{"id":4841,"date":"2015-02-09T13:20:00","date_gmt":"2015-02-09T13:20:00","guid":{"rendered":"https:\/\/evssolutions.com\/are-we-ready-for-identity-consolidation-part-1\/"},"modified":"2023-04-12T18:00:05","modified_gmt":"2023-04-12T18:00:05","slug":"are-we-ready-for-identity-consolidation-part-1","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/are-we-ready-for-identity-consolidation-part-1\/","title":{"rendered":"Are We Ready for Identity Consolidation? Part 1"},"content":{"rendered":"

\"Railroad
\n<\/span>
\nYou are probably familiar with social log-ins, where instead of creating new credentials you log into a site by connecting to your Facebook, Twitter, or other social media account.  By simply clicking a couple of buttons you are able to create a new account or log in to an existing account – no username or password necessary.  <\/p>\n

A more recent trend has emerged in which companies have applied a similar concept toward verifying a person’s identity<\/a> by connecting to their Bank Account, Utility Account, or other trusted site.  The move towards using “trusted identity providers” stems from solid ground.  In response to the National Strategy for Trusted Identities in Cyberspace (NSTIC<\/a>) signed by President Obama in April 2011 a combination of public and private sector organizations and individuals have formed the Identity Ecosystem Steering Group (IDESG<\/a>).  <\/p>\n

While it continues to be a work in progress, the Framework published by IDESG (The Identity Ecosystem Framework) calls for the use of trusted Identity Providers for identity verification.  The primary reason for this approach is increased privacy – with the recommended framework businesses (Relying Parties) seeking to verify information (Attributes) about an individual could do so while only accessing the information they need.   <\/p>\n

There is no doubt that the approach suggested by the IDESG Framework would benefit privacy and convenience, but current implementations of this approach also present security challenges that need to be addressed.  Tomorrow’s post<\/a> will discuss the security challenge of current implementations in greater detail.  <\/p>\n

 <\/div>\n","protected":false},"excerpt":{"rendered":"

You are probably familiar with social log-ins, where instead of creating new credentials you log into a site by connecting to your Facebook, Twitter, or other social media account. By simply clicking a couple of buttons you are able to create a new account or log in to an existing account \u2013 no username or password necessary….<\/p>\n","protected":false},"author":40,"featured_media":4842,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[54,52,55],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4841"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4841"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4841\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media\/4842"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}