You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Participants

Proposers
NameOrganisation
Mikael LindenCSC/ELIXIR
GN4-3 project team
NameOrganisationRole
Alan
PI, Team Member
Jule
Scrum Master, Team Member
Branko
Team Member
(Sergio)
Team Member


Stakeholders

#Enter the persons who are internal projects or external stakeholders of this Activity - delete this line after using the template#

Name

Organisation

Role 
Mikael L.CSC/ELIXIR
Niels and othersSURF
Maarten K.SURF/ Assurance Community

Activity overview

Description

In the past years, technology for validating a user's identity using a combination of a mobile phone, an identity document like a passport with NFC chip and improvements in real time facial recognition technology, have made real time, remote and trusted identity validation viable. As a result several vendors are now offering such a service, such as READ.ID and SisuID.

In the R&E community there are multiple use cases for this kind of technology. Two very dominant cases are:

  • Identity vetting for research communities, typically as part of the onboarding of a user into the community. This use case [1] was brought up by CSC/Elixir and there are indications also BBMRI and Lumi EuroHPC project would benefit from such capabilities.
    The use case was also previously identified in the work in the incubator on identity vetting and 2FA token binding and led to an activity that integrated with the READ.ID service. In addition, eduTEAMS has shown interest in having this capability.
  • Identity vetting for foreign students who are enrolling into a campus. This scenario was brought up by SURF, and CSC expressed interest in such a capability as well.

Other potential use cases may include the use of a passport as a way to do token recovery of 2FA tokens.

Previous work in the incubator (on READ.ID) and also within CSC/Elixir (on SisuID) have shown that on the technical side implementation of such services which are offered by vendors is not too difficult for a skilled technical team. However, typically the APIs and interfaces offered by the vendors do not align well with commonly used APIs in the R&E community. Furthermore, while the vendors services provide similar capabilities highlevel, there are some differences e.g in LoA which can be established and in user experience.

This activity will investigate the business case for creating and operating a neutral, pan EU identity validation broker, targeted toward EU research and education use cases. The platform should offer (one or more) standardized APIs towards consuming services (SAML/OIDC/REST), while engaging with multiple platforms offering identity validation capabilities. For vendors the platform should be an open platform. This multi vendor strategy will allow NRENs, Campuses, Research Communities and perhaps even end users to make their own choices about which vendors to engage with, while still benefiting from standardized interfaces and economies of scale.

The platform and its operator should take care of integration with the vendors as well as take care of technical, legal and security considerations that come with the operation of such a platform.

Activity goals

#Please describe the goals of Activity, including what needs to be delivered, participants, the community(ies) that require a solution. Describe when the Activity is done and how to measure the success of it, in a SMART way. - delete this line after using the template#

<Enter here>

Activity Details

Technical details

#Please describe the technical details for the Activity. - delete this line after using the template#

<Enter here>

Business case

#What is the business case for the Activity? Who would be beneficiaries of the results of the Activity and what would potential business case look like if applicable? - delete this line after using the template#

<Enter here>

Risks

#Are there risks that influence either the implementation of the activity or its outcomes? - delete this line after using the template#

<Enter here>


Data protection & Privacy

#How do data protection and privacy impact the Activity? Think about e.g. handling of personal data of users - delete this line after using the template#

<Enter here>


Definition of Done (DoD)

#Please describe here the set of criteria that the product must meet in order to be considered finished. - delete this line after using the template#

<Enter here>


Sustainability

#How are the results of the Activity intended to be used? If this requires further engagement, can you describe how you intent to sustain it? - delete this line after using the template#

<Enter here>

Activity Results

Results
#Please provide pointers to completed and intermediary results of this activity - delete this line after using the template#

Meetings

Date

Activity

Owner

Minutes

January 1, 2017

Kickoff meeting



















Documents

No files shared here yet.



  • No labels