- From: Eric Korb <eric.korb@accreditrust.com>
- Date: Tue, 3 Feb 2015 07:17:46 -0500
- To: Anh Nguyen <anh@anhnguyen.name>, public-credentials@w3.org, ba-standard@googlegroups.com
- Message-ID: <CAOyPhN+AzzUCBBO56-PZ9bVrTudUD83t6Zx2yuUCBAc1LPZGtA@mail.gmail.com>
@Anh You bring up some excellent points that we have been discussing @OCG. Although it may seem that some of what is being proposed may be "overkill" and/or requires adoption by a larger ecosystem, that's because it exists. IMHO identity credentials spans across industry, organizations, business, government and education. The goal is to build a specification that is as inclusive as possible, allowing for privacy, portability, extensibility and security. On Feb 3, 2015 12:29 AM, "Anh Nguyen" <anh@anhnguyen.name> wrote: > @Michael, > > Your analogy with DOI is spot on, the model is the same. I wasn’t > actually proposing that a unique ID be a replacement for the URI but rather > as an additional metadata to provide context. In the case of the DOI, > since there are no privacy issues involved, there’s additional information > being provided that give context beyond just the URI, as well as a central > authority. In json-ld there’s both an ID and a Context that add further > context and definition. In the Badge Class and Issuer Class, there are no > such additional context possible currently. URI were designed to find a > resource, not as a context giving metadata or a primary key id, they don’t > always work well for such usages. > > The unique ID would be in the badge class url. As Nate illustrated with > the multi-homed badges case. What if an issuer organization did issued the > same badge(s) on multiple platforms with multiple badge class URL. How do > we tell that it’s the same badge class or issuer? Are we just going with > an assumption because they’re at different URI they must be different badge > classes or issuers? Right now there’s no definitive way to tell the intent > of the issuer. > > I suppose you could actually just stick in a DOI number for the badge > class and issuer record, but it wouldn’t work for the assertion well. > Some sort of unique id is purely more on trying to find something that can > possibly accomodate all those different scenarios and context, while still > be fairly light weight to implement at minimal. > > @Mo, > > The big downside to a key/pair type solution is I’m really ADHD, I’ve > actually lost a lot of private keys before. I would actually be pretty > scared if that was the primary mean of maintaining my badges collection and > verification. It bring up a whole host of other issues about key security > and backup. > > There are varying levels for identity authenticity depending on the > context of who’s using the badge. Key pair might be overkill for how > badges are being used in a lot of cases, particularly in primary Ed. > > There’s also valid use cases for revocation and issued in error that make > offline badge blobs difficult to use as certification or value store. > Those are cases where I’m not sure if there’s a good solution to getting > away from using some sort of authoritative server. > > @Serge, > > Interesting model with the BUID and RUID. But since most assertions > already have some sort of hash built in that make them very long, isn’t > that already a form of BUID, or already usable as a RUID if you just put > that into the appropriate spot in other records or usages? > > Building network of trust web large enough that it’s usable for > verification purposes might be extremely difficult. The same concept was > implemented for email digital signature as ID. With widespread usage it > would be a very easy and effective mechanism to stopping SPAM, but even > with that as a personal incentive, barely 1.5M people globally use email > digital signatures. Would you not need significantly more people to make > your relationship based endorsement work? > > Anh Nguyen > > > > On Feb 2, 2015, at 1:17 PM, Michael S. Evans < > Michael.S.Evans@dartmouth.edu> wrote: > > > > I should mention that I realize that DOI is a URI in technical terms, > but that what I understand to be the GUID-URI distinction here is a similar > information model to the DOI-URL model in digital publishing. > > > > Michael Evans > > Neukom Fellow, Dartmouth Fellow > > > >> On Feb 2, 2015, at 4:11 PM, Michael S. Evans < > Michael.S.Evans@dartmouth.edu> wrote: > >> > >> I am generally in agreement with Nate’s points here, particularly > around clarifying what problem we’re trying to solve, and for whom. > >> > >> On the potential advantage of GUID over URI: if I understand what is > being proposed, in theory a GUID would be analogous to a Digital Object > Identifier (http://en.wikipedia.org/wiki/Digital_object_identifier) as > it’s used in digital publishing…basically as a pointer to the current valid > URI. In publishing, URIs change for a variety of reasons (access policy, > archive acquisition, technological upgrades, technical staff turnover, etc) > in unpredictable ways, and while in theory that would be resolved at the > URI level with something like a redirect, having a non-local solution for > URI lookup keeps the resources available to users in a consistent and > predictable way. But as with DNS, the lookup is handled by a separate > system (http://dx.doi.org). I would think that the GUID-URI link would > not be within the badge itself in this approach. My scholarly publication > PDFs do not contain a URL, but do typically contain a DOI. (And, > incidentally, the format of the DOI indicates the journal issuing the > publication, via assigned prefixes.) > >> > >> Michael Evans > >> Neukom Fellow, Dartmouth College > >> > >>> On Feb 2, 2015, at 3:35 PM, Nate Otto <nate@ottonomy.net> wrote: > >>> > >>> Interesting exploration of the ideas Anh started with, Serge. > >>> > >>> I'm glad Eric dropped in the links to the Credentials Community Group, > specifically to the draft Identity Credentials spec. That draft comes from > several years of work thinking about the problems that Anh and Serge are > reflecting on here. I'm not specifically endorsing this spec in its current > form as a solution to the problems you shared, but it is representative > about how good thinking on this identifier-identity connection is happening > all over the Internet. I would like to see Open Badges in conversation with > the best ideas developing around the world. I think this issue is bigger > than Open Badges and has to be solved in a wider conversation. > >>> > >>> That said, I think we need to more carefully define the "problem" > we're looking for a solution to. > >>> > >>> Some more specific thoughts: > >>> > >>> Anh wrote: > >>>> @Nate, > >>> It depend on the specific context. We would assume there is 1 > distinct Issuer endpoint that point to 1 URI for the organization. But > that's not being strictly observed. There are multiple issuer endpoints > for what I know to be 1 issuing organization. I see distinct URIs, which > then has some pieces of information in common, but others not. Mix bag of > sometimes issuer description, name, URI, etc... not being the same. Either > using the Issuer URI, or the URI field within that endpoint yield either a > number of duplications, or if I merge them then I lose relational > integrity, and some bits of information like different descriptions. > >>> I suspect it's a wider problem than even what I'm seeing. Don't want > to point to specific examples since this is a public forum. I'll send you > an email. > >>> I don't think organizations setting up multiple IssuerOrg files is > necessarily a problem to be fixed. It's not how I would set up my own > issuer program, but I can't say that nobody would have a good reason to do > it. > >>> > >>> We should be careful not to make over-broad assumptions about how > users should or must implement the OBI specification, because if we do, we > might shut down uses that stretch the spec a little beyond its initial > intents. I agree that it seems the first spec writers envisioned an issuer > organization with a 1:1 correspondence of organization to domain, so that > the consumer could tell if a hosted assertion was properly issued by that > issuer by asking if the assertion was hosted on the same domain as the > issuer. In practice, the badge ecosystem looks very different, and this > would be an unreliable method of answering the question of hosted assertion > validity across the board. > >>> > >>> As exceptions to that rule, we see issuers setting up shop on > multi-tenant platforms, like the Oregon Badge Alliance, Achievery, Credly, > Open Badge Factory, TrueCred, etc. We also see organizations defining > multiple "IssuerOrg" files all pointing to one > http://organization-canonical-domain.com . If your directory product > wants to make an attempt to connect different IssuerOrg definitions > together based on their shared 'url' property, that may be an appropriate > decision for your product. But I think it's unwise to assume that all > consumers should merge different objects that the issuer had created > separately. > >>> > >>> As we build out a visible trust network with endorsement badges and we > adapt the specification or extensions to handle what some are calling the > "creator-issuer distinction", I think organizations will find it more > advantageous to unify their badging activity under one IssuerOrg, though > many may still find uses for hosting multiple issuer definition files, and > declaring authorization-like trust relationships between them. Tim Cook has > been doing some interesting thinking on what different relationship > declarations might be needed, depending on how we described the "problem" > and its "solution". One of the first uses of this exploration should be an > authorization-for-a-platform-to-create-badgeclasses-and-assertions on > behalf of an organization's badge issuing program. > >>> > >>> The "hard problem" at the root of whatever technical implementation we > provide is to connect the identifier for the entity (Issuer, Earner, > Endorser, etc) to the actual identity of a person or organization. The > Identity Credentials spec is an example of an idea for a technology that > makes this connection through a user's own trusted identity provider, which > relays credentials to the site that needs them. Any implementation of an > identifier to be used in badges, especially an arbitrary GUID, would need > to be attached to a protocol for a consumer to verify that the > person/entity they're talking to actually corresponds to the GUID presented. > >>> > >>> Michael is right to suggest that we should start from an assumption > that people have faceted identities (danah boyd's thesis has been on my > to-read list for a while), and that they should not be forced to reveal a > "canonical" identifier in order to earn usable open badges from a given > issuer. Serge's notion of a DNS-like service for badge identifiers is > interesting, but it would be a heavy lift to build. I would rather survey > existing technology more fully to see what already-created technologies > might serve our goals for decentralized identifier-identity connection. > >>> > >>> Anh wrote: > >>>> On the user side, GUID can be both a public identifier, as well as a > way to anonymize. Its primary feature is persistency in a way that is > platform agnostic. But you're not limited to having a single GUID. You > could potentially have 10 that each are associated in a specific context > with different communities. The only thing in common is globally, there > exist the idea that there is 1 person associated with each of those GUID, > the issuer of the badge know your authenticating information. It's up to > the owner of the ID to associate additional identifiers like Twitter, > email, name, and to decide if/how to publicize that association for > verification with consumers. > >>> > >>> Anh, you're right that verification with consumers is the essential > step here, and we should assume that consumers have no special technical > skill, familiarity with badges, or specialized tools to perform the task. > Serge, I'm looking forward to future discussions with you around the > identifiers that could be used in first implementations of Open Badges > Passports. > >>> > >>> Serge wrote: > >>>> The very first benefit of such an approach is that there is no need > for any central authority, what is usually called 'identify provider' > (which should be called 'identifier provider'). The other benefit is that > we are not limited to a single identifier but we could combine many to > prove who we really are. For example, proving that you are over 18 in a > space with no official ID card could be done by having "over 18 of age" > endorsed by other trusted members of the community — identity through > others This is something easy to do in the digital world once we have > established networks of trust. > >>> Take a look at that Identity Credentials spec for an idea of using > identity providers that are not "central". The login flow demonstrated > there still unfortunately requires synchronous participation by the user, > but in the use cases documents generated by the opencreds community, I > think there is the suggestion that users should be able to pre-authorize > certain other entities to retrieve specific credential/identifier > information. > >>> > >>> So my suggestion is the following: > >>> 1) A badge assertion is composed of: BUID (Badge GUID) + issuer GUID + > earner GUID + criteria URI + evidence URI + extensions (place, language, > etc.) + hash code/fingerprint > >>> I don't quite see the advantage of GUIDs over unique URIs/IRIs for > these badge objects. Unless what you are meaning by GUID could be a URI > (rather than the common 32-digit version of guid, which is like > "21EC2020-3AEA-4069-A2DD-08002B30309D") > >>> 2) The badge assertion is stored in the passport/backpack of both the > issuer and earner > >>> > >>> This is an interesting and novel way to think of how badge objects are > created. It may have some power! > >>> > >>> 3) It is also stored in a public repository/directory. Let's call it > for now the Global Open Badge Repository (GOBR). > >>> I'm quite skeptical of the necessity or desirability of this > centralized step. > >>> Publication process > >>> -------------------------- > >>> It is critical that only the badge earner is allowed to publish a > badge. > >>> Is this really true? We have long held values about the badges being > in the earner's control, and the design of early badge infrastructure (the > backpack) somewhat reflects this value. However, the specification makes it > just as easy for an issuer to share as it does the earner. Would we want to > close off the possibility of issuer-publicized badges in the spec? I > suspect that a lot of the "killer apps" for badges may involve issuers > sharing directly with certain consumers. That said, I would be interested > in adding some additional protected possibilities for badge sharing (Like a > recipient->consumer encrypted badge transmission that is not > forward-shareable by the consumer without breaking the badge signature or > revealing the consumer's private key), (or requiring a credential of the > consumer in order to read the badge objects). It would require a large > change from the existing spec to disallow the issuer from sharing the badge > themselves, or to disallow consumers with whom the badge has been shared to > then share it forward. > >>> > >>> > >>> Thanks for thinking in depth on these issues. Keep it up. :) > >>> > >>> Nate Otto, Developer > >>> concentricsky.com > >>> > >>> -- > >>> You received this message because you are subscribed to the Google > Groups "BA Standard Working Group" group. > >>> To unsubscribe from this group and stop receiving emails from it, send > an email to ba-standard+unsubscribe@googlegroups.com. > >>> For more options, visit https://groups.google.com/d/optout. > >> > >> -- > >> You received this message because you are subscribed to the Google > Groups "BA Standard Working Group" group. > >> To unsubscribe from this group and stop receiving emails from it, send > an email to ba-standard+unsubscribe@googlegroups.com. > >> For more options, visit https://groups.google.com/d/optout. > > > > -- > > You received this message because you are subscribed to a topic in the > Google Groups "BA Standard Working Group" group. > > To unsubscribe from this topic, visit > https://groups.google.com/d/topic/ba-standard/tE0vUv2BKNs/unsubscribe. > > To unsubscribe from this group and all its topics, send an email to > ba-standard+unsubscribe@googlegroups.com. > > For more options, visit https://groups.google.com/d/optout. > > -- > You received this message because you are subscribed to the Google Groups > "BA Standard Working Group" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to ba-standard+unsubscribe@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. >
Received on Tuesday, 3 February 2015 12:18:16 UTC