Identity Management Volume 103 No
Total Page:16
File Type:pdf, Size:1020Kb
Contents Telektronikk Identity Management Volume 103 No. 3/4 – 2007 1 Guest Editorial; ISSN 0085-7130 Do Van Thanh Editor: 3 The Ambiguity of Identity; Per Hjalmar Lehne Do Van Thanh, Ivar Jørstad (+47) 916 94 909 [email protected] 11 Identity Management Demystified; Do Van Thuan Editorial assistant: Gunhild Luke 19 Identity Management Standards, Systems and Standardisation Bodies; (+47) 415 14 125 Nguyen Duy Hinh, Sjur Millidahl, Do Van Thuan, Ivar Jørstad [email protected] 31 Identity Management in General and with Attention to Mobile GSM- Editorial office: based Systems; Tor Hjalmar Johannessen Telenor R&I NO-1331 Fornebu 52 Next Generation of Digital Identity; Norway Fulup Ar Foll, Jason Baragry (+47) 810 77 000 57 Microsoft Windows CardSpace and the Identity Metasystem; [email protected] Ole Tom Seierstad www.telektronikk.com 66 Smart Cards and Digital Identity; Editorial board: Jean-Daniel Aussel Berit Svendsen, Head of Telenor Nordic Fixed Ole P. Håkonsen, Professor NTNU 79 Trusting an eID in Open and International Communication; Oddvar Hesjedal, VP Telenor Mobile Operations Sverre Bauck Bjørn Løken, Director Telenor Nordic 85 Building a Federated Identity for Education: Feide; Graphic design: Ingrid Melve, Andreas Åkre Solberg Design Consult AS (Odd Andersen), Oslo 103 Identity Federation in a Multi Circle-of-Trust Constellation; Layout and illustrations: Dao Van Tran, Pål Løkstad, Do Van Thanh Gunhild Luke and Åse Aardal, 119 Identity Management in Telecommunication Business; Telenor R&I Do Van Thanh, Ivar Jørstad, Do Van Thuan, Nicolay Bang Prepress and printing: Rolf Ottesen Grafisk Produksjon, Oslo 126 Strong Authentication for Internet Applications with the GSM SIM; Ivar Jørstad, Do Van Thuan, Tore Jønvik, Do Van Thanh Circulation: 4,000 136 Unifying CardSpace and Liberty Alliance with SIM Authentication; Ivar Jørstad, Do Van Thuan, Tore Jønvik, Do Van Thanh 143 The Mobile Phone as Authentication Token; Ivar Jørstad, Do Van Thanh 152 Identity Management in a Fixed-Mobile Convergent IMS Environment; Boning Feng, Do Van Thuan, Ivar Jørstad, Tore Jønvik, Do Van Thanh 161 Access Control and Privacy Enhancement through Role-based Identity Management; Mohammad M.R. Chowdhury, Josef Noll Networks on networks Connecting entities through networks – in technological, societal and personal terms – 171 Terms and Acronyms in Identity Management enables telecommunication. Networks occur on different levels, form parts of larger networks, and exist in numerous varieties. The artist Odd Kaleidoscope Andersen visualises the networks on networks 183 Technical Slogans as Seen in the Negroponte Switch; by drawing interconnected lines with different Rich Ling widths. Curved connections disturb the order and show that networks are not regular but are adapted to the communication needs. Per H. Lehne, Editor in Chief 194 Call for Papers – Special issue on “ICT Forecasting” Guest Editorial DO VAN THANH As human beings, we are quite concerned about our concise overview of identity management and its identity because it tells who we are and how we want usages. to be perceived by other people. We want to be proud of ourselves and therefore want to keep our identity. This Telektronikk issue starts with a light review Each person has a unique identity. Persons having a of the notion of identity, from identity of things via problem with their identity are really in big trouble. personal identity, citizen identity, to digital identity. Do Van Thanh is To have several identities is a malfunction of the Next, the concept of identity management (IdM) is Senior Research brain, in psychiatry called Dissociative Identity Dis- studied carefully. All the IdM components are listed Scientist in order (DID) that needs proper care. and explained. The standards, systems and standard- Telenor R&I ization bodies related to identity management are Unfortunately, most people in the modern society enumerated and described in one paper, allowing the are forced to have several identities. Indeed, in the reader to make further investigation if wanted. Iden- current digital age, our physical world is suddenly tity management is also explained thoroughly in a extended with a cyber world that keeps growing. paper with a focus on mobile GSM-based systems. From one identity in the real world, we now have a multitude of new identities for this new imaginary The two current major identity management systems, world. Some identities are given to us by entities like namely the Liberty Alliance specifications and the clubs, alumni groups, etc. Some identities reflect our Microsoft CardSpace are introduced through two true identity. Some reveal our aspirations, our papers written by experts in the respective organiza- dreams, our heroes, etc. On average, a person has five tions. The need for a trusted electronic ID is ex- different identities: one for their job’s IT system, one plained in the succeeding paper. Since digital identity for their home broadband connection, one for their is exposed for theft it should be stored securely in mobile subscription, one for their online bank and one smart cards which are portable tamper resistant cryp- for their hobby club. It is hence not surprising that we tographic devices. This is examined thoroughly in a have an identity management problem. Each identity paper on Smart cards and digital identity. The next consists of a user name and password that we have to two papers present implementation and usage of iden- remember by heart. To maintain the same level of tity management systems. One describes the building security, we are asked to change our passwords quite of a federated identity for education, the other iden- often. The simple passwords are not accepted and we tity federation in a multi Circle-of-Trust constellation. are asked to choose long and complicated passwords consisting of lower case and upper case letters and Without a well balanced and sound business model, numbers. To write down the password on a piece of the identity management can never be a reality. The paper is not a solution since it constitutes a security next paper addresses this issue by presenting the busi- breach. The worst thing is that the number of login ness scenarios that are both attractive and realistic to names and passwords keeps increasing and will be telecom operators. The next three papers focus on soon unmanageable. The demand for sound and user- one central function of identity management, namely friendly identity management systems is obvious. authentication. The first one describes the usage of the GSM SIM card in the sign-in to Internet applica- But, the notion of identity management is not clearly tions using the Liberty Alliance specifications. The defined, nor is it possible to go and buy a ready-for- second one extends the SIM authentication to use identity management system. It is confusing what CardSpace. The third one reviews all the authentica- an identity management system should comprise. tion schemes by mobile phone. This is not surprising if we contemplate the evolution of computer systems from stand-alone mainframes IP Multimedia Subsystem (IMS) is on the way to with their own identity management to computer net- becoming deployed for both mobile and fixed envi- work systems with external connections. The identity ronments. It is hence necessary to have a way of uni- management must evolve at the same pace and meet fying the different mobile and fixed identities that the all the new requirements of the more complex sys- user has. One paper is fully devoted to this issue. Last tem. The goals of this Telektronikk issue are to clarify but not least, the access control and privacy facili- the notion of identity and to shed light on the field of tated by a role-based identity management system is identity management. It could serve as a clear and presented in a paper. ISSN 0085-7130©Telenor ASA 2007 Telektronikk 3/4.2007 1 For the elaboration and realisation of this Telektron- great assistance. Finally, I wish all the readers a great ikk issue, tremendous efforts and sacrifices have been time with this Telektronikk issue on Identity Manage- made. I would take the opportunity to express my ment. gratitude for all the trust and support that I received from the contributing authors. It has been both a plea- Enjoy your reading! sure and an honour to work with you. I would like also to thank Telektronikk’s editor and staff for their Prof. Dr. Do Van Thanh obtained his MSc in Electronic and Computer Science from the Norwegian University of Science and Technology and his PhD in Informatics from the University of Oslo. In 1991 he joined Ericsson R&D department in Oslo after seven years of R&D in Norsk Data, a minicomputer manufacturer in Oslo. In 2000 he joined Telenor R&I and is now in charge of a Eureka project called Mobicome that focuses on IMS in a fixed mobile environment. He also holds a professorship at the Department of Telematics at the Norwegian University of Science and Technology in Trondheim. He is the author of over 100 publications at international conferences and journals. He is also the inventor of 19 patents and a dozen pending ones. email: [email protected] ISSN 0085-7130©Telenor ASA 2007 2 Telektronikk 3/4.2007 The Ambiguity of Identity DO VAN THANH, IVAR JØRSTAD “To be or not to be” – Shakespeare Although identity is a notion related to the existence of all objects on Earth, including human beings and the fundament for the understanding of nature it is rather diffuse and controversial. The goal of this paper is to give an easy but clear elucidation of the notion of identity. It starts with fundamental definitions of identity in logic. The philosophical paradoxes of identity are summarized to illustrate Do Van Thanh is the complexity of the notion of identity.