[Openid-specs-ab] Replacement to "User-Centric Identity" complete + another terminology topic: alternative to a "credential"?

Nat Sakimura nat at nat.consulting
Wed Apr 20 03:15:05 UTC 2022


I prefer User-Controlled or User-Driven over User-Centric as
1) it will not have negative connotations against our existing standards,
which have always been User-Centric; and
2) it conveys the active feeling rather than a static one like "user is at
the centre".

There is a merit and demerit for "Controlled" and "Driven".
"Control" does have legal connotations as in data controller while "Driven"
is free from that.

I kind of like "Driven" better as
1) users usually do not want to control themselves;  and
2) "drivers" still get consumer protection,
but I do understand the merit of being able to directly relate to
"controller, processor, third-party" categorization.

Best,

Nat sakimura




2022年4月20日(水) 11:00 nadalin--- via Openid-specs-ab <
openid-specs-ab at lists.openid.net>:

> I would prefer User Driven but I’m ok with User Centric, need to stay away
> from decentralized as that is a bag of worms. While I don’t like SSI for
> the same reasons that decentralized is a broken concept so is SSI.
>
>
>
> *From:* Openid-specs-ab <openid-specs-ab-bounces at lists.openid.net> *On
> Behalf Of *David Chadwick via Openid-specs-ab
> *Sent:* Tuesday, April 19, 2022 1:21 AM
> *To:* openid-specs-ab at lists.openid.net
> *Cc:* David Chadwick <d.w.chadwick at verifiablecredentials.info>
> *Subject:* Re: [Openid-specs-ab] Replacement to "User-Centric Identity"
> complete + another terminology topic: alternative to a "credential"?
>
>
>
> Kristina, thanks for re-writing the Introduction.
>
> My personal opinion is that "User Controlled" is a better term than
> "User-Centric". The two letter acronym is still the same (IC), but if you
> replace user-centric with user controlled in your introduction, I think it
> reads better,
>
> Kind regards
>
> David
>
>
>
> On 19/04/2022 09:05, Kristina Yasuda via Openid-specs-ab wrote:
>
> Also as promised, I did write up an introduction that more clearly
> positions the thinking of the WG around why “User-Centric” and not another
> term. The language definitely needs tweaking, but would appreciate the
> feedback if people agree with the direction (especially, Nat, John, Mike,
> Vittorio, Tobias, DW, and the small group of editors 😊)
>
>
>
> We all know how much the industry is used to the terms “SSI” and
> “Decentralized Identity” so if we are making a conscious decision to use
> another term even when meaning something quite similar (especially to the
> decision-making folks), it has to be crystal clear why, hence quite
> straightforward language below:
>
>
>
> ---
>
> *Introduction *
>
> OpenID Connect, a protocol that has enabled deployment of federated
> Identity at scale, was built with User-Centricity in mind. The protocol
> flow is designed to provide Identity Providers a capability to directly
> talk to the End-User to obtain consent before releasing claims about that
> End-User to the Relying Party. The protocol also enables the End-Users to
> run their own Identity Providers instead of using third party provided ones.
>
>
>
> Now, the User-Centricity is evolving to the next level, where the
> End-Users retain full control over the key decisions when receiving
> identity information from the Credentials Issuers, and when presenting
> those credentials to the Verifiers. The End-Users can now directly receive
> their identity information as credentials from the Issuers and present
> those credentials to the Verifiers without Verifiers obtaining those user
> claims from the Issuer. This is an obvious evolution from a federated
> Identity protocol flow where after receiving the End-User’s consent, the
> Identity Provider directly provides the Verifier with the identity
> information about the End-User.
>
>
>
> When describing the concept of putting the End-User in control of their
> identity, the readers might be more familiar with the terminology
> Self-Sovereign Identity or Decentralized Identity. This whitepaper could
> have used those terms, too. However, after numerous long discussions,
> Connect WG in OpenID Foundation has decided to use a term User-Centric
> Identity to describe both a vision and an architecture of this new,
> emerging approach to the identity management.
>
>
>
> The Connect WG could not reach consensus to use the term Self-Sovereign
> Identity because Self-Sovereignty implies the End-User’s autonomy and
> freedom from the Issuers and the Verifiers, which is not the case in
> real-life use-cases. Even if the Verifier has obtained the claims directly
> from the End-User, it is up to the Verifier to decide whether to accept
> those credentials and provide the service to the End-User. Regardless of
> where the End-Use is planning to use a credential, it is up to the Issuer
> to decide whether to issue credential to the End-User in the first place.
> Even after the issuance, in most cases, the Issuer retains the right to
> revoke and invalidate the credential.
>
>
>
> The Connect WG also could not reach consensus to use the term
> Decentralized Identity because decentralized implementation techniques have
> their role to play, but they are neither necessary nor sufficient to
> achieve user centric identity. For the End-Users to directly receive
> identity credentials from the Issuers and directly present them to the
> Verifiers, user identifiers other than Decentralized Identifier (DIDs) can
> be used, meaning that Distributed Ledger Technology or Blockchain is not
> required and data models other than W3C Verifiable Credentials can be used.
>
>
>
> Therefore, the goal of this whitepaper is to first and foremost to inform
> the audience about the work on the OpenID for User-Centric Identity
> (OpenID4UCI) specification family and help position it in the broader
> landscape of Self-Sovereign Identity and Decentralized Identity. The work
> is being conducted in the OpenID Foundation, in liaison with the
> Decentralized Identity Foundation (DIF). .
>
>
>
> The whitepaper targets decision-makers, architects and implementers
> interested in the concepts, use-cases and architecture where the End-User
> directly receives identity credentials from the Issuer and directly
> presents them to the Verifier, a concept that will be referred to as
> “User-Centric Identity” in this whitepaper.
>
> ---
>
>
>
> Thank you!
>
> Kristina
>
>
>
> *From:* Openid-specs-ab <openid-specs-ab-bounces at lists.openid.net>
> <openid-specs-ab-bounces at lists.openid.net> *On Behalf Of *Kristina Yasuda
> via Openid-specs-ab
> *Sent:* Monday, April 18, 2022 6:08 PM
> *To:* Openid-specs-ab at lists.openid.net
> *Cc:* Kristina Yasuda <Kristina.Yasuda at microsoft.com>
> <Kristina.Yasuda at microsoft.com>
> *Subject:* [Openid-specs-ab] Replacement to "User-Centric Identity"
> complete + another terminology topic: alternative to a "credential"?
>
>
>
> Hi, thanks a lot for a productive conversation regarding the terminology
> in the “OpenID for User-Centric Identity (preliminary naming)” whitepaper
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1H556GIM_xD1yKl7rw1seq4bu83movFCkU8fQ7T8b1dI%2Fedit&data=05%7C01%7CKristina.Yasuda%40microsoft.com%7C8fb4bcc61b63463b182b08da21a106ef%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637859273185651256%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=yX9Q7MJ%2B%2FB2PMnYUBNMrXfj5vrYAsrFeNyUCkH2JaaQ%3D&reserved=0>
> – the details of the conversation will be in the notes that will be sent
> out.
>
>
>
> As agreed, I replaced all the references to the “Decentralized Identity”
> to “User-Centric Identity” (Thanks Mike for making the suggestions). As
> agreed, if you come up with a better term than “User-Centric”, please bring
> it up. We are looking for “a generic property that transcend the topology
> we are working with at this point in time (I really like how Vittorio has
> put it!)” that describes “an approach to the identity management where the
> End-User retains full control over from which Credential Issuer to obtain
> what credential, and when to disclose which credential to which Verifier
> (again, paraphrasing Vittorio)”. (and now I am not a big fan of an acronym
> OpenID4UCI, so acronym suggestions welcome too..)
>
>
>
> Another terminology topic I wanted to bring up is inspired by Pieter’s
> comment on the definition of “Credential”: “It was interesting to see
> terminology in the EU Digital Wallet architecture like "Electronic
> Attribute Attestation" (EAA) that may provide alternatives to the heavily
> overloaded "credential". Not sure it is the right time to adopt it, but may
> be a good way to disambiguate terms like credential (and align with
> frameworks emerging elsewhere).”
>
> I agree with Pieter both in that EAA might be an alternative, and in that
> maybe this is whitepaper V2 issue… Some food for thought.
>
>
>
> Cheers,
>
> Kristina
>
>
>
> _______________________________________________
>
> Openid-specs-ab mailing list
>
> Openid-specs-ab at lists.openid.net
>
> https://lists.openid.net/mailman/listinfo/openid-specs-ab
>
> _______________________________________________
> Openid-specs-ab mailing list
> Openid-specs-ab at lists.openid.net
> https://lists.openid.net/mailman/listinfo/openid-specs-ab
>


-- 
Nat Sakimura
NAT.Consulting LLC
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-ab/attachments/20220420/c50fa627/attachment.html>


More information about the Openid-specs-ab mailing list