Internet DRAFT - draft-merrells-use-cases

draft-merrells-use-cases






Network Working Group                                        J. Merrells
Internet-Draft                                             Sxip Identity
Expires: November 2, 2006                                       May 2006


                 Digital Identity Exchange - Use Cases
                    draft-merrells-use-cases-02.txt

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on November 2, 2006.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   This document describes the motivating use cases for DIX, the Digital
   Identity Exchange protocol.










Merrells                Expires November 2, 2006                [Page 1]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


Table of Contents

   1.  Requirements notation  . . . . . . . . . . . . . . . . . . . .  4
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  5
   3.  Goals  . . . . . . . . . . . . . . . . . . . . . . . . . . . .  6
   4.  Definitions  . . . . . . . . . . . . . . . . . . . . . . . . .  7
   5.  Overview . . . . . . . . . . . . . . . . . . . . . . . . . . .  8
   6.  Browser Based Use Cases  . . . . . . . . . . . . . . . . . . .  9
     6.1.  B1 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     6.2.  B2 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     6.3.  B3 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     6.4.  B4 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     6.5.  B5 . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
     6.6.  B6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     6.7.  B7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     6.8.  B8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     6.9.  B9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
     6.10. B10  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     6.11. B11  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     6.12. B12  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     6.13. B13  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     6.14. B14  . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
     6.15. B15  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     6.16. B16  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     6.17. B17  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     6.18. B18  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     6.19. B19  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     6.20. B20  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     6.21. B22  . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     6.22. B23  . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
   7.  Assertion Use Cases  . . . . . . . . . . . . . . . . . . . . . 14
     7.1.  A1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     7.2.  A2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     7.3.  A3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     7.4.  A4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     7.5.  A5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     7.6.  A6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     7.7.  A7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
     7.8.  A8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
     7.9.  A9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
     7.10. A10  . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
     7.11. A11  . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
     7.12. A12  . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
     7.13. A13  . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
     7.14. A14  . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
   8.  Non Browser Based Use Cases  . . . . . . . . . . . . . . . . . 17
     8.1.  NB1 - REST . . . . . . . . . . . . . . . . . . . . . . . . 17
     8.2.  NB2  . . . . . . . . . . . . . . . . . . . . . . . . . . . 17



Merrells                Expires November 2, 2006                [Page 2]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


     8.3.  NB3 - WebDAV . . . . . . . . . . . . . . . . . . . . . . . 17
     8.4.  NB4 - AtomPub  . . . . . . . . . . . . . . . . . . . . . . 17
     8.5.  NB5 - XCAP and SIMPLE  . . . . . . . . . . . . . . . . . . 17
     8.6.  NB6 - CalDAV . . . . . . . . . . . . . . . . . . . . . . . 18
     8.7.  NB7 - IMAP/POP3 and CalDAV . . . . . . . . . . . . . . . . 18
     8.8.  NB8 - RSS, Web, and CalDAV . . . . . . . . . . . . . . . . 18
   9.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 19
   10. Security Considerations  . . . . . . . . . . . . . . . . . . . 20
   11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 20
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 21
   Intellectual Property and Copyright Statements . . . . . . . . . . 22








































Merrells                Expires November 2, 2006                [Page 3]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


1.  Requirements notation

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [RFC2119].














































Merrells                Expires November 2, 2006                [Page 4]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


2.  Introduction

   The use cases below describe various scenarios for the Digital
   Identity Exchnage (DIX) protocol [dmd1].















































Merrells                Expires November 2, 2006                [Page 5]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


3.  Goals

   The goals of the protocol are:

   Identity Information Exchange:

      The primary goal of any DIX protocol is to automate the exchange
      of Identity Information over the Internet.


   Ease of Adoption:

      Any DIX protocol must provide the lowest possible barriers to
      adoption to ensure wide-spread usage of the protocol.


   Internet Scale:

      Any DIX protocol must provide an Internet scale solution to
      identity information exchange.


   Privacy:

      Any DIX protocol must ensure that all aspects of user privacy can
      be maintained.

























Merrells                Expires November 2, 2006                [Page 6]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


4.  Definitions

   The following terms and their definitions are drawn from the lexicon
   of 'The Identity gang', a community of thought leaders in the user-
   centric digital identity space. [identitygang].

      Digital Identity - The transmission of digital representation of a
      set of Claims made by one Party about itself or another Digital
      Subject, to one or more other Parties.

      Identity Agent - An agent acting on behalf of the user.

      Identifier - An identifying attribute for a set of attributes.

      Identity Data / Identity Information - A set of attributes.




































Merrells                Expires November 2, 2006                [Page 7]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


5.  Overview

   [TODO - JM - Insert some introductory text that describes user-
   centric digital identity.]















































Merrells                Expires November 2, 2006                [Page 8]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


6.  Browser Based Use Cases

   Some use cases are dependent upon others, so should be perused in
   order.  Beth is our protagonist throughout; a typical Internet user,
   but she's a bit of a geek.  Her friend Adam also appears.  A less
   sophisticated Internet user and a bit of a dubious character.  These
   use cases motivate a HTTP binding for a DIX protocol.

6.1.  B1

   Beth receives an email from a friend introducing her to a new
   website, geeknews.com, a techie news site.  She wishes to sign up so
   that she can read some articles.  She sees an IN button, which she
   clicks.  Her identity agent displays a screen informing her that
   geeknews.com is requesting some data, her first name.  She enters
   'Beth' at the prompt, provides consent and the data is sent to the
   site.

6.2.  B2

   Beth browses to geekdate.com, she clicks an IN button.  Her identity
   agent informs her that geekdate.com is requesting some data, her
   first name.  Her agent already has this data.  She provides consent
   and the data is sent to the site.

6.3.  B3

   Beth decides to create a profile at geekdate.com.  She sees an IN
   button, which she clicks.  Her identity agent displays a screen
   informing her that geekdate.com is requesting some data, an
   identifier.  She provides consent and the identifier and identifier
   verification data is sent to the site.  Geekdate.com uses the
   verification data to verify that Beth owns the identifier her agent
   provided.

6.4.  B4

   Beth decides to create a new profile at geekdate.com.  She sees an IN
   button, which she clicks.  Her identity agent displays a screen
   informing her that geekdate.com is requesting some data, an
   Identifier.  She instructs her identity agent to create an identifier
   specific to her relationship with geekdate.com.  She provides consent
   and the data is sent to the site.

6.5.  B5

   Beth decides to flesh out her profile at geekdate.com.  Geekdate.com
   displays a registration form.  One field requests a URL of a photo of



Merrells                Expires November 2, 2006                [Page 9]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


   her.  Beside it is a SAVE button.  She enters the URL and clicks the
   button.  Her identity agent displays a screen informing her that this
   data item can be stored.  She decides that she wants to be able to
   provide that data to other sites.  She provides consent and the data
   is stored by her agent.

6.6.  B6

   Geeknews.com offers Beth the option to build up a readership
   preferences profile over time, the benefit being that the site will
   tailor its content to her interests.  She decides to take up the
   offer, she sees an IN button, which she clicks.  Her identity agent
   informs her that geeknews.com is requesting some data, an Identifier.
   She selects an existing identifier, which she chooses to use for a
   subset of the sites she has a relationship with.  She provides
   consent and the data is sent to the site.

6.7.  B7

   Beth wants to have multiple identifiers, for different aspects of
   herself, her personas.  She wants to have a 'home' persona for
   identity data that she releases to her personal sites, such as
   geeknews.com.  She wants to have a separate 'work' persona for
   identity data that she releases to work-related sites, such as
   helpdesk.com.  She wants some of her identity data to be the same for
   her different personas, and other data to be different.

6.8.  B8

   [Assumptions: Beth has visited geeknews and geekdate before and has
   informed her identity agent that she consents to a relationship with
   them.]  Beth starts her day with a strong coffee and a perusal of
   geeknews.com.  She starts her computer and authenticates herself to
   the operating system.  By that authentication mechanism she has also
   authenticated herself to her identity agent, as her vendor of that
   system has hooked it into the operating system's authentication
   system.  She browses to geeknews.com and clicks the IN button and is
   directly shown the content, no further clicks.  She then browses to
   geekdate.com, she clicks the IN button and is directly presented with
   her profile no further clicks.

6.9.  B9

   Beth's identity agent prompts her to provide a 'spoken name'.  Using
   the multimedia capabilities of her computer she records her spoken
   name; an mp3 of her saying 'Beth'.  She later browses to
   voicebox.com, which runs a voicemail service, she opts to create an
   account and the site requests some properties, amongst which is a



Merrells                Expires November 2, 2006               [Page 10]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


   request for her spoken name.  She provides consent and the data is
   sent to the site.

6.10.  B10

   Beth purchases a book from an online store, as she's checking out the
   store makes her an offer: 10% off for completion of a demographic
   survey.  She's tempted, but how many data fields are there?  One
   hundred!  Too many to be worth the effort.  But it happens to be
   commonly requested data, which her identity agent has already
   gathered during previous exchanges with other sites.  So, she
   completes the remaining fields, provides consent and all the data is
   sent to the site.

6.11.  B11

   Beth has invested significant effort in building up a persona and
   reputation around a specific identifier, her 'home' identifier.  But,
   she has become dissatisfied with her identity agent and so decides to
   switch vendors.  She establishes a new agent and migrates her
   identity data from the old one to the new one.  She then changes the
   delegation of authority for her identifier from her old identity
   agent to her new identity agent for authentication and provision of
   identity data.

6.12.  B12

   Whilst in town Beth stops off at an Internet Cafe to check her email.
   She goes to her webmail account, which requires that she identity
   herself.  Her Identity Agent prompts her for consent and provides her
   identifier so that she can gain access to her email.

6.13.  B13

   Beth visits a website to purchase some books.  The site requests some
   identity information, her shipping address.  Her Identity Agent warns
   her that satisfying the request would contravene her established
   privacy policy.  The website wishes to pass her address to affiliated
   companies so that they may send her valuable promotional offers, but
   Beth has a privacy policy that not allow unsolicited mail to be sent
   to her shipping address.

6.14.  B14

   Beth moves house, so she changes the home address information stored
   by her Identity Agent.  Her Identity Agent offers to notify all
   relying parties to whom she has previously provided her home address.




Merrells                Expires November 2, 2006               [Page 11]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


6.15.  B15

   Beth leaves work and goes to the bus stop.  Whilst waiting for the
   next bus home she uses her smart phone to browse geeknews.com.  Her
   Identity Agent provides her with the same ease of browsing that she
   experiences on her work and home computers.

6.16.  B16

   Beth is ending her day at work.  She leaves work and waits for the
   next bus home.  Her friend calls and invites her to the movies.  She
   uses her phone to browse to the movies.com to find out what's
   playing.  The site requests her current location, which she consents
   to release via her Identity Agent.

6.17.  B17

   Beth signs up with a financial services site, BigPicture.com, which
   provides an aggregate view of her finances.  To provide its service
   BigPicture.com requires access to her existing bank accounts.  Beth
   wishes to securely provide agency rights to BigPicture.com, so she
   acquires the appropriate access tokens from her existing bank account
   providers and stores them with her Identity Agent.  She then presents
   the access tokens to BigPicture.com so that it can access her account
   data.

6.18.  B18

   Beth goes to an auction side, ibay.com.  Her Identity Agent shows a
   signed graphic of ibay.com for releasing data.  Beth knows that she's
   dealing with ibay.com, and not an impostor.

6.19.  B19

   Adam decides to create a profile at geekdate.com. geekdate.com
   requests an Identifier.  He instructs his identity agent to create an
   identifier specific to his relationship with geekdate.com.

6.20.  B20

   Adam heavily frequents two gambling sites, casino.com and
   betting.com.  He uses the same identifier across both sites as he
   wants them to know he is the same person.

6.21.  B22

   Beth has many computing devices in her life, running different
   operating systems and different application software.  She makes her



Merrells                Expires November 2, 2006               [Page 12]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


   own choices about her own computing environment, but she has little
   choice when the software is bundled by the device manufacturer or at
   work where she is subject to her employer's policies.  As a
   consequence she has multiple identity agents managing her 'work'
   persona; both on her office computer and her work mobile phone.

6.22.  B23

   Adam's computing environment is somewhat simpler, with both his
   'gambling' and 'church' personas managed by his identity agent on his
   home computer.








































Merrells                Expires November 2, 2006               [Page 13]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


7.  Assertion Use Cases

   These use cases motivate the need for third-party attested attribute
   value assertions, referred to in the following as 'claims'.

7.1.  A1

   Beth is a frequent traveler on Galactic Air, whose site offers a
   claim of membership for use at affiliate sites.  She acquires a
   membership claim, which her Identity Agent stores for her.

7.2.  A2

   Beth visits a Galactic Air affiliate site that provides discounted
   travel insurance for frequent travelers.  She presents her Galactic
   Air membership claim from her Identity Agent and receives a discount.

7.3.  A3

   Beth visits a rental cars site.  She opts out of the offered drivers
   insurance as she is covered by her travel insurance.  To complete the
   booking the site requests a claim that she has valid insurance.  Her
   identity agent is unable to satisfy the request so provides a list of
   suggested sources.  Beth picks her insurance provider and her
   identity agent acquires the required claim and with her consent
   presents it to the rental car site.

7.4.  A4

   A couple of months later Beth books another trip.  The travel site
   requests her claim of Galactic Air membership.  Her identity agent
   finds that the claim has expired, so refreshes it by requesting an
   updated claim from galacticair.com.

7.5.  A5

   When she visits onlinebank.com, she clicks IN.  Her Identity Agent is
   informed by the online back that a strong authentication mechanism is
   required, and is provided with a list of acceptable mechanisms,
   including two-factor authentication.  Beth�s Identity Agent
   authenticates Beth using a two-factor device.  The data that is sent
   to the online bank includes a claim from the vendor of the two-factor
   device, confirming that Beth was authenticated with a two-factor
   device.

7.6.  A6

   Adam uses a service to acquire a verified email claim.  With it he



Merrells                Expires November 2, 2006               [Page 14]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


   can prove that he owns his email address, Adam@example.com, without
   having to go through a verification process.

7.7.  A7

   Beth gives her friend, Adam@example.com, access to her photos.  Adam
   receives an email from Beth inviting him to view her photos.  He goes
   to the site, which requests a verified email claim.  He presents his
   claim and gains access to the photos Beth has published for him.

7.8.  A8

   Adam visits a site that requires that he prove he is over 21.  He
   provides the site with a claim that he is over 21, issues by the
   government of his country of residence, gov.ca.  The claim contains
   no other information about Adam and the site is unable to use the
   claim to discover more information about Adam.

7.9.  A9

   Adam returns to the same site.  He must again prove that he is over
   21.  He provides a claim, but the site cannot tell that it is Adam
   that has returned again to the site.

7.10.  A10

   Beth provides a claim from galacticair.com to many different
   websites.  She wants all of the sites to know that she is the same
   person providing the claim, so she can receive a free flight at the
   end of the year.

7.11.  A11

   Beth's employer has partnered with a local university to provide it's
   staff with access to online courses.  She signs up for some modules
   at the university admissions website acquiring an enrollment claim.
   She then browses to the computer science school website to sign up
   for an advanced programming course.  The site requests claims that
   she is an employee, that she has previously completed some basic
   introductory modules, and that she has been enrolled.

7.12.  A12

   Beth is shopping online for a new laptop computer.  She visits an
   online site that caters to recently graduated professionals.  She
   selects a machine and investigates the lease options available.  To
   work out the monthly payment the site requests some claims: A claim
   that she's an alumni of a university, so that the site can include an



Merrells                Expires November 2, 2006               [Page 15]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


   appropriately branded tote bag.  A claim that she's a member of
   Galactic Air, so that she can be credited with airmiles for her
   purchase.  And, a claim from a credit scoring agency that she has a
   'good' credit rating.

7.13.  A13

   Beth is at home checking her work email, she has an email from a
   colleague assigning a customer support issue to her.  The company
   help desk system is provided by helpdesk.com, an on-demand
   application provider.  She clicks through a link in the email to the
   page that describes the issue.  Helpdesk.com requests a claim that
   Beth is an employee of 'Nano Software Inc', which she provides from
   her Identity Agent, and she gains access to the page.

7.14.  A14

   Beth is shopping online at a site for a college text book.  The site
   offers a discount to students, so requests an appropriate claim.
   With Beth's consent her Identity Agent acquires an enrollment claim
   from her university.  The university issues the claim, but signs it
   as a parent authority, which represents all universities in the
   region.  The Identity Agent, with Beth's consent, presents the claim
   to the site, which can now verify that Beth is a student, but can not
   determine which university she is a student of.


























Merrells                Expires November 2, 2006               [Page 16]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


8.  Non Browser Based Use Cases

   These use cases motivate alternative protocol bindings for a DIX
   protocol.

8.1.  NB1 - REST

   Beth wants to use QOPO.com for printing her pictures that are stored
   in flackr.  She visits QOPO.com and her identity agent is instructed
   to acquire a token from flackr.  Her Identity Agent retrieves the
   token from flackr and presents it to QOPO.com.  QOPO.com passes the
   token over the REST based web service that flackr provides to
   retrieve her photos for printing.

8.2.  NB2

   Beth is a big fan of Rocky Gervas and listens to his podcast
   fanatically.  The Rocky Gervas show recently started charging a small
   fee for the podcast.  Her media player polls the podcast
   periodically.  When polled the site requests a claim from Beth's
   Identity Agent asserting that Beth has paid for the podcast.  Beth's
   Identity Agent retrieves the claim presents it to the site and the
   latest episode of The Rocky Gervas show is downloaded.

8.3.  NB3 - WebDAV

   At work Beth uses her website editing software (a WebDAV client) to
   publish some company confidential content to their extranet.  Beth is
   collaborating with Charles at another company, who requires access to
   the content.  Beth configures the extranet to allow Charles access.
   Charles uses his website editing software (also a WebDAV client) to
   fetch the content.  The extranet site requests identity information,
   which his client presents from his Identity agent, and he is able to
   edit the content.

8.4.  NB4 - AtomPub

   Beth uses a blogging client (AtomPub) to both post content to her
   blog and to add comments on other people's blog postings.  Her client
   uses her identity agent to associate identifying information (her
   blog url and favicon) with her comments.

8.5.  NB5 - XCAP and SIMPLE

   Beth uses her instant messaging client (a SIMPLE client) to
   communicate with her friends.  She uses her client to update her
   profile information (via XCAP), adding a new friend.  Her client
   didn't need to authenticate to her XCAP server, as she had already



Merrells                Expires November 2, 2006               [Page 17]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


   authenticated herself to her identity agent.

8.6.  NB6 - CalDAV

   Beth needs to arrange a conference call with Charles.  She uses her
   calendaring software (a CalDAV client) to publish her free-busy time
   to Charles.  Charles uses his calendaring software (also a CalDAV
   client) to fetch Beth's free-busy time.  Beth's calendar publisher
   requests some identity information of Charle's client.  It's provided
   from his identity agent and he is able to book a time for the call.

8.7.  NB7 - IMAP/POP3 and CalDAV

   At work Beth uses both calendaring (CalDAV) and email
   (IMAP,POP3,SMTP) clients to manage her time and messages.  Her
   identity agent authenticates her as owning the identifier that both
   clients use to identify her.  In this way she need only authenticate
   once to her identity agent instead of twice, once to each client.

8.8.  NB8 - RSS, Web, and CalDAV

   Beth works in a distributed workgroup collaborating with colleagues,
   individual contractors, and employees of partner companies.  The
   calendaring information she has access to is available via CalDAV,
   RSS, and HTTP/HTML.  Each of her software clients uses her identity
   agent to ensure she need only authenticate once, instead of once per
   client.
























Merrells                Expires November 2, 2006               [Page 18]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


9.  Acknowledgements

   The editor acknowledges the use case contributions made by Dick
   Hardt, Robert Yates, Lisa Dusseault, and Laurie Rae.

   And also the comments provided by Jeffrey Altman, Cat Okita, and Jim
   Sermershiem.












































Merrells                Expires November 2, 2006               [Page 19]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


10.  Security Considerations

   None.

11.  References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [dmd1]     Merrells, J., "draft-merrells-dix-01.txt", March 2006.

   [identitygang]
              The Identity Gang, "http://identitygang.org/Lexicon",
              March 2006.





































Merrells                Expires November 2, 2006               [Page 20]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


Author's Address

   John Merrells
   Sxip Identity
   798 Beatty Street
   Vancouver, BC  V6B 2M1
   Canada

   Email: merrells@sxip.com
   URI:   http://sxip.com/









































Merrells                Expires November 2, 2006               [Page 21]

Internet-Draft    Digital Identity Exchange - Use Cases         May 2006


Intellectual Property Statement

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Disclaimer of Validity

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Copyright Statement

   Copyright (C) The Internet Society (2006).  This document is subject
   to the rights, licenses and restrictions contained in BCP 78, and
   except as set forth therein, the authors retain all their rights.


Acknowledgment

   Funding for the RFC Editor function is currently provided by the
   Internet Society.




Merrells                Expires November 2, 2006               [Page 22]