Published on 00/00/0000
Last updated on 00/00/0000
Published on 00/00/0000
Last updated on 00/00/0000
Share
Share
INSIGHTS
12 min read
Share
In a world that revolves around online transactions, we use our digital identity at work, at home, and across every app, service, and device. Users must register for an account with a different username anf password for every service provider with whom they wish to engage, and in such systems, the user’s identity is managed by each service provider.
Our identity and digital interactions are owned and controlled by other parties, some of whom we aren’t even aware of. Access to our IDs can be removed at any time by external parties and security of the information we send to perform minimal transactions may be easily compromised. We grant consent to many apps and devices, which requires a high degree of vigilance to track who has access to what information.
For enterprises, collaboration requires complex orchestration to securely exchange data. Centralized and federated systems are the main identity models and neither has provided an identity service that is both private and easy to use. Users want more secure transactions with less overhead for them. Toward this end, a new ecosystem is evolving based on a concept known as decentralized identity.
The Decentralized Identity Model describes how to handle scenarios when working over the internet in a secure manner that respects users' privacy. It is based on distributed ledger technology (e.g., blockchain) and provides users with the ability to prove their identity without giving it away.
The Decentralized Identifiers (DID) ecosystem employs the following building blocks:
[caption id="attachment_4672" align="aligncenter" width="500"] Figure 2: Sample verifiable presentation[/caption]
The distributed ledger/data registry acts as the source of truth in place of a central authority. The identity information is not held on the ledger but within a wallet managed by the user. Ledgers store keys (or other) to prove the validity of the claims and presentations presented to by the holder to the verifier.
The personas in the DID ecosystem are termed issuers, holders, and verifiers. Certified credential issuers of credentials attest that the user’s proof is accurate and create verifiable credentials signed with their DID and the users’ DIDs. The holder can then present the verifiable credentials as proof of their identity to any verifier that requests it. Verifiers can verify that the proofs are true via a distributed ledger.
Users create a decentralized identity (DID) for each piece of information to be shared. An issuer validates the DID and records the proof in a publicly distributed ledger and returns a verifiable credential (VC) with the issuer's signature. The user/holder of the VC then stores it in a digital wallet. For the holder of a VC to make a verifiable claim using the VC to prove an identity, the holder signs the VC, and creates a verifiable presentation of the claimed identity. The holder then submits it to the verifier who validates the presentation using the proof from the distributed ledger.
A full view of the DID ecosystem and data flow is depicted below in Figure 3:
To best illustrate the ecosystem data flow let us look at an example. Say,
Woodgrove is deploying a verifiable credential (VC) solution to provide a more manageable way for Alice to prove she is an employee of Woodgrove. To enable Alice to use her VC the following setup takes place:
The W3C working group is defining a standard syntax for decentralized identifiers, documents, presentations, and verifiable credentials using the components defined below.
A DID subject is the entity identified by the DID; anything can be the subject of a DID: person, group, organization, thing, or concept or even the DID controller. A DID controller is the entity - person, organization, or autonomous software - that has the capability to make changes to a DID document. This capability is typically asserted by the control of a set of cryptographic keys used by software acting on behalf of the controller. A DID might have more than one controller and a DID subject can be one of the DID controllers. A DID method is the mechanism by which a particular type of DID and its associated DID document is created, resolved, updated, and deactivated. It is defined using separate DID method specifications. A DID resolver is a system component that takes a DID as input and produces a conforming DID document as output. This process is called DID resolution. The steps for resolving a specific type of DID are defined by the relevant DID method specification. A DID URL de-referencer is a system component that takes a DID URL as input and produces a resource as output.
Examples:
A simple example of a verifiable credential:
{
// set the context, which establishes the special terms we will be using
// such as 'issuer' and 'alumniOf’.
"@context": [ "https://www.w3.org/2018/credentials/v1", "https://www.w3.org/2018/credentials/examples/v1" ],
// specify the identifier for the credential
"id": "http://example.edu/credentials/1872",
// the credential types, which declare what data to expect in the credential
"type": ["VerifiableCredential", "AlumniCredential"],
// the entity that issued the credential
"issuer": "https://example.edu/issuers/565049",
// when the credential was issued
"issuanceDate": "2010-01-01T19:23:24Z",
// claims about the subjects of the credential ”
credentialSubject": {
// identifier for the only subject of the credential
"id": "did:example:ebfeb1f712ebc6f1c276e12ec21",
// assertion about the only subject of the credential
alumniOf": {
"id": "did:example:c276e12ec21ebfeb1f712ebc6f1",
name": [
{ "value": "Example University", "lang": "en" },
{ "value": "Exemple d'Université", "lang": "fr" }
]
}
},
"// digital proof that makes the credential tamper-evident
// see the NOTE at end of this section for more detail
"proof": {
// the cryptographic signature suite that was used to generate the signature
"type": "RsaSignature2018",
// the date the signature was created
"created": "2017-06-18T21:19:10Z",
// purpose of this proof
"proofPurpose": "assertionMethod",
// the identifier of the public key that can verify the signature
"verificationMethod": "https://example.edu/issuers/565049/keys/1",
// the digital signature value
"jws": "eyJhbGciOiJSUzI1NiIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..TCYt5X sITJX1CxPCT8yAV-TVkIEq_PbChOMqsLfRoPsnsgw5WEuts01mq-pQy7UJiN5mgRxD-WUc X16dUEMGlv50aqzpqh4Qktb3rk-BuQy72IFLOqV0G_zS245-kronKb78cPN25DGlcTwLtj PAYuNzVBAh4vGHSrQyHUdBBPM"
}
}
The Decentralized Identity Foundation (DIF) is an engineering-driven organization focused on developing the foundational elements necessary to establish an open ecosystem for decentralized identity and ensure interop between all participants. Their vision is to enable a world where decentralized identity solutions allow entities to gain control over their identities and allow trusted interactions, and currently entertain an extensive membership. The OpenID Foundation is a nonprofit international standards development organization that is promoting the OpenID community and technologies. The World Wide Web Consortium (WC3) working group is leading the way in defining the syntax and standards for DID components. [caption id="attachment_4668" align="aligncenter" width="500"] Figure 6: Microsoft DID Ecosystem[/caption] Microsoft has pioneered the way with its own complete ecosystem based on Microsoft Azure AD Verifiable Credentials. Their ecosystem components include (1) W3C Decentralized Identifiers (DIDs) as the document and data, (2) an Azure Identity Overlay Network (ION) Node – did:ion – as their decentralized data registry, (3) the Microsoft Authenticator App as the user’s digital wallet, (4) the Microsoft Resolver an API that connects to their ION node to look up and resolve DIDs using the did:ion method and return the DID Document Object (DDO), and (5) the Microsoft Azure Active Directory Verified Credentials Service which is an issuance and verification service in Azure that uses a REST API for W3C Verifiable Credentials that are signed with the did:ion method. It enables identity owners to generate, present, and verify claims, and forms the basis of trust between users of the systems. Microsoft Partner service providers include Acuant, AU10TIX Identity Intelligence, CLEAR, IDEMIA, Jumio, LexisNexis Risk Solutions, Onfido, Socure, and Vu. Pilots are underway in Government of Flanders in Belgium, at the National Health System in the United Kingdom, and at Keio University Tokyo Japan.
I applaud Microsoft for leading the way into data privacy ecosystems, enabling users to parallel using physicalidentification with a secure privacy preserving digital solution. Part of Microsoft’s business model is likely based on having users of their DID ecosystem register with Microsoft Azure ActiveDirectory, thus increasing their client base.
However, as consumers become acquainted with and use their ecosystem, and as other ecosystems hopefully arise, users will prefer and eventually demand DID based ecosystems for their transactions, rather than having to submit personal ID numbers, birth date, and more to order lunch. It is still early in the game and the arena is open for big players to join and secure a good portion of the market.
To continue reading about how security works in the modern world, check out our post on cloud security posture management.
Get emerging insights on innovative technology straight to your inbox.
Discover how AI assistants can revolutionize your business, from automating routine tasks and improving employee productivity to delivering personalized customer experiences and bridging the AI skills gap.
The Shift is Outshift’s exclusive newsletter.
The latest news and updates on generative AI, quantum computing, and other groundbreaking innovations shaping the future of technology.