[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: RE: [trust-el] Call for additional method examples
In the deck the relevant slides start at 24 through to about 34.
It begs the question whether the Trust-el TC needs to define a set of baseline ‘policy-to- architecture’ principles (one of which might be ‘we assume a separation of the identity from the credential that is subsequently bound’).
Alternatively we use this as an example of a criteria we use to separate out the use cases.
While not exactly a method example, we feel that it is important to recognize the separation of identity from credentials.
To this end I would like to point out the work done on the Pan-Canadian Assurance Model last year. (link below)
There is a discussion of the separation of identity and credential and a discussion of compensating factor.
The publicly available document is here
A corresponding deck can be found here:
Cyber Authentication Initiative I Initiative d’authentification Cyber
Chief Information Officer Branch | Direction du dirigeant principal de l'information
Treasury Board of Canada Secretariat | Secrétariat du Conseil du Trésor du Canada
Ottawa, Canada K1A 0R5
Government of Canada | Gouvernement du Canada
[mailto:firstname.lastname@example.org] On Behalf Of Mary Ruddy
Thank you again to those who submitted the first 7 trust elevation method examples that we discussed at the Face-to-face meeting.
Attached are the template format for method examples and a sample draft (KBA).
Please submit your method examples using the template. (It is ok if they are rough, we have editors to polish them.)
Let me know if you have any questions. We don’t yet have any examples involving phones, so it would be particularly helpful to get some phone examples.
Let me know what questions you have.
CAUTION: This email message and any attachments contain information that may be confidential and may be LEGALLY PRIVILEGED. If you are not the intended recipient, any use, disclosure or copying of this message or attachments is strictly prohibited. If you have received this email message in error please notify us immediately and erase all copies of the message and attachments. Thank you.