• Skip to primary navigation
  • Skip to main content

Identity Woman

Independent Advocate for the Rights and Dignity of our Digital Selves

  • About
  • Services
  • Media Coverage
  • Podcast
  • Blog
  • Contact
  • Show Search
Hide Search

SSO

Getting to the Promised Layer

Kaliya Young · October 7, 2005 · Leave a Comment

The Internet Identity Workshop just got a promotion on O’Reilly with the publishing of an article I wrote. The Identity 2.0 Gathering: Getting to the Promised Layer (it occurred to me after it was already published that the last word should be Layer instead of Land – oh well).
Here is the opening….

There were many who thought that an identity solution would emerge to support single sign on (SSO) shortly after the Web’s emergence in 1994. An SSO solution has proven very elusive. Solving internet identity management, creating an efficient, reliable ecosystem, is often alluded to as “The Holy Grail.” One of the reasons for this elusiveness is the fact that identity is no small matter. It lies at the core of who we are as social beings. There are many ways to think about what identity is, such as: how we define ourselves (self-assertions), how others see us (facts about us), and what others think about us (our reputation).
When tackling the problem of representing these elements, the first challenge is settling on a protocol used in a system that is flexible and broad enough to encompass the enormously wide range of ways people around the globe use and define identity. Identity protocols are not like TCP/IP–simply just connecting two machines. While reading Protocol: How Control Exists After Decentralization, I came across this quote that summed up the challenge. “Protocol is synonymous with possibility … Protocol outlines the playing field for what can happen, and where. If one chooses to ignore a certain protocol, then it becomes impossible to communicate on that particular channel. No protocol, no connection.” The edge use cases must be considered carefully so that they are included within the protocol’s possibility landscape. The inherent complexity of this next identity layer of the Net is one of the reasons it has yet to successfully emerge.

How simple does it need to be?

Kaliya Young · July 4, 2005 · Leave a Comment

FAQ’s about LID from Johannes Ernst’s Blog – I think they apply to the work happening around XRI/XDI and Identity Commons stuff. I am going to do my part by working on doing some essays with lots of simple diagrams to explain the ecology of organizations and roles. Hopefully we can also do a short video about it too.

What’s your measure of how complex a single-sign-on technology can be so it can be adopted broadly?
A weekend of implementation effort, maximum. Here’s why: SSO only makes sense if basically everybody can implement it. That includes a lot of players, from your 401k plan (who could probably afford a lot more than that) down to the message board of the parent-teacher assocation that’s run by Joey’s dad on his home Linux server. Joey’s dad is not going to spend more than a weekend of his time to make it work. He’s also not going to go out and buy expensive software. He might download some Perl, but that’s about it. Ergo: one weekend, no more.

Technorati Tags: xri/xdi, truisms

     Copyright © 2023 Identity Woman  evelurie.com/web design/develop     

  • Terms of Use
  • Privacy Policy
  • Sitemap
  • Contact