<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; Identity</title>
	<atom:link href="https://javacard.vetilles.com/tag/identity/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Chip to Cloud, day 1: Mobile authentication</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 20:42:34 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identity]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[Moile]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/</guid>
		<description><![CDATA[Presentation from Vasco&#8217;s Nicolas Fort. Of course, the use case is about banking, since this Vasco&#8217;s stronghold. Banks have been used to interface with customers face to face in branches. 40 years ago, they added the phone, first with a human on the bank&#8217;s end, then without. They then added the ATM network to check [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Presentation from Vasco&#8217;s Nicolas Fort. Of course, the use case is about banking, since this Vasco&#8217;s stronghold. Banks have been used to interface with customers face to face in branches. 40 years ago, they added the phone, first with a human on the bank&#8217;s end, then without. They then added the ATM network to check balance. And then came internet.</p>
<p>Internet banking has now taken over as the main interface with banks, with of course a shift to mobile devices in the recent years. In the end, banking is adapting quite fast to technology, because customers expect them to move fast (if they don&#8217;t, customers can switch).</p>
<p>So, the banking ecosystem has adapted to integrate new technologies, and they do that fast. Of course, at least according to Vasco, the problem is fraud, and the solution is authentication. Vasco&#8217;s answer includes platgorm evaluation (jailbroken or not?), user evaluation (2-factor authentication), transaction evaluation (2-factor authentication again) and finally validation.</p>
<p>The next idea is to use NFC to improve 2-factor authentication, for instance to provision keys, to perform WYSIWYS checks. On the opposite, 2-factor authentication can benefit to NFC, by providing flexible authentication.</p>
<p>That all sounds interesting, but I will need a bit more technical information to undrstand what they are saying. In particular, I am always careful with solutions in which one of the 2 factors needed for authentication isnthe device on which I want to do something. This may not be very rational, bit I am not feeling good about it.</p>
<p>Of course, this presentation was a lot about advertising, and yiu can better understand where Vasco is going to by getting to <a href="http://www.mydigipass.com" class="liexternal">MyDigipass</a>. This offer sounds interesting for securing online accounts. Maybe that I will consider giving it a try.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-day-1-mobile-authentication/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chip to Cloud live, day 1: Opening panel on eID in Europe</title>
		<link>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/</link>
		<comments>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/#comments</comments>
		<pubDate>Wed, 19 Sep 2012 09:24:41 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Identities]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[smart card]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/</guid>
		<description><![CDATA[This is the conference formerly known as e-Smart. Apart from changing its name, the conference has also moved from Sophia Antipolis to Nice. No more bike riding from home to conference this year. However, the new setting at Acropolis is really nice, with a lot of room. To celebrate that, I have decide to attend [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This is the conference formerly known as e-Smart. Apart from changing its name, the conference has also moved from Sophia Antipolis to Nice. No more bike riding from home to conference this year. However, the new setting at Acropolis is really nice, with a lot of room.</p>
<p>To celebrate that, I have decide to attend the opening session this year. We started by an enthusiastic eID spporter from European Union, promising us all regulations and standards ready for 2014, which sounds interesting. After all, there are very interesting deployment in countries like Belgium and Estonia, which could be extended.</p>
<p>Then, we get a panel, with the question below. Speakers are Christian van der Valk, from TrustWeaver, Herrmann Sterzinger, from G&#038;D, Massimo Cappelli, from Global CyberSecurity Center, and Marie Figarella, from Gemalto.</p>
<p>Why has eIAS services not been a success to date?</p>
<ul>
<li>Is it really the case? There haven&#8217;t been failures, there are many services ready to,use, and a lack of recognition, with a common perception that digital signature ismore difficult than it actually is.</li>
<li>Citizen certificates are too expensive, and the use cases are not compelling enough. Thisis changing in some places, like in Austria, where the state pays the citizen certificate.</li>
<li>Market fragmentation and lack of trust and confidence are the two main issues. They may even be linked because the fragmentation does not allow the development of global solutlons, deployed across Europe.</li>
<li>Issues have been legal and societal, not technical. Fragmentation and lacking use case are the most important,</li>
</ul>
<p>How would the new electronic identification and trust services regulation improve on this situation?</p>
<ul>
<li>Moving from directive to regulation is important</li>
<li>Making it global would be good, but also hittin some limits, in particular regarding discrepancies in privacy requirements.</li>
<li>Moving to a regulation will limit fragmentation, the scope will be larger, going beyond signatures to seals, timestamps, and more. Mobility between states will also be greatly improved. Finally, supervision should be improved.</li>
</ul>
<p>What additional key actions would be necessary to make eIAS a success?</p>
<ul>
<li>Sharing identity and authentication between public and private spheres would help. Also,aligning with the global market with help, including private support, like Adobe. Also, the recognition of non-PKI solutions would be required (that sounds interesting)</li>
<li>Moving beyond web authentication is required. Moving to global regulation loses things, such as already deployed eIDs, which do not comply to the new regulation, and also existing standads and existing profiles.</li>
<li>Bureaucratic simplification associated to eIAS would be great help. We are also missing a common framework of expertise, with collaboration between national agencies. Thereisalso a digital and cultural divide, which hurts wide adoption. Finally, including soft identity would increase the use of strong identity, if it can be used in our everyday life.</li>
<li>Associate reliable digital identity with a portable secure elemnt, to allow 2-factor authentication. Build an open and interoperale secure Internet. Privacy by design. Push digital identity on all SIM cards to benefit from NFC</li>
</ul>
<p>Now, that&#8217;s quite interesting. The views from the panelists are quite consistent. The question that puzzles me most is the relationship between national and private identity. I am left wondering what opportunities will be given to private companies and web providers to leverage this eID. Making this happen would be a great boost to eIAS.</p>
<p>I also liked Gemalto&#8217;s analysis and proposals, which was short and to the point, except the last point, of course; mandating SIM-based identity for NFC is ludicrous and pure lobbying, at least because the SIM is not the only way to access NFC.</p>
<p>So, an interesting first panel, although there haven&#8217;t been many suprises and illuminating discussions.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/09/19/chip-to-cloud-live-day-1-opening-panel-on-eid-in-europe/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Live from Oracle OpenWorld: Cloud and Identity</title>
		<link>https://javacard.vetilles.com/2010/09/22/live-from-oracle-openworld-cloud-and-identity/</link>
		<comments>https://javacard.vetilles.com/2010/09/22/live-from-oracle-openworld-cloud-and-identity/#comments</comments>
		<pubDate>Wed, 22 Sep 2010 20:42:49 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=625</guid>
		<description><![CDATA[At midday, it is time for a little break in my smart card day, and go listen to an Oracle OpenWorld session. I might as well leverage today&#8217;s professional look to blend better into OOW&#8217;s suit-dominated crowds. The funny thing is that every OOW session I have seen ended up turning into a blatent advertising [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>At midday, it is time for a little break in my smart card day, and go listen to an Oracle OpenWorld session. I might as well leverage today&#8217;s professional look to blend better into OOW&#8217;s suit-dominated crowds. The funny thing is that every OOW session I have seen ended up turning into a blatent advertising session for some Oracle product. No exception on that session, which was about Identity in the cloud. Here are a few highlights of that session (before the advertising part), provided about raw:</p>
<p>74% of people are worried about security in the cloud, in particular because of the loss of control that comes from moving your applications into Software-as-a-Service, or even only when you are only getting to Infrastructure-as-a-Service. But, the worries come from the classic security approach with perimeter defense: your security is based on high walls keeping people out.</p>
<p>Cloud computing introduces a disruption, but it only means that perimeter defnse has become obsolete, and that other things are required. Security now needs to be secured by policies, not only based on the topology of the network.</p>
<p>For an SME, the perceived risks (from ENISA) include vendor/service lock-in (am I stuck forever with Amazon?), malicious insiders (who is accessing my data?), management interface compromise (could someone impersonate my IT manager?), or legal risks (where is my data stored?). Another point is that shared services can be more attractive to hackers, because they can be granted access to several actors.</p>
<p>Of course, according to the speaker, identity is the solution. His main idea is to extend the (Oracle) identity management system used in the enterprise into the cloud. For instance, for federation, SAML-based federations can be used to get into the cloud. </p>
<p>Privileged account management is very important. Cloud services come with &#8220;superuser&#8221; accounts that have the ability to completely manage a service. These accounts should only be accessible through a mechanism that can track, monitor and control access.</p>
<p>For other accounts, account lifecycle management can be an extension of the standard enterprise system.</p>
<p>Something very interesting is to use claims-based identity. Claims-based provisioning can get the necessary identity information through a single SAML token, without having to directly connect to the enterprise systems. More importantly, identity assertions (such as attributes and roles) can be used for authorization purposes. However, this is not necessarily accepted by all cloud providers. When supported, XACML allows enterprises to export their internal policies to the cloud service provider.</p>
<p>Ultimately, the enterprise can become an Identity Services Provider, leveraging the IAM services available internally to cloud applications, or to partner applications outside of the enterprise. The objective is here to promote a loose coupling between the services and the low-level authentication.</p>
<p>Then, we get into Oracle advertising, reminding that identity management is part of Oracle&#8217;s offer, and provides all the services mentioned previously.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2010/09/22/live-from-oracle-openworld-cloud-and-identity/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
