Open ID

Open ID allows users to be authenticated by co-operating sites (known as Relying Parties or RP) using a third party service, eliminating the need for webmasters to provide their own ad hoc login systems, and allowing users to log in to multiple unrelated websites without having to have a separate identity and password for each (source: Wikipedia). Loosely speaking social sign on is effectively based on Open ID (and vice versa) and supports single sign on as well as the exchange of data attributes.

Open ID is designed to encourage standardization and interoperability by encouraging competitors to collaborate by using an identity protocol they have all contributed to the development of. Open ID compliance must be considered a fundamental cornerstone of realistic long term IDaAS offerings.

Open ID together with the concept of self sovereignty and the ability of consumers to buy identity services from ‘for profit’ companies that do not have a conflict of interest over the privacy of their users (and are rewarded for properly protecting user data) presents the biggest disruption threat to incumbent social sign in providers and IAM in general.

Key Recommendations

All Articles

EU regulations on algorithmic decision-making and a “right to explanation”

We summarize the potential impact that the European Union’s new General Data Protection Regulation will have on the routine use of machine learning algorithms. Slated to take effect as law across the EU in 2018, it will restrict automated individual decision-making (that is, algorithms that make decisions based on user-level predictors) which “significantly affect” users.

Standards group working on ID federation recipes to ease implementation

The OpenID Foundation, which develops and promotes standards for internet-based identity, last week introduced an initiative called Fast Federation. The idea is to craft sets of directions to explicitly walk enterprises, identity providers (IdP), and developers through steps to build federation into their identity infrastructure and cloud-based or mobile apps.

Know of a resource that helps people secure their data? Submit it today