Difference between revisions of "Hundred Points of Light"

From MgmtWiki
Jump to: navigation, search
m (Tom moved page Thousand Points of Light to Hundred Points of Light: remaned the motto)
(Problems)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
==Full Title or Meme==
 
==Full Title or Meme==
A collection of all of the [[User]] [[Identifier]] or [[Attribute]] components, the points of lights that, together, make up the [[User]] [[Identity]].
+
A collection of all of the [[User]] [[Identifier]] or [[Attribute]] components, the points of lights that, together, make up the [[User]] [[Distributed ID]].
  
 
==Context==
 
==Context==
*The [[User]] has many points of light that make up the [[Identity]].
+
*The [[User]] has many points of light that taken together make up the [[Identity]] of that user.
 
*When some request comes in from a [[Relying Party]], the [[User Agent]] can reach out to the point appropriate to the request and the [[user Consent]] to provide those points together in a response.
 
*When some request comes in from a [[Relying Party]], the [[User Agent]] can reach out to the point appropriate to the request and the [[user Consent]] to provide those points together in a response.
  
 
==Problems==
 
==Problems==
 +
*Splitting the [[Attribute]]s of the user [[Identity]] across a range of locations can improve the user's control of access to their information, but it creates the challenge of assembly of the specific information that needs to be supplied to any [[Relying Party]] to get [[Authorization|Authorized]] access to [[Resource]]s required by the user.
  
 
==Solutions==
 
==Solutions==

Latest revision as of 10:05, 13 October 2018

Full Title or Meme

A collection of all of the User Identifier or Attribute components, the points of lights that, together, make up the User Distributed ID.

Context

  • The User has many points of light that taken together make up the Identity of that user.
  • When some request comes in from a Relying Party, the User Agent can reach out to the point appropriate to the request and the user Consent to provide those points together in a response.

Problems

  • Splitting the Attributes of the user Identity across a range of locations can improve the user's control of access to their information, but it creates the challenge of assembly of the specific information that needs to be supplied to any Relying Party to get Authorized access to Resources required by the user.

Solutions

References