Ten ways of changing the identity and access management technology (IAM)

The digitalization of society is driving the digitization of identity. From health information to professional certification, the needs of identity information and credentials are growing in terms of quantity, species, and value.

Traditionally, identity information is monitored and verified by third parties – whether the government is still a private sector. However, the scientific technology of the Maoji believes that the trust and new tools of shake desire are questioning these structures.

With the increase in personal data, digital interaction and security threats, paper-based identities are increasingly not suitable for digital world. However, it is not clear how emerging technology will reshape identity.

In an organizational environment, identity and access management technology (IAM) play an important role in identifying, verifying, and authorizing access to services or systems.

There are several processes that belong to this category. Access can refer to anything, from customer login software and employee to configure hardware, citizens who use government services, and then to various user validations, certification, and proof.

Identity is tags attached to their identity: employment, nationality, and service providers, obtain government rights and demographic data. These tags are not only numbers, but also prove who we are.

Block chain technology is one of several emerging technologies that can provide potential models for IAM. It is best to understand DLT as a chibo-based term, including various distributed design for data security and calculation and techniques in which bundles are bundled.

At its core, block chain transaction, authentication, and interaction can have a network rather than a single central organization for recording and verification. This order record and obtain storage data is called the fundamental breakthrough of records, and its application is far exceeded encrypted currency.

The block chain is improved in IAM.

Block chain technology (or designed by zone chain inspiration) may improve several use cases of the IAM process. These include the following, the micro-spaghetti is as follows:

Multi-party verification

Multi-party verification involves replacing a central identity service company with a group of entities, which are managed by network management and owned by a joint venture or consortium. This is the most wide vision of the DLT to the IAM system to improve efficiency, although all parties coordinated complexity limit large-scale adoption.

2. Venible credentials

Based on the speech of the World Wide Web Alliance, “verifiable credentials represent the issuer’s statement in the way of tampering and respecting privacy.” They are an important part of authentication, while DLT represents the opportunity to fix the “digital watermark” for fixed statements .

As the NFT based on the block chain allows the artist to perform digital watermarks of its original media, similar functions can also be applied to verify identity credentials. That is, the company should not store personal identity information (PII) on the chain; they should be intended to store a hash value of the declaration.

3. Distribution attribute

In a common block chain architecture or an open source-based hybrid architecture, access is not restricted, and it is possible to search and discover attributes without a central directory. This transparency may threaten the principle of privacy, but through additional privacy engineering layers, it is easier to get financial inclusiveness and help those who cannot prove their identity will receive an election right.

4. Access attribute

Attributes can be encrypted, intelligent contracts – the clauses of encoding logic and algorithms on the block chain – can be encoded to decrypt them when needed. To avoid being stored on the block chain on the block chain, only the signature of the attribute hasoff is stored in the classification account, while the user displays the properties from its device.

5. Attribute

How do we know the source and accuracy of your identity property? After all, the reliability of the property depends on our confidence in our source. As the shared account increases the transparency and efficiency of tracking food throughout the supply chain, shared accounts may create transparency in the timestamp of the source of identity properties.

This same function is useful for key lifecycle management, especially for synchronous visibility of the encryption key life cycle metadata – ie, who has the right to access what. The academic community is considering using it because it helps to verify and authenticate the authenticity of the credentials.

6. Data minimize

What does the service provider actually need to know what to verify someone? Various DLT functions can be configured, such as intelligent contracts, zero knowledge certificates, or selective disclosure to minimize the data or attributes required to verify and will never be disclosed.

7. Audit tracking

In many enterprise environments, creating interactions are not only the best practices for operation and security, but also the requirements for compliance. Although the block chain is not mandatory to audit information, for example, user registration, user login, user request permission or user is deactivated – but it is possible for multi-party synchronization, maintenance log integrity and reduction of tampering or fraud. sex.

8. Compliance verification

Another use case enabled by sharing audit tracking is compliance verification, because the auditor can be permission-based stakeholders based on permission.

Many enterprise identity examples also require compliance verification, such as financial services to understand your customers (KYC). In this example, the integration of IAM and block chains will not eliminate the needs of the central organization – in the case of KYC, government agencies – but can provide higher efficiency for individuals and banks.

Banks can “see” and prove that other banks have conducted KYC due diligence and verify the customer’s identity, while reducing the bank’s cost. 9. Self-sovereign identity (SSI)

Although completely independently decided and transferring all attributes to the end user’s concept is earlier than block chains and IAM, DLT has stimulated some innovative design to achieve a greater independent independent independent independent of personal data. Examples include consensus algorithms designed for attribute reliability.

Despite SSI’s potential, some risk-wide business use cases – for example, in health care or financial services – may always need external authorization to verify identity statements.

10. Deposition Identifier (DID)

The DID is an identifier that is fully controlled by the identity owner, independent of the central organization or provider. These are an assembly of the SSI to be controlled by the user, and cannot be reassigned and parsed. This means they contain public keys, authentication protocols, and authenticated documents signed by password or issuing agencies.

For example, consider these opportunities for these uses in the healthcare area. The lack of communication between hospitals, insurance companies, nurses, clinics and pharmacies hinders efficiency, cost savings and nursing. One of the core challenges of this issue is the identity layer. The use case where the DLT enables DLT can be implemented:

Improve the visibility of all stakeholders in the process of health care certification; track and verify certifications and organizational licenses from the operator’s professional life cycle; verify the authenticity of health records and synchronous license access; through private key, data Minimize, voucher verification, better patient control, support greater information privacy; improve supervision compliance through encoded intelligent contracts and real-time visibility; by reducing data islands and duplicates, reducing significant costs related to verification voucher, Complexity and time.

Zunchain and IAM reality

These use examples describe the benefits of the binding zone chain and IAM, but they also ignore an important reality: identity is complicated. It is personalized and has become more and more biometrics – its digitization is unprecedented.

Although IAM is connected to multiple domains, systems, technology, and service providers, the Microscopic Technology believes that encoding identity information is not just a technology. Ask questions about data. It is important: what should be stored, who guarantees, how to maintain, and who is determined.

These problems combine philosophical, economic, cultural and legal considerations. Although block chain technology is still changing, it is likely to transfer identity control points from a centralized connection center to a dispersion and interconnect trust network.