Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Difference between revisions of "I-Card Provider"

(Overview)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
==Overview==
+
===Overview===
* An [[I-Card Provider]] is responsible for instantiating and managing [[I-Card]] instances that implement the [[I-Card Interfaces]]
+
* An [[I-Card Provider]] is responsible for instantiating and managing [[I-Card]] instances that implement [[I-Card Interfaces]]
 
* A Provider is also responsible for importing I-Cards from one of the supported card data formats.  
 
* A Provider is also responsible for importing I-Cards from one of the supported card data formats.  
  
Line 7: Line 7:
 
# Cardspace-compatible Managed provider
 
# Cardspace-compatible Managed provider
 
# CardSpace-compatible Personal provider
 
# CardSpace-compatible Personal provider
# URI Managed provider. Card Examples:
+
# URI Managed provider
#* LDAP directory card: provides a view of the user's identity data stored on an enterprise HR directory
+
# URI Personal provider
# URI Personal provider. Card examples:
+
#* Username & Password - each card stores one of the user's unique un/pw combinations (pullled from browser's password manager)
+
#* Single Website - stores a copy of user's personal information on a website (e.g. linkedin.com, flikr, etc.)
+
#* Persona/Role {e.g. Shopping, Buying, Travel, Home&Personal, Health, Friends, Family} cards --for the multiple hats the user wears
+
  
==CardSpace-compatible I-Card Provider==
+
===CardSpace-compatible Managed I-Card Provider===
* This provider will support interoperability with CardSpace relying parties and CardSpace/WS-Trust compatible IdPs.
+
* Retreives signed security tokens from CardSpace-compatible IdP/STSes and acceptable by CardSpace-compatible RPs
* It will support both ''managed'' and ''self-issued'' CardSpace-compatible I-Cards
+
* Imports CardSpace-format managed card files
* It will be able to import CardSpace-format managed cards
+
  
====Self-issued and Managed Cards====
+
===CardSpace-compatible Personal I-Card Provider===
* Are single [[Digital Subject]] [[I-Card]]s
+
* Creates (using the local Higgins [[Token Service]]) a signed security tokens from attributes stored in IdAS. Assuming self-signecd tokens are allowed, this provider creates tokens are acceptable by CardSpace-compatible RPs
* The [[I-Card]]s implements the ''I-Card'' and ''TokenIssuerCard'' [[I-Card Interfaces]]:
+
* Imports CardSpace-format personal card files and transfers the stored values of claims to IdAS for later retrieval
* The ''TokenIssuerCard'' impl code manages the metadata necessary to request a [[Digital Identity]] token from a local or remote STS
+
  
====Self-Issued Cards====
+
===URI Managed I-Card Provider===
* The self-issued card instances will implement the ''IdASCard'' interface (see [[I-Card Interfaces]])
+
* This provider manages cards whose associated IdAS context is managed by some external entity. The provider impl uses IdAS to access attribute values.
* The ''TokenIssuerCard'' impl code will leverage a local STS that can create Idemix compatible-tokens (in addition to the usual CardSpace-compatible token types)
+
* Card Examples:
* The ''IdASCard'' impl code manages manages the metadata necessary to retreive claims that are provided to the local STS [[Token Issuer]]
+
#* LDAP directory card: provides a view of the user's identity data stored on an enterprise HR directory
  
==IdAS Channel I-Card Provider==
+
===URI Personal I-Card Provider===
<to be written> Describe this implementation of the ChannelCard I-Card interface
+
* This provider manages cards whose associated IdAS context was created by the user and over which the user is authoritative.
 +
* Card Examples:
 +
* Persona/Role {e.g. Shopping, Buying, Travel, Home&Personal, Health, Friends, Family} cards --for the multiple hats the user wears
 +
* Website - stores a copy of the personal information about a user that the user has entered into a website (e.g. linkedin.com, flikr, etc.)
 +
#* Username & Password - each card stores one of the user's unique un/pw combinations (pullled from browser's password manager)
  
 
==See Also==
 
==See Also==

Revision as of 18:45, 18 December 2006

Overview

  • An I-Card Provider is responsible for instantiating and managing I-Card instances that implement I-Card Interfaces
  • A Provider is also responsible for importing I-Cards from one of the supported card data formats.

The Higgins project is developing these I-Card Providers:

  1. Cardspace-compatible Managed provider
  2. CardSpace-compatible Personal provider
  3. URI Managed provider
  4. URI Personal provider

CardSpace-compatible Managed I-Card Provider

  • Retreives signed security tokens from CardSpace-compatible IdP/STSes and acceptable by CardSpace-compatible RPs
  • Imports CardSpace-format managed card files

CardSpace-compatible Personal I-Card Provider

  • Creates (using the local Higgins Token Service) a signed security tokens from attributes stored in IdAS. Assuming self-signecd tokens are allowed, this provider creates tokens are acceptable by CardSpace-compatible RPs
  • Imports CardSpace-format personal card files and transfers the stored values of claims to IdAS for later retrieval

URI Managed I-Card Provider

  • This provider manages cards whose associated IdAS context is managed by some external entity. The provider impl uses IdAS to access attribute values.
  • Card Examples:
    • LDAP directory card: provides a view of the user's identity data stored on an enterprise HR directory

URI Personal I-Card Provider

  • This provider manages cards whose associated IdAS context was created by the user and over which the user is authoritative.
  • Card Examples:
  • Persona/Role {e.g. Shopping, Buying, Travel, Home&Personal, Health, Friends, Family} cards --for the multiple hats the user wears
  • Website - stores a copy of the personal information about a user that the user has entered into a website (e.g. linkedin.com, flikr, etc.)
    • Username & Password - each card stores one of the user's unique un/pw combinations (pullled from browser's password manager)

See Also

Back to the top