A question of verification and authentication

It is now over a year since the Jericho Forum announced its commandments around identity management and how identity and access management technology should work.

The concept was that people should be in control of their identity, rather than companies controlling access and determining logins. Jericho Forum claimed that its commandments “represent a set of open and interoperable principles that IT professionals can use to build a user-centric security framework within their organisations”. They were as follows:

1. All core identities must be protected to ensure their secrecy and integrity

2. Identifiers must be able to be trusted

3. The authoritative source of identity will be the unique identifier or credentials offered by the persona representing that entity

4. An entity can have multiple separate persona (identities) and related unique identifiers

5. Persona must, in specific use cases, be able to be seen as the same

Continue reading here…