Difference between revisions of "Wallet User Experience"
(→References) |
(→Apple Wallet) |
||
(18 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
==Full Title== | ==Full Title== | ||
− | The [[User Experience]] of | + | The [[User Experience]] of enabling a user to select the appropriate piece of mobile code as a [[User Agent]] for a particular [[Relying Party]] on the user's choice of an [[Identifier]]. |
==Context== | ==Context== | ||
− | * The context is giving users control over the | + | * The context is giving users control over the [[Identifier]]s and [[Attribute]]s that they use with a [[Relying Party]]. |
+ | * The party that must create the server side experience for the user needs to see some benefit from the [[Wallet]] that improves there user satisfaction and retention. Exiting development efforts give little incentive to the [[Relying Party]] also known as the [[Verifier]]. | ||
* The primary context is the user's mobile smartphone. A secondary context is the user on a laptop computer connected to the internet. | * The primary context is the user's mobile smartphone. A secondary context is the user on a laptop computer connected to the internet. | ||
* The operating assumption is that the user has contacted the RP with a browser and that the identity security code is a separate native or web application that will be referred to below as the '''[[Wallet]]'''. | * The operating assumption is that the user has contacted the RP with a browser and that the identity security code is a separate native or web application that will be referred to below as the '''[[Wallet]]'''. | ||
Line 29: | Line 30: | ||
# A specification meeting these criteria will be published. | # A specification meeting these criteria will be published. | ||
# That specification may well require new means of support from the device and browser provisioned on that device. | # That specification may well require new means of support from the device and browser provisioned on that device. | ||
+ | ===Apple Wallet=== | ||
+ | Apple has focused on the entire UX from the Wallet to the [[Verification]]. <ref>Steve Cocheo, ''Apple Shifts Focus As It Drills Deeper into Payments'' The Financial Brand (2024-06-24) https://thefinancialbrand.com/news/payments-trends/is-apple-focusing-on-payments-networks-and-away-from-banking-179186/</ref><blockquote>The payments moves that Apple announced at its June 10 annual developer conference are being hailed as competitive coups on multiple fronts — one-upping Visa’s announcement of its Visa Flexible Credential, overtaking Early Warning Services’ fledgling Paze wallet, and yet also as offering a potential benefit for card issuers and ecommerce merchants. Apple dropped a second shoe only days later, announcing that it is discontinuing its Apple Pay Later buy-now-pay-later (BNPL) program, executed through its Apple Card accounts. But Apple added access to BNPL loans from Affirm inside Apple Pay, as well as access to BNPL through participating payment cards in the digital wallet. The announcements, and their implications, drove speculation of a strategic shift for Apple. The company may be subtly shifting away from being a provider of financial services while operating a payments network, to focus on the latter alone.</blockquote> | ||
+ | |||
===FHIR Smart App Launch=== | ===FHIR Smart App Launch=== | ||
− | * [http://www.hl7.org/fhir/smart-app-launch/ Smart App Launch] web site | + | * [http://www.hl7.org/fhir/smart-app-launch/ Smart App Launch] web site for one method for a user to access their medical information. It is unclear if any users actually can use such a solution or if they just rely on their primary care web site for information as well as app downloads. Note that the use of the term "client" in this app follows the [[OAuth 2.0]] model of the client not representing the user, but rather the provider. That makes this site very hard to read by anyone unfamiliar with [[OAuth Client]] deployments. |
+ | |||
+ | ===Provide Creds to a Website=== | ||
+ | in response to a request for an actual message flow - we consider openID Connect as a paradigm, when user is at a RP website, the site shows one or more buttons - like google - the user clicks, lots of magic happens and the OpenID Provider (OP) sends an id_token bounce off user to RP which retains browser session context. The SIOP is like that but the OP is user and under user control. — SO here we go: | ||
+ | * User is at the RP web site - sees a button labeled “personal” or some such - user click button - now we need some non-existant magic - the browser understand the protocol - say sellfissued:// or did: and finds a wallet and sends the request to the wallet (this is ta problem we need help with) | ||
+ | * The SIOP wallet finds the creds it needs to respond to the request - we understand that part well - no hard issues, but now the hard part - the wallet sends the id_token back to the browser session that sent the request | ||
+ | *I have been able to create a wallet that will do all of that using localhost:// - but that can be hijacked - a protocol can be registered by the app - but that can be redirected by any other app loaded on the device. - so we are stuck - several choices are: protocol handler or cred manager or password manager extension - nothing has worked out yet. | ||
+ | *Now an Apple wallet has super powers by virtual of being owned by the platform and can deal with some of these issues and has some sort of solution for the mobile Driver’s license, but even apple puts the health cred in the health app, not the wallet, so we still have a problem that i call credential aggregation. https://tcwiki.azurewebsites.net/index.php?title=Credential_Aggregation | ||
+ | * Here is a demo of an employer getting creds, like a green card, from an applicants wallet. Just change the wording to a covid cred being acquired by a web app and it would apply directly to COVID Cred: https://www.youtube.com/watch?v=Tq4hw7X5SW0&t=20s | ||
==References== | ==References== | ||
− | * See | + | * See wiki page on [[Patient Experience]] |
− | * See | + | * See wiki page on [[Self-issued_OpenID_Picker#User_Experience| Self-issued ID chooser UX]] |
− | + | * See wiki page on [[Wallet Notices]] | |
[[Category: User Experience]] | [[Category: User Experience]] | ||
+ | [[Category: Mobile]] | ||
+ | [[Category: Identifier]] | ||
+ | [[Category: Attribute]] |
Latest revision as of 11:09, 25 June 2024
Contents
Full Title
The User Experience of enabling a user to select the appropriate piece of mobile code as a User Agent for a particular Relying Party on the user's choice of an Identifier.
Context
- The context is giving users control over the Identifiers and Attributes that they use with a Relying Party.
- The party that must create the server side experience for the user needs to see some benefit from the Wallet that improves there user satisfaction and retention. Exiting development efforts give little incentive to the Relying Party also known as the Verifier.
- The primary context is the user's mobile smartphone. A secondary context is the user on a laptop computer connected to the internet.
- The operating assumption is that the user has contacted the RP with a browser and that the identity security code is a separate native or web application that will be referred to below as the Wallet.
- For convenience of this list a wallet can include references other wallets.
- Nothing in these requirements should be construed to require that all of the wallet code is resident on a device in the user's physical possession.
- 2021-09-20 Bloomberg reported = Robinhood Markets is testing a new crypto wallet and cryptocurrency transfer feature for its app, a long-awaited move that will make it easier for customers to send and receive digital currencies like Bitcoin. With crypto wallets, consumers can use virtual currencies without having to convert them to dollars. They also provide a single place for customers to store all of their virtual currencies, protected by a private key. Robinhood shares jumped as much as 2.1% on the news. —David E. Rovella
Goals
The following are the required success criteria for both the user and the RP in establishing and maintaining an enduring relationship. Wallets supporting ephemeral relationships are possible and may be addressed in a subsequent list as needed. The high level goal is to minimize the cognitive load on the user. The success metric of this effort is (1) the percentage of users that successfully create and maintain their own usefull identifiers under their own control and (2) the number of RPs that accept SIOP identifiers.
- RPs will have the means to test if they meet the criteria for giving users control of their own identifiers.
- RPs will provide a well-known endpoint displaying their acceptance criteria for wallets. (the need for this is TBD)
- SIOP will provide a well-known endpoint API for determining their identifier functionality that contains no user personal information and minimal correlation information.
- A user of common ability will be able to install one or more wallets and create zero or more identifiers on each wallet.
- The user can add or remove wallets at any time.
- The RP can display for the user's selection on the user's browser a small number of choices that are created entirely by browser code and information from the DOM provided by the user's browser.
- Upon selection of one of those options, the user will be able to access a wallet previously provisioned with an identifier or a wallet with a list of other wallets.
- The user will have full and effective control of the selection of an identifier that meets the RP criteria.
- If such a identifier does not exist, the user will get simple and effective instructions on creating such an identifier that does meet the criteria.
- Working together the user, the device, the browser, the wallet and the RP will establish means for the user to easily restore connectivity to the RP using the user selected identifier.
Problems
David Chadwick reported on the EIC Thursday (2021-09-19) afternoon session Decentralized Identity for the Enterprise from Esatus. Attendees were able to download the Esatus Wallet, and then install a VC and use it to access a Wordpress web site. Esatus uses the Sovrin permissioned blockchain with public read access to store issuer DIDs, schemas and VC types. The demo system allows anyone to register as an issuer and does not have a proper functioning trust regime (but this can be added). There was a demo of SOWL, a web based system for creating new VC schemas and VC types and storing these on the Sovrin test blockchain. He then created a new Applications in SOWL that will use VCs for access, through defining Entitlements and Rules. We were shown how you can build a Wordpress web site using the SAML protocol for login, but instead of un/pws, VCs are sent from the user's wallet. SOWL supports OIDC, SAML, LDAP and SCIM. One negative feature is that the wallet has to be configured with the correct Sovrin blockchain to talk to, as there are many of them in the wild. If the wrong one is chosen the demo will not work. This shows a weakness of the current blockchain based system. Why not publish the VC meta data on the web instead of in a blockchain, and then wallets would not need to choose between blockchains. A member of the audience said the current system would not pass the Granny test. The performance was also dire.
Solutions
- A specification meeting these criteria will be published.
- That specification may well require new means of support from the device and browser provisioned on that device.
Apple Wallet
Apple has focused on the entire UX from the Wallet to the Verification. [1]The payments moves that Apple announced at its June 10 annual developer conference are being hailed as competitive coups on multiple fronts — one-upping Visa’s announcement of its Visa Flexible Credential, overtaking Early Warning Services’ fledgling Paze wallet, and yet also as offering a potential benefit for card issuers and ecommerce merchants. Apple dropped a second shoe only days later, announcing that it is discontinuing its Apple Pay Later buy-now-pay-later (BNPL) program, executed through its Apple Card accounts. But Apple added access to BNPL loans from Affirm inside Apple Pay, as well as access to BNPL through participating payment cards in the digital wallet. The announcements, and their implications, drove speculation of a strategic shift for Apple. The company may be subtly shifting away from being a provider of financial services while operating a payments network, to focus on the latter alone.
FHIR Smart App Launch
- Smart App Launch web site for one method for a user to access their medical information. It is unclear if any users actually can use such a solution or if they just rely on their primary care web site for information as well as app downloads. Note that the use of the term "client" in this app follows the OAuth 2.0 model of the client not representing the user, but rather the provider. That makes this site very hard to read by anyone unfamiliar with OAuth Client deployments.
Provide Creds to a Website
in response to a request for an actual message flow - we consider openID Connect as a paradigm, when user is at a RP website, the site shows one or more buttons - like google - the user clicks, lots of magic happens and the OpenID Provider (OP) sends an id_token bounce off user to RP which retains browser session context. The SIOP is like that but the OP is user and under user control. — SO here we go:
- User is at the RP web site - sees a button labeled “personal” or some such - user click button - now we need some non-existant magic - the browser understand the protocol - say sellfissued:// or did: and finds a wallet and sends the request to the wallet (this is ta problem we need help with)
- The SIOP wallet finds the creds it needs to respond to the request - we understand that part well - no hard issues, but now the hard part - the wallet sends the id_token back to the browser session that sent the request
- I have been able to create a wallet that will do all of that using localhost:// - but that can be hijacked - a protocol can be registered by the app - but that can be redirected by any other app loaded on the device. - so we are stuck - several choices are: protocol handler or cred manager or password manager extension - nothing has worked out yet.
- Now an Apple wallet has super powers by virtual of being owned by the platform and can deal with some of these issues and has some sort of solution for the mobile Driver’s license, but even apple puts the health cred in the health app, not the wallet, so we still have a problem that i call credential aggregation. https://tcwiki.azurewebsites.net/index.php?title=Credential_Aggregation
- Here is a demo of an employer getting creds, like a green card, from an applicants wallet. Just change the wording to a covid cred being acquired by a web app and it would apply directly to COVID Cred: https://www.youtube.com/watch?v=Tq4hw7X5SW0&t=20s
References
- See wiki page on Patient Experience
- See wiki page on Self-issued ID chooser UX
- See wiki page on Wallet Notices