Adam returns to the same site.  He must again prove that he is over
   21.  He provides a claim, but the site cannot tell that it is Adam
   that has returned again to the site.

5.29.  B29

   Adam heavily frequents two gambling sites, goldenslots.com and
   luckydice.com.  He uses the same identifier across both sites as he
   wants them to know he is the same person.

5.30.  B30

   Beth provides a claim from galacticair.com to many different
   websites.  She wants all of the sites to know that she is the same
   person providing the claim, so she can receive a free flight at the
   end of the year.

5.31.  B31

   Beth's employer has partnered with a local university to provide it's
   staff with access to online courses.  She signs up for some modules
   at the university admissions website acquiring an enrollment claim.
   She then browses to the computer science school website to sign up
   for an advanced programming course.  The site requests claims that
   she is an employee, that she has previously completed some basic
   introductory modules, and that she has been enrolled.

5.32.  B32

   Beth is shopping online for a new laptop computer.  She visits an
   online site that caters to recently graduated professionals.  She
   selects a machine and investigates the lease options available.  To
   work out the monthly payment the site requests some claims: A claim
   that she's an alumni of a university, so that the site can include an
   appropriately branded tote bag.  A claim that she's a member of
   Galactic Air, so that she can be credited with airmiles for her
   purchase.  And, a claim from a credit scoring agency that she has a
   'good' credit rating.

5.33.  B33

   Beth is at home checking her work email, she has an email from a
   colleague assigning a customer support issue to her.  The company
   help desk system is provided by helpdesk.com, an on-demand
   application provider.  She clicks through a link in the email to the
   page that describes the issue.  Helpdesk.com requests a claim that



Merrells                Expires September 2, 2006              [Page 13]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


   Beth is an employee of 'Nano Software Inc', which she provides from
   her Identity Agent, and she gains access to the page.

5.34.  B34

   Beth has many computing devices in her life, running different
   operating systems and different application software.  She makes her
   own choices about her own computing environment, but she has little
   choice when the software is bundled by the device manufacturer or at
   work where she is subject to her employer's policies.  A consequence
   is that she has multiple Identity Agents, which she uses for managing
   different personas.







































Merrells                Expires September 2, 2006              [Page 14]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


6.  Non Browser Based Use Cases

6.1.  NB1 - REST

   Beth wants to use QOPO.com for printing her pictures that are stored
   in flackr.  She visits QOPO.com and her identity agent is instructed
   to acquire a token from flackr.  Her Identity Agent retrieves the
   token from flackr and presents it to QOPO.com.  QOPO.com passes the
   token over the REST based web service that flackr provides to
   retrieve her photos for printing.

6.2.  NB2

   Beth is a big fan of Rocky Gervas and listens to his podcast
   fanatically.  The Rocky Gervas show recently started charging a small
   fee for the podcast.  Her media player polls the podcast
   periodically.  When polled the site requests a claim from Beth's
   Identity Agent asserting that Beth has paid for the podcast.  Beth's
   Identity Agent retrieves the claim presents it to the site and the
   latest episode of The Rocky Gervas show is downloaded.

6.3.  NB3 - WebDAV

   At work Beth uses her website editing software (a WebDAV client) to
   publish some company confidential content to their extranet.  Beth is
   collaborating with Charles at another company, who requires access to
   the content.  Beth configures the extranet to allow Charles access.
   Charles uses his website editing software (also a WebDAV client) to
   fetch the content.  The extranet site requests identity information,
   which his client presents from his Identity agent, and he is able to
   edit the content.

6.4.  NB4 - AtomPub

   Beth uses a blogging client (AtomPub) to both post content to her
   blog and to add comments on other people's blog postings.  Her client
   uses her identity agent to associate identifying information (her
   blog url and favicon) with her comments.

6.5.  NB5 - XCAP and SIMPLE

   Beth uses her instant messaging client (a SIMPLE client) to
   communicate with her friends.  She uses her client to update her
   profile information (via XCAP), adding a new friend.  Her client
   didn't need to authenticate to her XCAP server, as she had already
   authenticated herself to her identity agent.





Merrells                Expires September 2, 2006              [Page 15]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


6.6.  NB6 - CalDAV

   Beth needs to arrange a conference call with Charles.  She uses her
   calendaring software (a CalDAV client) to publish her free-busy time
   to Charles.  Charles uses his calendaring software (also a CalDAV
   client) to fetch Beth's free-busy time.  Beth's calendar publisher
   requests some identity information of Charle's client.  It's provided
   from his identity agent and he is able to book a time for the call.

6.7.  NB7 - IMAP/POP3 and CalDAV

   At work Beth uses both calendaring (CalDAV) and email
   (IMAP,POP3,SMTP) clients to manage her time and messages.  Her
   identity agent authenticates her as owning the identifier that both
   clients use to identify her.  In this way she need only authenticate
   once to her identity agent instead of twice, once to each client.

6.8.  NB8 - RSS, Web, and CalDAV

   Beth works in a distributed workgroup collaborating with colleagues,
   individual contractors, and employees of partner companies.  The
   calendaring information she has access to is available via CalDAV,
   RSS, and HTTP/HTML.  Each of her software clients uses her identity
   agent to ensure she need only authenticate once, instead of once per
   client.


























Merrells                Expires September 2, 2006              [Page 16]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


7.  Acknowledgements

   The editor acknowledges the use case contributions made by Dick
   Hardt, Robert Yates, Lisa Dusseault and Laurie Rae.















































Merrells                Expires September 2, 2006              [Page 17]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


8.  Security Considerations

   None.

9.  References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [dmd1]     Merrells, J., "draft-merrells-dix-01.txt", March 2006.

   [identitygang]
              The Identity Gang, "http://identitygang.org/Lexicon",
              March 2006.





































Merrells                Expires September 2, 2006              [Page 18]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Author's Address

   John Merrells
   Sxip Identity
   798 Beatty Street
   Vancouver, BC  V6B 2M1
   Canada

   Email: merrells@sxip.com
   URI:   http://sxip.com/









































Merrells                Expires September 2, 2006              [Page 19]
=0C
Internet-Draft    Digital Identity Exchange - Use Cases       March 2006


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Merrells                Expires September 2, 2006              [Page 20]
=0C

--Apple-Mail-11--476896285
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix

--Apple-Mail-11--476896285--




From dix-bounces@ietf.org Tue Apr 18 08:13:13 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVp47-0004sW-2I; Tue, 18 Apr 2006 08:12:19 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVp46-0004sR-Mo
	for dix@ietf.org; Tue, 18 Apr 2006 08:12:18 -0400
Received: from nz-out-0102.google.com ([64.233.162.203])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVp45-0002kK-5l
	for dix@ietf.org; Tue, 18 Apr 2006 08:12:18 -0400
Received: by nz-out-0102.google.com with SMTP id 18so1213849nzp
	for <dix@ietf.org>; Tue, 18 Apr 2006 05:12:16 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com;
	h=received:message-id:date:from:user-agent:x-accept-language:mime-version:to:subject:references:in-reply-to:content-type:content-transfer-encoding;
	b=UXwXJKRsB7ujD9e0RO/Nz12u1cO7R3iqWGECvafVqbu7RXdwg5yqUxbbQ9+yrGN0fOjpTAkelAG2qOkCXhjzIawnvXT+fAvOEs0MeSuc18xNKsplWbTKC2JiO0wqnl/yZSU9Dmc3XiN6UiZXltTtGdMyNB/YkzQ9kYpFraWPfgo=
Received: by 10.65.52.4 with SMTP id e4mr1102708qbk;
	Tue, 18 Apr 2006 05:12:16 -0700 (PDT)
Received: from ?192.168.1.2? ( [66.30.206.61])
	by mx.gmail.com with ESMTP id e17sm1349002qbe.2006.04.18.05.12.15;
	Tue, 18 Apr 2006 05:12:16 -0700 (PDT)
Message-ID: <4444D79D.1020708@gmail.com>
Date: Tue, 18 Apr 2006 08:12:13 -0400
From: Robert Yates <robyates70@gmail.com>
User-Agent: Mozilla Thunderbird 1.0.7 (Windows/20050923)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] draft-merrells-use-cases-02
References: <BD240299-9541-4724-9293-A1A727958C5F@sxip.com>
In-Reply-To: <BD240299-9541-4724-9293-A1A727958C5F@sxip.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

John Merrells wrote:

>
> Here's an update to the use cases draft that incorporates the  
> comments on the list over the past week.
>
> John
>
John,

these are great, I have a question on scope of the use cases though.  I 
notice that in the non browser use cases there are some non http use 
cases e.g. SIMPLE, IMAP.  I was under the impression, probably from 
dmd0, that we were just looking at having a binding of DIX into http 
initially, so......

Is it the intention of the use cases to cover all protocols or just 
http?  If it is all protocols then I think the non-browser use cases 
need considerable expansion.

Rob

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Tue Apr 18 15:59:33 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FVwMB-0007yu-Nx; Tue, 18 Apr 2006 15:59:27 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FVwMA-0007yp-Ug
	for dix@ietf.org; Tue, 18 Apr 2006 15:59:26 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FVwM9-00032y-J6
	for dix@ietf.org; Tue, 18 Apr 2006 15:59:26 -0400
Received: from [192.168.1.66] (adsl-69-106-251-0.dsl.pltn13.pacbell.net
	[69.106.251.0]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3IJxN0T028719
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Tue, 18 Apr 2006 12:59:24 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
In-Reply-To: <4444D79D.1020708@gmail.com>
References: <BD240299-9541-4724-9293-A1A727958C5F@sxip.com>
	<4444D79D.1020708@gmail.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <A8700C50-C869-4BD2-B1D8-15976226810B@sxip.com>
Content-Transfer-Encoding: 7bit
From: John Merrells <merrells@sxip.com>
Subject: Re: [dix] draft-merrells-use-cases-02
Date: Tue, 18 Apr 2006 12:59:22 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-2.5 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9466e0365fc95844abaf7c3f15a05c7d
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On 18-Apr-06, at 5:12 AM, Robert Yates wrote:

> I notice that in the non browser use cases there are some non http  
> use cases e.g. SIMPLE, IMAP.  I was under the impression, probably  
> from dmd0, that we were just looking at having a binding of DIX  
> into http initially, so...... Is it the intention of the use cases  
> to cover all protocols or just http?  If it is all protocols then I  
> think the non-browser use cases need considerable expansion.

The charter as currently drafted roughly says 'http binding now,  
other bindings later, if people want them.'  So, I collated the use  
cases from the list with that remit. I think that the browser use  
cases are complete enough that other documents could be written  
against them. But the non-browser cases clearly aren't detailed  
enough for that. dmd0/dmd1 attempts to address just the browser  
cases. dmuc2 can be developed further if people want to do that and  
should be taken further if people want to write further documents  
against them.

What do you folks on the list want to do with dmuc2?

Does it document the goals and motivations of the group?

Does it do so well enough to move forward with finding solutions that  
solve those problems?

John


_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Wed Apr 19 19:20:14 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FWLy1-000107-CA; Wed, 19 Apr 2006 19:20:13 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FWLy0-000102-OM
	for dix@ietf.org; Wed, 19 Apr 2006 19:20:12 -0400
Received: from marlin.sxip.com ([199.60.48.20] helo=mail1.sxip.com)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FWLxz-0006YS-Cb
	for dix@ietf.org; Wed, 19 Apr 2006 19:20:12 -0400
Received: from [192.168.1.66] (adsl-69-106-251-0.dsl.pltn13.pacbell.net
	[69.106.251.0]) (authenticated bits=0)
	by mail1.sxip.com (8.13.5/8.13.5) with ESMTP id k3JNK2em085312
	(version=TLSv1/SSLv3 cipher=RC4-SHA bits=128 verify=NOT)
	for <dix@ietf.org>; Wed, 19 Apr 2006 16:20:03 -0700 (PDT)
	(envelope-from merrells@sxip.com)
Mime-Version: 1.0 (Apple Message framework v749.3)
Content-Transfer-Encoding: 7bit
Message-Id: <6D05DA72-1105-4D35-95D3-7F015994A012@sxip.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
To: Digital Identity Exchange <dix@ietf.org>
From: John Merrells <merrells@sxip.com>
Date: Wed, 19 Apr 2006 16:20:01 -0700
X-Mailer: Apple Mail (2.749.3)
X-Spam-Status: No, score=-2.5 required=5.0 tests=AWL,BAYES_00 autolearn=ham 
	version=3.1.0
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on marlin.sxip.com
X-Scanned-By: MIMEDefang 2.54 on 199.60.48.141
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 856eb5f76e7a34990d1d457d8e8e5b7f
Subject: [dix] IIW & DIX
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


An 'Internet Identity Workshop' is being held in Mountain View, CA,  
May 1-3.

Details here: http://iiw.windley.com/wiki/Main_Page

IIW is a forum for discussion of identity issues and a good  
opportunity to meet
some great people who are thinking about, writing about, and building  
user
centric identity systems.

Are you attending? Will you be in the vicinity at the time? I think  
it'd be great
to have a DIX group meeting to talk about moving DIX forward.

John
  

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Thu Apr 27 16:31:00 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FZD8X-0005lt-Sp; Thu, 27 Apr 2006 16:30:53 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FZD8W-0005lj-O9
	for dix@ietf.org; Thu, 27 Apr 2006 16:30:52 -0400
Received: from laweleka.osafoundation.org ([204.152.186.98])
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FZD8V-00010I-FC
	for dix@ietf.org; Thu, 27 Apr 2006 16:30:52 -0400
Received: from localhost (localhost [127.0.0.1])
	by laweleka.osafoundation.org (Postfix) with ESMTP id 1221C14229B
	for <dix@ietf.org>; Thu, 27 Apr 2006 13:30:51 -0700 (PDT)
Received: from laweleka.osafoundation.org ([127.0.0.1])
	by localhost (laweleka.osafoundation.org [127.0.0.1]) (amavisd-new,
	port 10024) with ESMTP id 25269-10 for <dix@ietf.org>;
	Thu, 27 Apr 2006 13:30:50 -0700 (PDT)
Received: from [192.168.1.100] (c-67-161-46-163.hsd1.ca.comcast.net
	[67.161.46.163]) (using TLSv1 with cipher RC4-SHA (128/128 bits))
	(No client certificate requested)
	by laweleka.osafoundation.org (Postfix) with ESMTP id B0734142292
	for <dix@ietf.org>; Thu, 27 Apr 2006 13:30:50 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v746.2)
In-Reply-To: <8C81CCA232C2EA6-1C7C-8724@FWM-M28.sysops.aol.com>
References: <198A730C2044DE4A96749D13E167AD379E0C1F@MOU1WNEXMB04.vcorp.ad.vrsn.com>
	<B64B9384-16FB-4645-A7A2-0BD6543F59CE@tzi.org>
	<8C81CCA232C2EA6-1C7C-8724@FWM-M28.sysops.aol.com>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
Message-Id: <8C2CB823-042C-46C3-BB92-3CF7DEDC5AAF@osafoundation.org>
Content-Transfer-Encoding: 7bit
From: Lisa Dusseault <lisa@osafoundation.org>
Subject: Re: SAML and REST - was Re: [dix] DIX use cases
Date: Thu, 27 Apr 2006 13:30:38 -0700
To: Digital Identity Exchange <dix@ietf.org>
X-Mailer: Apple Mail (2.746.2)
X-Virus-Scanned: by amavisd-new and clamav at osafoundation.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 93238566e09e6e262849b4f805833007
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


On Mar 23, 2006, at 11:50 AM, thayes0993@aol.com wrote:

> No!  I think the intended scope of DIX is to work within the  
> existing HTTP capabilities.  In fact, DIX is intended to work in an  
> HTML/browser environment, rather than in non-HTML applications such  
> as WEBDAV or even browser-based AJAX schemes.
>
> I'd like to discuss changes to HTTP somewhere, but probably not on  
> the DIX list.
>
There is a list specifically to discuss HTTP Authentication: <http:// 
lists.osafoundation.org/cgi-bin/mailman/listinfo/ietf-http-auth>

I had hoped that this list would at least identify a problem  
statement around what needs to be fixed, if anything, in HTTP  
authentication.  Possible problem statements might involve fixing the  
signature algorithms or allowing 3rd-party identity statements.

Lisa


> Terry
>

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



From dix-bounces@ietf.org Fri Apr 28 16:23:41 2006
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com)
	by megatron.ietf.org with esmtp (Exim 4.43)
	id 1FZZV6-0000Ik-AX; Fri, 28 Apr 2006 16:23:40 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.43) id 1FZZV4-0000FW-J2
	for dix@ietf.org; Fri, 28 Apr 2006 16:23:38 -0400
Received: from stsc1260-eth-s1-s1p1-vip.va.neustar.com ([156.154.16.129]
	helo=chiedprmail1.ietf.org)
	by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FZZV4-0001Yx-HX
	for dix@ietf.org; Fri, 28 Apr 2006 16:23:38 -0400
Received: from laweleka.osafoundation.org ([204.152.186.98])
	by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1FZZV2-0005yL-Ub
	for dix@ietf.org; Fri, 28 Apr 2006 16:23:38 -0400
Received: from localhost (localhost [127.0.0.1])
	by laweleka.osafoundation.org (Postfix) with ESMTP id BE689142271
	for <dix@ietf.org>; Fri, 28 Apr 2006 13:23:35 -0700 (PDT)
Received: from laweleka.osafoundation.org ([127.0.0.1])
	by localhost (laweleka.osafoundation.org [127.0.0.1]) (amavisd-new,
	port 10024) with ESMTP id 01602-05 for <dix@ietf.org>;
	Fri, 28 Apr 2006 13:23:35 -0700 (PDT)
Received: from [192.168.1.100] (c-67-161-46-163.hsd1.ca.comcast.net
	[67.161.46.163]) (using TLSv1 with cipher RC4-SHA (128/128 bits))
	(No client certificate requested)
	by laweleka.osafoundation.org (Postfix) with ESMTP id 5B64E14226F
	for <dix@ietf.org>; Fri, 28 Apr 2006 13:23:35 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v746.2)
Content-Transfer-Encoding: 7bit
Message-Id: <AACEA1FF-F214-4999-9241-7DF034566827@osafoundation.org>
Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed
To: Digital Identity Exchange <dix@ietf.org>
From: Lisa Dusseault <lisa@osafoundation.org>
Date: Fri, 28 Apr 2006 13:23:28 -0700
X-Mailer: Apple Mail (2.746.2)
X-Virus-Scanned: by amavisd-new and clamav at osafoundation.org
X-Spam-Score: -2.1 (--)
X-Scan-Signature: de4f315c9369b71d7dd5909b42224370
Subject: [dix] Permanent IDs and how to obsolete an identity
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>,
	<mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org


Somebody was talking to me about how IDs similar to  
"myname@serviceprovider.com" are useless because you can't trust the  
ID when the service provider is gone.

Isn't it the general expectation that these IDs are impermanent?   
Just like when my email address at work becomes obsolete when I leave  
the job -- I just stop using that ID.  In fact it may be easier to  
obsolete an ID than an email address.  OTOH it might not be, there  
might be permissions and preferences scattered about the Web,  
associated with an ID that suddenly becomes useless.

The statement that "permanent IDs are not required" might be useful  
in the charter.  There may also be interesting use cases about how to  
obsolete an ID.

Lisa

_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix



