decentralized-id.github.io/_posts/resources/2020-01-10-getting-started.md

119 lines
16 KiB
Markdown
Raw Normal View History

2020-01-11 00:57:51 +00:00
---
2020-11-21 19:50:02 +00:00
title: "Introduction to Decentralized Identity"
2023-06-29 13:49:51 +00:00
description: Getting Started with Decentralized, Self Sovereign, Identity
excerpt: >
The essence of Decentralized-ID is in creating open standards for a privacy preserving internet-wide identity layer — not owned by any one particular organization, but interoperable between all.
It's impossible to have a conversation about decentralized-id without discussing blockchain, self sovereign identity, standardization, frameworks, and government bodies.
permalink: /resources/getting-started/
redirect_from:
- /introduction/
- /getting-started/
- /resources/
toc: true
categories: ["Resources"]
tags: ["101","Resources"]
last_modified_at: 2023-06-29
2020-01-11 00:57:51 +00:00
---
2020-01-11 01:36:32 +00:00
The essence of Decentralized-ID is in creating open standards for a privacy preserving internet-wide identity layer — not owned by any one particular organization, but interoperable between all.
2023-06-29 13:49:51 +00:00
It's impossible to have a conversation about decentralized-id without discussing blockchain, self sovereign identity, standardization, frameworks, and government bodies.
2020-01-11 01:36:32 +00:00
2020-11-02 02:57:50 +00:00
<ul>
<li>Cryptographers, privacy advocates and digital identity enthusiasts <a href="/history/">laid the foundation</a> by deeply considering the privacy implications of identification practices in the electronic world.</li>
2023-06-29 13:49:51 +00:00
<ul><li><a href="{% link _posts/topics/2018-12-22-characteristics-principles.md %}">Self Sovereign Identity principles emerged</a> from their work, gathering momentum as the digital age began to settle in.</li></ul>
2020-11-02 02:57:50 +00:00
<li>The European Union's GDPR enlarged the global conversation around digital privacy practices, lending much weight to the SSI credo.</li>
<li>The United Nations Sustainable Development Goals (SDGs) have also fueled efforts towards a global and widely accessible identity solution.</li>
<li>Satoshi Nakamoto released <a href="https://bitcoinfo.xyz">Bitcoin</a>, proving the concept of digital scarcity in the form of a decentralized peer-to-peer (P2P) currency, inspiring leaders in every industry to integrate it's features to their business models.</li>
<li>At the same time, <a href="https://sourcecrypto.pub/decentralized-web/">Decentralized web</a> and P2P technologists have also lent strength to Decentralized Identity efforts.</li>
<li>Collectively arrived at solutions are trending towards congruence with the spirit of innovation, privacy concerns, and compliance within the evolving global regulatory landscape.</li>
</ul>
2023-06-29 13:49:51 +00:00
<h2>Getting Started with Decentralized, Self Sovereign, Identity</h2>
2020-11-02 02:57:50 +00:00
<ul>
2023-06-29 13:49:51 +00:00
<li><a href="https://threadreaderapp.com/thread/1405788127265005571.html">New to the topic of self-sovereign identity?</a> 2021-06-18 SSIAmbassador</li>
<blockquote>No problem, there are several beginner #guides, which you can use to get familiar with the new standard for digital #identity.</blockquote>
2020-11-02 02:57:50 +00:00
<li><a href="http://www.windley.com/archives/2019/01/the_laws_of_identity.shtml">The Laws of Identity</a></li>
<blockquote>The Internet was created without any way to identify the people who used it. The Internet was a network of machines. Consequently, all the identity in Internet protocols is designed to identify machines and services. People used the Internet through some institution (their company or university) and were part of that institution's administrative identity system. This can still be seen in the format of email addresses that identify both recipient and sender as someone@someplace. As the Internet grew to include people who weren't formally associated with an institution, every Web site and service created their own administrative identity domains. The result is the fractured plethora of identifiers, policies, and user experiences that constitute digital identity in 2019.</blockquote>
<li><a href="https://raw.githubusercontent.com/jandrieu/rebooting-the-web-of-trust-fall2016/master/topics-and-advance-readings/a-technology-free-definition-of-self-sovereign-identity.pdf) - A topic paper by Joe Andrieu (joe@joeandrieu.com">A TechnologyFree Definition of SelfSovereign Identity</a> for the third Rebooting Web of Trust DesignShop October 2016</li>
<blockquote>Abstract The desire for increased control over our identity has catapulted the idea of “selfsovereign identity” into the forefront of digital identity innovation, yet the term lacks a rigorous definition beyond specific technical implementations1. This paper explores what selfsovereign identity means independent of technology: what people need from independent identity capabilities. I want to understand how such a system enables both individuals whose identities are in play (subjects), as well as those who use those “identities” to correlate interactions across contexts (observers). I start with grounding individual sovereignty in the Enlightenment and identity in its core function of correlation, then propose core characteristics of a selfsovereign identity system. My eventual goal is to model the technologyindependent requirements of a selfsovereign solution suitable for realizing UN Sustainable Development Goal 16.9: “Providing every last person on the planet with a legal identity by 2030.”</blockquote>
2023-06-29 13:49:51 +00:00
<li><a href="https://www.windley.com/archives/2017/08/the_case_for_decentralized_identity.shtml">The Case for Decentralized Identity</a> 2017-08 Phil Windley</li>
2020-11-02 03:33:06 +00:00
<blockquote>We cannot decentralize many interesting systems without also decentralizing the identity systems upon which they rely. We're finally in a position to create truly decentralized systems for digital identity.</blockquote>
2020-11-02 02:57:50 +00:00
<li><a href="https://github.com/ChristopherA/self-sovereign-identity/blob/master/ThePathToSelf-SovereignIdentity.md">The Path to Self-Sovereign Identity</a></li>
<blockquote>Self-sovereign identity is the next step beyond user-centric identity and that means it begins at the same place: the user must be central to the administration of identity. That requires not just the interoperability of a users identity across multiple locations, with the users consent, but also true user control of that digital identity, creating user autonomy. To accomplish this, a self-sovereign identity must be transportable; it cant be locked down to one site or locale.</blockquote>
2023-06-29 13:49:51 +00:00
<li><a href="https://sovrin.org/wp-content/uploads/2018/03/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf">The Inevitable Rise of Self-Sovereign Identity</a> 2018-03 Sovrin Foundation</li>
2020-11-02 02:57:50 +00:00
<blockquote>This lack of secure, portable, user-controlled identity has some dire consequences. It means that a persons identity and personal data only exists within the context of each specific website or application he or she uses. Stop using the site or application and the persons digital existence is meaningless. And a users control over their identity and data must be exerted on a site-by-site, app-by-app basis.</blockquote>
2023-06-29 13:49:51 +00:00
<li><a href="https://id2020.org/digital-identity">The Need for Good Digital ID is Universal</a> ID2020 Foundation</li>
2020-11-02 02:57:50 +00:00
<blockquote>The ability to prove who you are is a fundamental and universal human right. Because we live in a digital era, we need a trusted and reliable way to do that both in the physical world and online.</blockquote>
2023-06-29 13:49:51 +00:00
<li><a href="https://medium.com/decentralized-identity/the-rising-tide-of-decentralized-identity-2e163e4ec663">The Rising Tide of Decentralized Identity</a> Decentralized Identity Foundation</li>
2020-11-02 02:57:50 +00:00
<blockquote>Creating a unified decentralized identity ecosystem requires addressing a set of fundamental user needs and technical challenges:<br><br>
- Enabling registration of self-sovereign identifiers that no provider owns or controls.<br>
- The ability to lookup and discover identifiers and data across decentralized systems.<br>
- Providing a mechanism for users to securely store sensitive identity data, and enabling them to precisely control what is shared with others.</blockquote>
</ul>
2020-01-11 20:41:51 +00:00
2020-11-20 08:33:49 +00:00
{% include video id="DaM0UtQTLCs" provider="youtube" %}
2020-11-02 03:33:06 +00:00
<h2>Digital Identity 101</h2>
2020-11-02 00:17:01 +00:00
If you're looking to freshen up on your digital identity fundamentals, the following resources will be a good place to start.
2020-11-02 02:57:50 +00:00
<ul>
2023-06-29 13:49:51 +00:00
<li><a href="https://medium.com/@dip_ak/guide-to-digital-identity-part-1-4b7c8fe45ee1">Guide to Digital Identity — Part 1</a> 2020-04-08 Deepak Gupta</li>
2020-11-02 02:57:50 +00:00
<blockquote>Are you curious about the Digital Identity Ecosystem? If you have been looking for a good, reliable and easy-to-understand source of information and havent had any luck, then this article is for you.</blockquote>
<li><a href="https://medium.com/humanizing-the-singularity/what-is-digital-identity-c77983c03306">What is Digital Identity?</a></li>
<blockquote>The SapirWhorf Hypothesis, also known as the principle of linguistic relativity, posits that language constructs our reality and worldview. While the hypothesis has been contested over the years, language is unarguably fundamental to the models of the world we build in our heads — and in our systems.</blockquote>
<li><a href="https://www.beyondtrust.com/blog/entry/understanding-authentication-vs-authorization">Difference Between Authentication and Authorization</a></li>
<blockquote>What is the difference between authentication (authN) versus authorization (authZ)? While these two fundamental security terms are often confused with each other, the only real similarity is they both begin with the letter “A” and are linked by an account. In concept, one verifies the account (authentication) and the other sanctions (authorization) the account to perform a task. Because these terms are so fundamental, its crucial to understand the difference between them, and the implications for each when the concepts are blended</blockquote>
<li><a href="https://www.beyondtrust.com/blog/entry/what-is-identity-and-access-management-and-why-is-it-a-vital-it-security-layer">What is Identity and Access Management and Why is it a Vital IT Security Layer?</a></li>
<blockquote>Identity and Access Management (IAM), also called identity management, refers to the IT security discipline, framework, and solutions for managing digital identities. Identity management encompasses the provisioning and de-provisioning of identities, securing and authentication of identities, and the authorization to access resources and/or perform certain actions. While a person (user) has only one singular digital identity, they may have many different accounts representing them. Each account can have different access controls, both per resource and per context.</blockquote>
2023-06-29 13:49:51 +00:00
<li><a href="https://idpro.org/member-present">IDPro Member Presentations - Identiverse 2019</a> - <a href="https://www.youtube.com/playlist?list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf">playlist</a></li>
<ul>
<li><a href="https://www.youtube.com/watch?v=T5w1EXqMqR0&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf">2019 - Introduction to Identity Part 1 - Identiverse</a></li>
<blockquote>This workshop — provided by IDPro — will provide a comprehensive (and fun) introductory view of the identity world that will give participants a solid understanding of IAMs foundations. Part 1 of this 2-part class begins with the basics like directories, identity proofing, provisioning, authentication (including multi-factor), authorization, as well as federation technologies like SAML, OAuth, and OpenID Connect. In Part 2, we build on those foundational technologies to explain PKI & digital certificates, privileged access management, identity for IoT, identity assurance, privacy issues, identity standards organizations, and even known attack vectors.</blockquote>
<li><a href="https://www.youtube.com/watch?v=zxKRUXmTLJs">Introduction to Identity Part 2 - June 25 - Identiverse 2019</a></li>
<li><a href="https://www.youtube.com/watch?v=kWpqFWz_9II">Modern Identity for Developers 101 - June 25 - Identiverse 2019</a></li>
<blockquote>Modern identity promises to solve some of the thorniest problems that historically plagued handling authentication and access control in applications. That sounds great in theory, but how do thinks really look like when the rubber hits the road what does it take to incorporate modern identity in your applications development practice? Come to this session to learn the basis of modern identity development and be better equipped to understand and participate to the session in this years Identiverse development track.</blockquote>
<li><a href="https://www.youtube.com/watch?v=25qiVyZEZOg&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=18">An Introduction to Mobile Identity - June 25 - Identiverse 2019</a></li>
</ul>
2020-11-02 02:57:50 +00:00
</ul>
2020-11-21 17:56:31 +00:00
<center><img src="https://i.imgur.com/9KpJRDr.png"/></center>
2020-11-02 02:57:50 +00:00
<h2>Glossaries</h2>
2020-01-11 00:57:51 +00:00
2020-11-02 02:57:50 +00:00
<ul>
2023-06-29 13:49:51 +00:00
<li><a href="https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0006-ssi-notation/README.md">Aries RFC 0006: SSI Notation</a> 2019-06-20 Daniel Hardman Hyperledger Foundation</li>
<blockquote>This RFC describes a simple, standard notation for various concepts related to decentralized and self-sovereign identity (SSI).</blockquote>
2020-11-02 02:57:50 +00:00
<li><a href="http://wiki.idcommons.org/Lexicon">IDCommongs - Lexicon</a></li>
<li><a href="http://wiki.idcommons.org/Identipedia">Identipedia</a></li>
<li><a href="http://wiki.idcommons.org/Systemic_Elements">Systemic Elements</a></li>
</ul>
2020-01-11 01:36:32 +00:00
2020-11-02 02:57:50 +00:00
<h2>Resources</h2>
2020-01-11 01:36:32 +00:00
2020-11-02 02:57:50 +00:00
<ul>
2023-06-29 13:49:51 +00:00
<li>[Publication] <a href="http://ssimeetup.org/">SSI Meetup</a> [<a href="https://www.slideshare.net/SSIMeetup/presentations/">Slides</a>] [<a href="https://www.youtube.com/channel/UCSqSTlKdbbCM1muGOhDa3Og">Videos</a>]</li>
<li>[Wiki] <a href="https://iiw.idcommons.net/Main_Page">IIW-Wiki</a></li>
<li>[Wiki] <a href="http://wiki.idcommons.net/Main_Page">wiki.idcommons.net</a></li>
<li>[Curated List] <a href="https://github.com/animo/awesome-self-sovereign-identity">animo/awesome-self-sovereign-identity/</a> 2023-07-07</li>
<li>[Collection] <a href="https://github.com/WebOfTrustInfo/self-sovereign-identity">WebOfTrustInfo/self-sovereign-id/</a> 2022-12-07 Rebooting Web of Trust</li>
<li>[Curated List] <a href="https://github.com/peacekeeper/blockchain-identity">peacekeeper/blockchain-identity</a></li>
<li>[Blog] <a href="https://identitywoman.net/">Identity Woman</a></li>
<li>[Blog] <a href="http://www.windley.com/tags/identity.shtml">Phil Windley - Tags: identity</a> [<a href="https://vimeo.com/windley/videos">Videos</a>]</li>
<li>[Blog] <a href="https://identityblog.com">Kim Camerons Identity Blog</a></li>
<li>[Curated List] <a href="https://github.com/karimStekelenburg/awesome-self-sovereign-identity">karimStekelenburg/awesome-self-sovereign-identity</a></li>
<li>[Course] <a href="https://www.edx.org/course/getting-started-with-self-sovereign-identity">Getting Started with Self-Sovereign Identity</a> Kaliya & Lucy via Linux Foundation and EdX</li>
<blockquote>Gain a solid foundation on self-sovereign identity (SSI) with a 360 degree overview of its evolutionary journey, key concepts, standards, technological building blocks, use cases, real-world examples and implementation considerations.</blockquote>
<li> [Book] <a href="https://www.manning.com/books/self-sovereign-identity#toc">Self-Sovereign Identity : Decentralized digital identity and verifiable credentials</a> 2021-05 Manning</li>
<blockquote>It combines a clear, jargon-free introduction to this blockchain-inspired paradigm shift with interesting essays written by its leading practitioners. Whether for property transfer, ebanking, frictionless travel, or personalized services, the SSI model for digital trust will reshape our collective future.</blockquote>
<li>[Directory] <a href="https://trinsic.notion.site/trinsic/Global-Verifiable-Credential-Adoption-78c7e4c5f2a34a228a55d03db54ab399">Global Verifiable Credential Adoption</a>Trinsic</li>
<blockquote>🔥 This is a community resource for tracking the adoption of verifiable credentials around the world. Please have a look around and join 10+ others who have contributed!</blockquote>
<li>[Directory] <a href="https://ssi-did-directory.gitbook.io/open-directory-for-all/">The open SSI / DID Directory</a></li>
<li>[Knowledgebase] <a href="https://identity.foundation/faq/">DIF "Frequently Asked Questions"</a></li>
<blockquote>This is the Decentralized Identity Foundations general-purpose knowledgebase, which aims to help people at all levels of familiarity with our problem space quickly level-set and find the most useful links and ideas as they explore the space. It is structures as a (very exhaustive) list of questions and answers. Feel free to share “anchor links” to specific questions using the § symbol next to individual questions or section/sub-section headings.</blockquote>
2020-11-02 02:57:50 +00:00
</ul>