[Log In] []

Exploring the science and magic of Identity and Access Management
Wednesday, February 4, 2026

Identity: Personal/Personalized, Static/Dynamic

Identity
Author: Mark Dixon
Saturday, May 26, 2007
3:52 am

I like Luke Razzell’s proposal that “The online projection of your identity is made up of information that is both personal (about you) and personalised (of interest to you).” As Google and Amazon and many others continues to amass as much information as they can about what is of interest to me, ostensibly to provide more personalized service to me, it makes sense to distinguish between Identity attributes “about” me and attributes describing “what I like”.

Expanding this view, it also makes sense that we talk about the difference between “static” and “dynamic” identity attributes. Static attributes include those items that don’t change (e.g. GPS coordinates on Angelina Jolie’s arm), and those that to change infrequently (e.g. residence, telephone number).

However, dynamic attributes may include current location, network device I am currently using (e.g. mobile phone, PC), my current interests (e.g. “I am hungry”), and what I am currently doing (the Twitter phenomena). Some of these dynamic attributes can be easily sensed (e.g. location, device), but an individual would need to specify others. It will be a while before Google can read my mind, although they are trying awfully hard to do so.

An immediate, major impact of the static/dynamic differentiation is that identity repositories must be flexible enough to handle both traditional slow-changing static attributes and more rapidly-changing dynamic attributes.  These repositories must handle dynamic attributes in real time. Big service providers are definitely taking stock of this issue.

Note 1: Luke and I differ in the spelling of “personalized” because we reside on opposite sides of the pond.

Note 2: I couldn’t figure out how to picture dynamic identities, so the horse will have to do.  His name is “Pure Dynamic.”

Technorati Tags: , , , ,

Comments Off on Identity: Personal/Personalized, Static/Dynamic . Permalink . Trackback URL
 

New GPS Application, Armed and Ready

Identity
Author: Mark Dixon
Saturday, May 26, 2007
3:07 am

Luke Razzell pointed out the Daily Mail report that Angelina Jolie keeps track of the geographical map coordinates for the birthplace of each member of her ‘rainbow family’ – on her arm – permanently.

I have just three comments:

  1. I remember in junior high when I wrote notes on my arm, much to my Mom’s chagrin. My 13 year old daughter does the same thing now.
  2. The Apostle Paul said something about “…put away childish things.” (1 Corinthians 13:11)
  3. Maybe Garmin should engage Ms. Jolie for a GPS device advertisement.

PS. I can hardly believe I actually put a picture of Angelina Jolie on my blog.

Technorati Tags: , ,

Comments Off on New GPS Application, Armed and Ready . Permalink . Trackback URL
 

Blakley on REAL ID

Identity
Author: Mark Dixon
Saturday, May 26, 2007
2:39 am

I believe Bob Blakley is spot on with his three reasons REAL ID is a bad idea:

  1. The REAL ID act will spend an enormous amount of YOUR money on a technology which cannot in principle solve the stated problems.
  2. The REAL ID act hands responsibility for solving a problem (terrorism and identity theft) to organizations (state DMVs) whose job does not involve solving these problems, who have no expertise in solving these problems, and who do not benefit in any way relevant to their own performance metrics from solving these problems.
  3. The existence of single, federally mandated identifier for all US persons, required for all high-value transactions, will INEVITABLY create a host of secondary uses and a large number of unforeseen consequences.

It is the third that worries me most.  It is not the stated purposes that are bad.  It is the huge possibility that this system will be exploited and compromised to oppress the very people who paid for it.

Technorati Tags: , ,

Comments Off on Blakley on REAL ID . Permalink . Trackback URL
 

Energetics

Identity
Author: Mark Dixon
Friday, May 25, 2007
2:22 pm

Energetics: “The study of the flow and transformation of energy.”

Thanks to the Identity Woman, I learned a new word today.  Thanks, Kaliya.

Technorati Tags: ,

Comments Off on Energetics . Permalink . Trackback URL
 

Identity Management Success/Failure Factors – Feedback is Arriving

Identity
Author: Mark Dixon
Thursday, May 24, 2007
9:03 am

Thanks to Matt Flynn of RSA and Pamela Dingle of Nulli Secundus for providing valuable feedback to my blog Identity Management Success/Failure Factors. We’re forty percent of the way towards scheduling a conference call to discuss in more detail.

We look forward to you joining the discussion.

Technorati Tags: ,
,

Comments Off on Identity Management Success/Failure Factors – Feedback is Arriving . Permalink . Trackback URL
 

Mobile Operators as Identity Providers

Identity
Author: Mark Dixon
Wednesday, May 23, 2007
6:01 am

Luke Razzell recently pointed out David Birch’s post which read in part: “I was thinking that the position of the mobile handset as the basis of practical identity management in the real world is becoming unassailable. As Neil McEvoy points out in yesterday’s podcast, it passes all of the tests: it’s portable, has secure storage, has its own keyboard for PIN entry and so on.”

This is similar to the proposal by Sun’s CTO Greg Papadopolous for using mobile handsets for strong authentication that I blogged about here and here.

I also blogged here that a mobile operator’s greatest asset is its large directory full of subscriber Identity information.

If we accept those two assertions (mobile phone as strong authentication device) and (mobile operator identity repositories as existing, valuable asset), I propose that mobile operators are in a strong position to emerge as Identity Providers, not just for the services they deliver themselves, but for independent service providers who want to offer strong authentication and Identity verification to their e-commerce consumer experience or user-managed identity scenarios where a third-party identity verification is required.

Technorati Tags: ,
,

Comments Off on Mobile Operators as Identity Providers . Permalink . Trackback URL
 

Asking for your Feedback: Identity Management Success/Failure Factors

Identity
Author: Mark Dixon
Monday, May 21, 2007
3:56 pm

Now that I’m able to devote some more quality time to my blog, I will respond to comments offered to my April 18th post.

The first comment was from James McGovern: “Could you in your next blog entry talk about what percentage of enterprises have been wildly successful in IDM, why the masses have only achieved mediocrity and what percentage have simply failed along with the characteristics of each demographic…”

The second was from Mark McCauley, who prompted my April 18th post in the first place: “Thanks for quoting my great great uncle, Mark Twain. I would love to see us set up a conference call/dial in discussion that we podcast discussing IDM deployments, what’s worked, what hasn’t and why. Thoughts?”

I was unable to find any statistics about what deployments reach success, mediocrity or failure. I wish I had access to such valuable information.

In the absence of definitive data, here are the major factors which I think are the primary contributors to relative success or failure of Identity Management projects:

  1. Executive support and governance. Identity management projects require executive sponsorship because they touch so many parts of an organization. Because of this wide reach, governance over an Identity Management initiative must include representatives from all stakeholder groups.
  2. Strategic vs. tactical approach. Unless an Identity Management project is part of a longer term Identity Management strategy, an organization may give up early or lose executive support before realizing real business value. Implementation projects need to be designed as building blocks to achieve a longer term strategy.
  3. Progressive implementation rather than “big bang” expectations. Initial Identity Management projects should do two things: a) provide a “quick win” business benefit and b) establish a foundation for futher expansion in size and functionality. The biggest killer of Identity Management projects is trying to do too much too soon.
  4. Qualified systems integrator involvement. Nothing beats implementing a system with someone who knows what they are doing. Organizations who try to do it themselves usually fail.
  5. Effective project management. These complex projects demand effective managers who can not only track schedule and budget, but effectively communicate with a diverse set of stakeholders and make sure everyone is pulling in the same direction.

Notice that I didn’t mention any technology in my list? Good technology is important (and we’ll always do our best to show you why Sun products are best), but I think the factors I listed are essential to success.

Now, here is my Ask

Please send me your list of the five most important factors that contribute to the success or failure of Identity Management projects.

… and my Offer.

I will post a composite list on my blog. If I receive lists from five people, I will sponsor a conference call to discuss those factors. We will record and podcast that session.

Thanks in advance for your participation.

Technorati Tags: ,
,

 

Facebook vs. Privacy

Identity
Author: Mark Dixon
Saturday, May 19, 2007
6:56 am

Robynn Arnold recently posted an interesting article, “Is Anything Private in the Age of Internet Social Networking?” She explored how privacy is forfeited once a person shares profile information on Facebook.com – essentially exposing personal Identity attributes to the outside world, all in the name of establishing and nuturing relationships between participants.

It reminds me of a time several years ago when I accompanied a large group of young people on a church-sponsored excursion from Mesa, AZ, to San Diego, CA. We drove in a caravan of several vans, using CB radios to keep in touch with each other. It was quite amazing to hear these teenage kids talking to each other over the CB radios. Conversations that would normally be held in private, constrained to a small group in a closed room, were now being broadcast for everyone to hear. It was as though they didn’t realize that technology was carrying their private conversations beyond the boundaries of the car.

I think it is all a matter of choice. Each of us can choose to share normally private information in cyberspace, or we can choose to forgo the advantages of Internet connectivity. But we can be selective. I choose to be quite open through this blog, LinkedIn and my family website. But trust me, there are things that transpire in the Dixon household that will never reach cyberspace. Discretion is still operative in the Participation Age.

Technorati Tags: ,
,
,
,

Comments Off on Facebook vs. Privacy . Permalink . Trackback URL
 

Mission Alignment and JavaOne

Identity
Author: Mark Dixon
Thursday, May 10, 2007
12:06 am

In 1995, I finally took the time to record a personal mission statement in six brief lines, as a result of some deep introspection inspired by Tom Peters and Steve Covey. I have reflected over the years that for me, writing a personal mission statement was not so much declaring what I wanted to become, but more like decoding my inbred DNA – discoverying my own Identity. I was able to capture, in a few short lines, the essence of who I am and the purpose of my existence.

In the opening session of JavaOne Tuesday morning, I had a small epiphany about the alignment between parts of my personal mission and that of my employer, Sun Microsystems.

Scott McNealy, Jonathan Schwartz and Rich Green shared the stage with Dr. Djibril Diallo, Director of the United Nations New York Office of Sport for Development and Peace, to promote Sun’s initiative to “reach the rest of humanity” with the “Network in your Hand” and free educational curriculum from Curriki.org for people everywhere.

Interestingly enough, points 4-6 in my mission statement read:

  • Provide for my family with integrity and honor
  • Serve my fellowmen with empathy and compassion
  • Enhance human freedom through global electronic communications

You see, much of the purpose of my life is tied up in providing for my family in a way that allows me to serve people and promote human liberty. I have long held the belief the knowledge of the truth sets people free, that oppressive political powers will eventually fall in the face of those who learn the truth, and that global electronic communications is our best hope for the liberation of mankind.

It is heartening to play a small role in a company with which I share a vision of the future.

Technorati Tags: ,
,
,
,

Comments Off on Mission Alignment and JavaOne . Permalink . Trackback URL
 

Identity Trends: JavaOne

Identity
Author: Mark Dixon
Tuesday, May 8, 2007
6:55 am

Terry Sigle and I completed our presentation of the Identity Trends session at JavaOne last night. Our session was actually a part of JavaUniversity, an optional segment preceding the main JavaOne event. You can download a copy of our presentation here. Any comments or feedback you have would be most welcome.

Thanks to all who gave input into this project!

Technorati Tags: ,
,
,

Comments Off on Identity Trends: JavaOne . Permalink . Trackback URL
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.