(Robin Wilton)
Could be filtered as a ‘hype cycle’, Gartner’s magic quadrant, or Leif’s filter (‘look where money is misspent’)
What are your “three big bets” in IAM?
Does X509 represent misdirected effort or wasted money? Where should we focus our efforts? looking for ideas; brainstorming session Link to pictures of the white board · Winners: something we want to encourage · Losers: something we want to stop · Pain Points: Unknown unknowns, which haven’t been encountered yet · Blind Spots: Unknown unknowns, which haven’t been encountered yet
For example, one of the problems that we might encounter is that open ID connect could displace SAML
· OAuth <-> Open ID connect <-> SAML
Complexity of connect and OAuth; no surprise if some of the bigger players go “let’s redo this from scratch because it’s clearly too complex -> cannot sustain the rate of change of OIDC”; the design of OAuth is a craft pile
· SAML <-> X. 509
Q: Does SAML replaces X.509?
A: No. Or partially.
Comment: Someone said that SAML will replace X.509, but it won’t because nothing ever gets replaced; It will create another standard that needs to be followed;
· Outsourcing vs. in-house
· A growing accumulation of CRUFT – legacy stuff builds up
· Single-root PKI
no IT/anti cross-signed PKI or diamond shaped PKI
· X.509 volume vs. function
the number of the X509 certificate went up, but the number of the functions went down
· ZKP outside DLT
People grow tired of logger aspects and mining, there are some aspects of that is talking to get picked up by people
ZKP = a bunch of technologies, there are libraries; a bunch of crypto that allows me to say that I can proof to you that I am wearing blue socks without showing you my socks
You could prove your affiliation with the university without revealing your identity
· Crypto evolution + Application to I.A.M => AuthN – privacy, security
Application of new crypto ideas into IAM
Privacy and security are a part of them
· X.509 client AuthN
· PIVs
· PETs GOVT/F.S. – i.e. regulate sectors
2 major efforts for PET:
Paper – tries to explain quantum computing, symmetric and public key encryption and problems like factorization Research found: if you’ve got a given RSA key length here is our assessment of the number of key bits you will need to mount an effective quantum computing attack on that key length. Couldn’t find any research on: if I’ve got a 256-bit key and a quantum computer that only has 16 key bits, can I attack 16 of the key bits with my quantum computer … Can you reduce the effective length of the key to a more manageable one for a classical computer? Grover’s algorithm works for symmetric keys; thinking more about the RSA whether it is viable? many people pessimistic about how many key bits would be able to assemble in use à saying it will not matter until the next millennium, because there’s no way you’ll be able to turn 256-bit key into …useful; if you don’t need to then - small number of key bits start to enable effective attacks sooner ask cryptographer or mathematician QIRL – quantum internet research list (possible link);