identity

Emphasis on cloud computing, eGovernment, citizen and national e-identities, open identity initatives, law, policy, standards-based identity infrastructures, and secure information sharing and collaboration.

identity

  • Availability of the Information Card Issuance Preview

    Today, Microsoft is announcing the availability of the Information Card Issuance Community Technology Preview (CTP) to enable the following scenarios with Active Directory Federation Services 2.0 RTM: Administrators can install an Information...
  • Open Identity Summit EU 2010 on June 8 (London, UK)

    The OpenID Summit (EU) is an important outreach opportunity for the foundation and a chance for developers, identity providers and relying parties to exchange information in Europe. Topics are expected to include: use cases, issues and problems encountered...
  • How will the cloud impact Digital Identity?

    Microsoft will keynote on the topic: How will the cloud impact Digital Identity? at the European e-Identity Management Conference in London, UK on June 9-10. “Cloud computing will accelerate the move away from ad-hoc identity solutions toward an...
  • A Guide to Claims-Based Identity and Access Control (2010)

    A Guide to Claims-Based Identity and Access Control: claims provide an innovative approach for building applications that authenticate and authorize users. Imagine a world where you don't have to worry about authentication. Imagine instead that all requests...
  • Microsoft at Burton Group's Catalyst Conference 2010 – San Diego, CA (USA)

    On Wednesday, July 28, 2010, we are participating in an Open Identity for Business Interop being held by OSIS at Catalyst in San Diego . This multi-protocol interop event includes exercising the US Government identity profiles developed as part of th...
  • Microsoft receives the Privacy Innovation Award for Technology 2010

    On September 30, 2010 Microsoft received an award at the annual International Association of Privacy Professionals (IAPP) Privacy Innovation Awards ceremony in Baltimore, MD . The award acknowledges Microsoft’s release of U-Prove, a privacy...
  • Microsoft goes international with new U-Prove concept and privacy

    During ISSE on October 5-7, 2010 in Berlin, Germany Microsoft showed a new proof of concept with our partners in Germany, Fraunhofer FOKUS. As part of our keynote and break-out session, the concept explores privacy-enhanced identity experiences with...
  • Internet Identity Workshop XI - November 2-4, Mountain View, CA

    The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their identity across the range of websites, services, companies and organizations that they belong to,...
  • New technical preview of U-Prove, February 2011

    Microsoft is releasing a second Community Technology Preview (CTP) of U-Prove and related software innovations to help put users in control of how their identity information is shared on the internet. Microsoft is pleased to announce this preview during...
  • Microsoft releases U-Prove technology

    Today, we took a first step to make the Microsoft U-Prove technology available! First, core portions of the U-Prove intellectual property via a cryptographic specification (under the Microsoft Open Specification Promise ) are available to any interested...
  • Open Identity Trust Framework Model (Whitepaper)

    Today many online interactions require you to disclose identity information. This poses substantial trust challenges, both for the people who disclose the information and for those who receive it. Until now, this problem has been addressed by a simplistic...
  • Top 5 security and privacy challenges in identity infrastructures – and how to overcome them with U-Prove

    Commercial businesses and governments are rolling out identity systems to improve their security and to provide online access to services. Current identity framework efforts (including federated identity protocols such as SAML and OpenID) do not provide...
  • The Laws of Identity (2005)

    This paper is about how we can prevent that loss of trust and go forward to give Internet users a deep sense of safety, privacy and certainty about who they are relating to in cyberspace. Nothing could be more essential if new Web-based services and applications are to continue to move beyond “cyber publication” and encompass all kinds of interaction and services. Our approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Taken together, these laws define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.
  • Trust in the Information Society

    Members of the team participated as panelists in the Trust in the Information Society conference in Leon, Spain (February 10-11, 2010). One of the sessions focused on identity as a collaborative foundation , by Microsoft’s distinguished engineer, Kim...
  • Microsoft's Vision for an Identity Metasystem (2005)

    This paper introduces the principles behind this approach in "The Laws of Identity"; it presents an open and interoperable architecture for building the metasystem, and it describes Microsoft's plans to participate in the identity metasystem.
  • A Privacy-compliant Identity Metasystem (2006)

    Just as individual identity is fundamental to our face-to-face interactions, digital identity is fundamental to our interactions in the online world. Unfortunately, many of the challenges associated with the Internet stem from the lack of widely deployed...
  • A User-centric Identity Metasystem (2008)

    This paper proposes a framework for protecting privacy and avoiding the unnecessary propagation of identity information while facilitating exchange of specific information needed by Internet systems to personalize and control access to services. It also...
  • Establishing End to End Trust (2008)

    Creating a safer, more trusted Internet - It is not an overstatement to say that the Internet has transformed the way we live. Social networking represents the new town square; blogging has turned citizens into journalists, and e-commerce sites have spurred...
  • A Microsoft Perspective on Online Identity Theft (2008)

    Identity theft threatens the growth of e-commerce and the provision of financial and government services online. The issue requires a more comprehensive approach to protecting personal information, including consumer education, new technology tools, responsible...
  • An Introduction to Information Cards and Identity Selectors (2006-2009)

    Contains the open specifications, icons and guides for information cards and identity selectors, including Windows CardSpace.
  • The Architect Journal-Identity and Access (2009)

    In this issue, we invite you to think about the identity architecture in your organization. Identity management today is evolving from the single, isolated scenario to a federated one, in ways which may surprise you; a comprehensive look at the evolving...
  • A Microsoft Perspective on Privacy in the Cloud Computing Era (2009)

    Cloud computing raises a number of important policy questions concerning how people, organisations, and governments handle information and interactions in this environment. However, with regard to most data privacy questions as well as the perspective...
  • An Introduction to the Windows Identity Foundation for Developers (2009)

    The goal of this whitepaper is to help developers get started building claims-aware applications using Windows Identity Foundation. This paper introduces concepts and terminology to help developers understand the benefits and concepts behind the claims...
  • An introduction to Cloud Computing in Government-US (2010)

    The integration of software and assets you own with software and services in the cloud gives government new choices for balancing system management, cost, and security while helping to improve citizen services. Federal, state, and local governments...
  • An introduction to Open Identity Trust Framework Models (2010)

    Today many online interactions require you to disclose identity information. This poses substantial trust challenges, both for the people who disclose the information and for those who receive it. Until now, this problem has been addressed by a simplistic...