Identity management across the enterprise

This article was originally published in VSJ, which is now part of Developer Fusion.
Identifying individuals has become an ever increasing challenge as technology grows ever more sophisticated and diverse, and the world’s national boundaries blur.

Identity theft and evasion loses governments, businesses and individuals billions of pounds in lost and stolen revenue. Information systems often hold vast amounts of data on individuals that could be used to reduce identity fraud.

In this article we’ll explore a conceptual solution to identity management.

There are many legislative implications to the proposal set out here. For the sake of simplicity, these implications are set aside.

There are many examination techniques used to establish an individual’s identity. Some are better than others. Common methods in use today include:

  1. Email/letter/call to address held on file
  2. Bank Account crediting
  3. Interview screening
  4. Circle of Trust
Often these techniques are combined.

Once identity has been established to a probable extent, it is often necessary to retain this knowledge. Typically this is performed by issuing a “synthetic secret”, such as username and password; by issuing signed evidence, e.g. Membership/ identity card, passport, apostille, X.509, Kerberos or some other token; or by capturing information such as biometric information from the individual.

Verifying an identity

There are two common methods of verifying a subject’s identity.
  1. “I am who I say I am”
  2. “I am who I say I am and he/ she says so too”
Verifying an identity depends on an identity having been previously established to a degree of probability. The more established evidence held on file that an individual is who they say they are, and the more evidence offered by that individual, the greater the probability that the claim is valid.

It seems unlikely that anyone’s identity can be established for certain. Therefore an identity could be given a score as to its likelihood to be the identity of the verification subject.

Individuals often have multiple personas, such as married names, nicknames, and adoptive names. Occasionally individuals change their persona altogether, such as transsexuals, criminals and witnesses. Therefore it would seem sensible for an identity to be composed of many personas, and since the identity is only ever probable, it would seem sensible to allow a persona to associate with many identities, as shown in Figure 1 and again in Figure 2 which presents the same idea using object relational modelling.

Figure 1
Figure 1: Probable Identity

Figure 2
Figure 2: Probable Identity ORM view

As there are many ways of establishing (to a probable extent) an identity, so many forms of evidence are built up over time for a given persona. The more forms of evidence held against a persona, the greater the probability that the persona is valid.

A common issue in information systems is the issue of duplicate identities or “duplicate record syndrome”. This often results in costly data-cleansing exercises or workarounds such as record chaining and linking. I propose that multiple identities are embraced and accepted, and rated as to their likelihood to be the identity of the individual in question.

Thus, an individual may have established multiple identities. These identities may consist of one or more personae, each supported by one or more items of evidence.

An Identity Management Service

An identity management service would therefore provide two facilities – identity establishment and identity verification.

Our identity establishment endpoint subcontracts the task of establishing an individual’s identity to the Establishment Actor, which could perform identity establishment in one or many ways. Figure 3 shows that in this instance the establishment actor uses an Identity Broker and the “Circle of Trust” paradigm, connecting to other Identity Management Services.

Figure 3
Figure 3: An Identity Management Service

Different Establishment Actors will establish an individual’s identity to varying extents of probability, and perhaps multiple Establishment Actors could be employed to establish an individual’s identity, increasing the probability of a valid identity being established.

It will never be possible to guarantee the veracity of an individual’s identity claim. Our identity verification endpoint depends on a two-way supply of evidence; from our identity verification subject and from our Establishment Actor in order to build an identity profile with a high probability of matching the identity claims of the individual.

The Circle of Trust

The circle of trust is a frequently used and I feel important identity verification technique. Confidence tricksters, cult leaders and other charismatic individuals often rely on isolating their targets in order to exclude them from a trusted peer group; this allows them to sponsor trust from their target, who might otherwise mistrust them based on peer feedback.

By establishing a circle of trust that can be polled for feedback based on the claims evidenced by the individual, the probability that the claim is valid can be further boosted (or denied).

Conclusion

An individual’s claim to an identity will never be fully trustworthy. By accepting that as fact and working with multiple probable identities for an individual, significant gains could be made in the management of the risk associated with identity verification. The goal should be to offset the risk to the information or assets under safeguard with the probability that the individual can be held accountable for their actions through their claimed identity.


Robbie Gibbon is an Enterprise Architecture practitioner in the Banking, Health, and Government sectors, specialising in Systems Integration based around the SOA paradigm.


Terminology

  • Establish – To identify an individual. To associate an identifier with an individual.
  • Verify – To authenticate the identity claims of an individual.
  • Evidence – Artefacts offered in support of an identity claim.
  • Persona – A collection of related evidence that forms a pseudo-identity. An Identity may be constructed of a number of personae.

You might also like...

Comments

Contribute

Why not write for us? Or you could submit an event or a user group in your area. Alternatively just tell us what you think!

Our tools

We've got automatic conversion tools to convert C# to VB.NET, VB.NET to C#. Also you can compress javascript and compress css and generate sql connection strings.

“A computer is a stupid machine with the ability to do incredibly smart things, while computer programmers are smart people with the ability to do incredibly stupid things. They are, in short, a perfect match” - Bill Bryson