Using Consumer Identities for Business Interactions
Microsoft's Kim Cameron writes on his Identity Blog:
Posted on Saturday 10 July 2010
Mike Jones writes about an “identity mashup” that drives home a really important lesson: the organizational and technical walls that used to stand in the way of Internet business are dissolving before our very eyes. The change agent is the power of claims. The mashup Mike describes crosses boundaries in many dimensions at once:
- between industries (medical, financial, technical)
- between organizations (Medtronic, PayPal, Southworks, Microsoft)
- between protocols (OpenID and SAML)
- between computing platforms (Windows and Linux)
- between software products (Windows Identity Foundation, DotNetOpenAuth, SimpleSAMLphp)
- between identity requirements (ranging from strong identity verification to anonymous comment)
This is a super-concrete demonstration of the progress being made on the “Identity Metasystem” so many of us in the industry have been working on. My favorite word in Mike’s piece is “quickly”, to which I have taken the liberty of adding my own emphasis:
Medtronic, PayPal, Southworks, and Microsoft recently worked together to demonstrate the ability for people to use their PayPal identities for participating in a Medtronic medical device trial, rather than having to create yet another username and password. Furthermore, the demo showed the use of verified claims, where the name, address, birth date, and gender claims provided by PayPal are relied upon by Medtronic and its partners as being sufficiently authoritative to sign people up for the trial and ship them the equipment. I showed this to many of you at the most recent Internet Identity Workshop.
From a technology point of view, this was a multi-protocol federation using OpenID and WS-Federation – OpenID for the PayPal identities and WS-Federation between Medtronic and two relying parties (one for ordering the equipment and one for anonymously recording opinions about the trial). It was also multi-platform, with the Medtronic STS running on Windows and using the Windows Identity Foundation (WIF) and DotNetOpenAuth, the equipment ordering site running on Linux and using simpleSAMLphp, and the opinions site running on Windows and also using WIF. A diagram of the scenario flows is as follows:
We called the demo an “identity mash-up” because Medtronic constructed a identity for the user containing both claims that came from the original PayPal identity and claims it added (“mashed-up”) to form a new, composite identity. And yet, access to this new identity was always through the PayPal identity. You can read more about the demo on the Interoperability @ Microsoft blog, including viewing a video of the demo. Southworks also made the documentation and code for the multi-protocol STS available.
I’ll close by thanking the teams at PayPal, Medtronic, and Southworks for coming together to produce this demo. They were all enthusiastic about using consumer identities for Medtronic’s business scenario and pitched in together to quickly make it happen.