SlideShare a Scribd company logo
1 of 35
Download to read offline
@evernym | @CondatisUK | July 2020
The Future of
Authentication
How portable credentials improve security and
reduce friction in authentication processes.
On the agenda
The problems with authentication today
A self-sovereign identity (SSI) refresher
Getting rid of passwords AND usernames
Four types of SSI-enabled authentication
Integrating the old and the new
Partner showcases: SSI-enabled authentication in action
Q&A
Andrew Tobin
Managing Director, Europe,
Evernym
Today’s presenters
Chris Eckl
Chief Technology Officer,
Condatis
James Monaghan
VP Product,
Evernym
If you have questions….
Please enter them in the Zoom Q&A, and
we’ll cover them after the presentation.
Please note, this webinar is being recorded and will be
available at www.evernym.com/webinars.
Before we go on, we have two very exciting announcements
Request access at www.evernym.com/plans
Register at www.evernym.com/webinars
The problems with
authentication today
Traditionally, authentication has revolved around
usernames and “secret” things only you should know
● Passwords
● Security questions (e.g., “What is your mother’s
maiden name?” “What was the name of your
first pet?”)
Yet, this knowledge-based method of authentication
is not only all-too-easy for a malicious party to guess,
it’s also a pain for all parties involved.
A step in the right direction?
Fortunately, the practice of relying on shared secrets
alone is becoming less common.
With federated approaches to single-sign on,
individuals are able to ditch many of those 191
username/password combinations by logging in
through a third party, like Facebook, Twitter, or
Apple.
And, with multi-factor authentication, organizations
can ensure greater security by matching that
“something you have” (a device) with “something
you know” (a password) and/or “something you are”
(a biometric). Peer-to-Peer
Trust
Intermediary
Trust
Yet… this all begs the question:
Why do we have to “log-in” at all?
A quick recap of the fundamentals of
self-sovereign identity
The 3 Pillars of Self-Sovereign Identity
1. secure
connections
2. digital data
watermarking
3. trusted, tamper-proof
public key directory
self-sovereign
identity
verifiable
data
verifiable
connections
private data
exchange
“The ability for people,
organisations and things to ,
manage and control their own
digital identity and relationships
without needing intermediaries.”
Technical Trust Tunnel
The Internet
Verifiers Can Do 4 Checks:
1. Who created it?
2. Has it been changed?
3. Was it given only to the
presenter?
4. Has it been revoked?
✅
Technical Trust Tunnel
The InternetThe Internet
Verifiers Can Do 4 Checks:
1. Who created it?
2. Has it been changed?
3. Was it given only to the
presenter?
4. Has it been revoked?
✅
Technical Trust Tunnel
The Internet
? The Internet
Codifying a Digital Trust Ecosystem
trustoverip.org
What does this mean for
authentication?
SSI: The true username and password killer
Username
✗ Short, memorable, human readable
✗ Often assigned by service provider
✗ Often reused across accounts
Password
✗ Guessable, breakable
✗ Hard to manage
✗ Often reused across accounts
Decentralized identifier (DID)
✓ Opaque, managed by wallet
✓ Generated & controlled by the user
✓ Globally unique for every account
Private key
✓ Prohibitively hard to crack
✓ Managed by wallet
✓ Globally unique for every account
Beyond two-factor
Self-sovereign digital wallet combines:
● Connected device
→ Possession, control & consent
● Cryptographic keys
→ Ownership of a given account
● Verifiable credentials
→ 3rd party assertion of identity
● Real-time biometrics
→ Likeness & liveness
Result: security + convenience
The four types of SSI-enabled
authentication
1. DID authentication
Prove control over a relationship DID by signing
a challenge using the private key.
User initiates with their mobile wallet by:
⭑ Scanning a QR code
⭑ Clicking a link in mobile app or web page
⭑ Clicking a link via email or SMS
Similar to other passwordless schemes (e.g.
FIDO UAF), except:
✓ Identifier is decoupled from authenticator
✓ User can rotate their own keys
Placeholder
Are you logging in to
Faber College?
Faber College
2. OpenID Connect SIOP
DID authentication over OpenID Connect, using
“self issued” OpenID Provider, which could be:
⭑ Browser plugin
⭑ Mobile wallet
Benefits include:
✓ Alignment with popular OIDC standard
✓ Backwards compatible with existing SIOP
implementations
✓ Avoids intermediary “identity providers”
3. Structured messaging
Simple authentication using DID messaging:
⭑ Out of band (e.g. call centre)
⭑ Second factor (e.g. website)
Benefits include:
✓ Real-time challenge & response
✓ Ability to gather additional information
(e.g. for knowledge-based challenge)
4. Proof presentation
Authenticate anyone, anywhere using
attributes from verifiable credentials
Enables authentication across domains with an
appropriate trust framework:
✓ Truly decentralized single sign-on
✓ No need for central repository of DIDs
✓ Can encapsulate authorization rules
✓ Can include biographical & biometric data
Safe credentials
Single sign-on without a single username
✓ Avoids unintended correlation
Selective & progressive disclosure of attributes
✓ Supports context-appropriate
authentication
Result: flexibility + privacy
How can we bridge the
old and the new?
Trust
Federation
condatis.com/ssi
Trust
Federation
Bilateral trust!
condatis.com/ssi
Trust
Federation SSI
condatis.com/ssi
Trust
Federation SSI
condatis.com/ssi
Who can i
trust?
How it looks integrated
condatis.com/ssi
How it looks integrated
condatis.com/ssi
Integrating SSI into today’s workflows and processes
condatis.com/ssi
Sequence
condatis.com/ssi
Staff Passporting
✔ Define organisations’ Trust Framework
✔ Directory service authentication (e.g., AAD)
✔ SSO between services and organisations
✔ Work with existing OIDC services
condatis.com/ssi
CULedger: Touchless credit union auth
Walk in, call in, log in
“Our members are already embracing this new
method of authentication and sharing their
excitement with our team. We’ve been told that
the enrollment process is simple and quick,
and that they feel more secure when calling
into the call center.”
Gordon Howe, President and CEO of UNIFY Financial Credit Union
Thank you
Questions?
Please drop them in the chat!
Connect with us via Twitter or Email
@evernym | info@evernym.com
@CondatisUK | info@condatis.com

More Related Content

What's hot

What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?Evernym
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityEvernym
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized IdentityJim Flynn
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinCalvin Cheng
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Evernym
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
 
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
Cordacon 2018 -   Cordentity - Hyperledger Indy + CordaCordacon 2018 -   Cordentity - Hyperledger Indy + Corda
Cordacon 2018 - Cordentity - Hyperledger Indy + CordaVasiliy Suvorov
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityPhil Windley
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Gokul Alex
 
How To Build A Career In Blockchain
How To Build A Career In BlockchainHow To Build A Career In Blockchain
How To Build A Career In Blockchain101 Blockchains
 
Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021101 Blockchains
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformEvernym
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases101 Blockchains
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
 

What's hot (20)

What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?What are Decentralized Identifiers (DIDs)?
What are Decentralized Identifiers (DIDs)?
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/SovrinFOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
 
Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)Open Source & What It Means For Self-Sovereign Identity (SSI)
Open Source & What It Means For Self-Sovereign Identity (SSI)
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
Cordacon 2018 -   Cordentity - Hyperledger Indy + CordaCordacon 2018 -   Cordentity - Hyperledger Indy + Corda
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
Trust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn IdentityTrust, Blockchains, and Self-Soveriegn Identity
Trust, Blockchains, and Self-Soveriegn Identity
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
How To Build A Career In Blockchain
How To Build A Career In BlockchainHow To Build A Career In Blockchain
How To Build A Career In Blockchain
 
Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021Top 20 Promising Blockchain Projects in 2021
Top 20 Promising Blockchain Projects in 2021
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
Meet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential PlatformMeet Verity, Evernym's Digital Credential Platform
Meet Verity, Evernym's Digital Credential Platform
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 

Similar to The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity

Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityKaryl Fowler
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Andrew Hughes
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すHyperleger Tokyo Meetup
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityGlobalSign
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Gabriella Davis
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUEWSO2
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?sorenpeter
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013Mydex CIC
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...Jean-François LOMBARDO
 
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Mark Perry
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 

Similar to The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity (20)

Introduction to Self-Sovereign Identity
Introduction to Self-Sovereign IdentityIntroduction to Self-Sovereign Identity
Introduction to Self-Sovereign Identity
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
Digital Identity Landscape for Vancouver IAM Meetup 2017 12-19
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出すTrusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017Benefits and Risks of a Single Identity - IBM Connect 2017
Benefits and Risks of a Single Identity - IBM Connect 2017
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUE
 
Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?Mature Digital Trust Infrastructure - Are we there yet?
Mature Digital Trust Infrastructure - Are we there yet?
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 

More from Evernym

What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?Evernym
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityEvernym
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSEvernym
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarEvernym
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKEvernym
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarEvernym
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFEvernym
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)Evernym
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarEvernym
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityEvernym
 

More from Evernym (10)

What makes a successful SSI strategy?
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
SSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHSSSI & Healthcare: Lessons from the NHS
SSI & Healthcare: Lessons from the NHS
 
IATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym WebinarIATA Travel Pass - Evernym Webinar
IATA Travel Pass - Evernym Webinar
 
Meet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDKMeet Connect.Me & Evernym's Mobile SDK
Meet Connect.Me & Evernym's Mobile SDK
 
The Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym WebinarThe Future of Digital Wallets - Evernym Webinar
The Future of Digital Wallets - Evernym Webinar
 
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIFVerifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
Verifiable Credentials & Legal Entity Identifiers (LEIs) | Evernym & GLEIF
 
Trust over IP (ToIP)
Trust over IP (ToIP)Trust over IP (ToIP)
Trust over IP (ToIP)
 
SSI & Digital Guardianship Webinar
SSI & Digital Guardianship WebinarSSI & Digital Guardianship Webinar
SSI & Digital Guardianship Webinar
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity

  • 1. @evernym | @CondatisUK | July 2020 The Future of Authentication How portable credentials improve security and reduce friction in authentication processes.
  • 2. On the agenda The problems with authentication today A self-sovereign identity (SSI) refresher Getting rid of passwords AND usernames Four types of SSI-enabled authentication Integrating the old and the new Partner showcases: SSI-enabled authentication in action Q&A
  • 3. Andrew Tobin Managing Director, Europe, Evernym Today’s presenters Chris Eckl Chief Technology Officer, Condatis James Monaghan VP Product, Evernym
  • 4. If you have questions…. Please enter them in the Zoom Q&A, and we’ll cover them after the presentation. Please note, this webinar is being recorded and will be available at www.evernym.com/webinars.
  • 5. Before we go on, we have two very exciting announcements Request access at www.evernym.com/plans Register at www.evernym.com/webinars
  • 6. The problems with authentication today Traditionally, authentication has revolved around usernames and “secret” things only you should know ● Passwords ● Security questions (e.g., “What is your mother’s maiden name?” “What was the name of your first pet?”) Yet, this knowledge-based method of authentication is not only all-too-easy for a malicious party to guess, it’s also a pain for all parties involved.
  • 7. A step in the right direction? Fortunately, the practice of relying on shared secrets alone is becoming less common. With federated approaches to single-sign on, individuals are able to ditch many of those 191 username/password combinations by logging in through a third party, like Facebook, Twitter, or Apple. And, with multi-factor authentication, organizations can ensure greater security by matching that “something you have” (a device) with “something you know” (a password) and/or “something you are” (a biometric). Peer-to-Peer Trust Intermediary Trust
  • 8. Yet… this all begs the question: Why do we have to “log-in” at all?
  • 9. A quick recap of the fundamentals of self-sovereign identity
  • 10. The 3 Pillars of Self-Sovereign Identity 1. secure connections 2. digital data watermarking 3. trusted, tamper-proof public key directory self-sovereign identity verifiable data verifiable connections private data exchange “The ability for people, organisations and things to , manage and control their own digital identity and relationships without needing intermediaries.”
  • 12. Verifiers Can Do 4 Checks: 1. Who created it? 2. Has it been changed? 3. Was it given only to the presenter? 4. Has it been revoked? ✅ Technical Trust Tunnel The InternetThe Internet
  • 13. Verifiers Can Do 4 Checks: 1. Who created it? 2. Has it been changed? 3. Was it given only to the presenter? 4. Has it been revoked? ✅ Technical Trust Tunnel The Internet ? The Internet
  • 14. Codifying a Digital Trust Ecosystem trustoverip.org
  • 15. What does this mean for authentication?
  • 16. SSI: The true username and password killer Username ✗ Short, memorable, human readable ✗ Often assigned by service provider ✗ Often reused across accounts Password ✗ Guessable, breakable ✗ Hard to manage ✗ Often reused across accounts Decentralized identifier (DID) ✓ Opaque, managed by wallet ✓ Generated & controlled by the user ✓ Globally unique for every account Private key ✓ Prohibitively hard to crack ✓ Managed by wallet ✓ Globally unique for every account
  • 17. Beyond two-factor Self-sovereign digital wallet combines: ● Connected device → Possession, control & consent ● Cryptographic keys → Ownership of a given account ● Verifiable credentials → 3rd party assertion of identity ● Real-time biometrics → Likeness & liveness Result: security + convenience
  • 18. The four types of SSI-enabled authentication
  • 19. 1. DID authentication Prove control over a relationship DID by signing a challenge using the private key. User initiates with their mobile wallet by: ⭑ Scanning a QR code ⭑ Clicking a link in mobile app or web page ⭑ Clicking a link via email or SMS Similar to other passwordless schemes (e.g. FIDO UAF), except: ✓ Identifier is decoupled from authenticator ✓ User can rotate their own keys Placeholder Are you logging in to Faber College? Faber College
  • 20. 2. OpenID Connect SIOP DID authentication over OpenID Connect, using “self issued” OpenID Provider, which could be: ⭑ Browser plugin ⭑ Mobile wallet Benefits include: ✓ Alignment with popular OIDC standard ✓ Backwards compatible with existing SIOP implementations ✓ Avoids intermediary “identity providers”
  • 21. 3. Structured messaging Simple authentication using DID messaging: ⭑ Out of band (e.g. call centre) ⭑ Second factor (e.g. website) Benefits include: ✓ Real-time challenge & response ✓ Ability to gather additional information (e.g. for knowledge-based challenge)
  • 22. 4. Proof presentation Authenticate anyone, anywhere using attributes from verifiable credentials Enables authentication across domains with an appropriate trust framework: ✓ Truly decentralized single sign-on ✓ No need for central repository of DIDs ✓ Can encapsulate authorization rules ✓ Can include biographical & biometric data
  • 23. Safe credentials Single sign-on without a single username ✓ Avoids unintended correlation Selective & progressive disclosure of attributes ✓ Supports context-appropriate authentication Result: flexibility + privacy
  • 24. How can we bridge the old and the new?
  • 29. How it looks integrated condatis.com/ssi
  • 30. How it looks integrated condatis.com/ssi
  • 31. Integrating SSI into today’s workflows and processes condatis.com/ssi
  • 33. Staff Passporting ✔ Define organisations’ Trust Framework ✔ Directory service authentication (e.g., AAD) ✔ SSO between services and organisations ✔ Work with existing OIDC services condatis.com/ssi
  • 34. CULedger: Touchless credit union auth Walk in, call in, log in “Our members are already embracing this new method of authentication and sharing their excitement with our team. We’ve been told that the enrollment process is simple and quick, and that they feel more secure when calling into the call center.” Gordon Howe, President and CEO of UNIFY Financial Credit Union
  • 35. Thank you Questions? Please drop them in the chat! Connect with us via Twitter or Email @evernym | info@evernym.com @CondatisUK | info@condatis.com