mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-12 00:54:23 -05:00
76 lines
8.9 KiB
Markdown
76 lines
8.9 KiB
Markdown
---
|
||
title: "What is Decentralized Identity? + Digital ID Fundamentals."
|
||
permalink: /getting-started/
|
||
---
|
||
|
||
![](https://i.imgur.com/9KpJRDr.png)
|
||
|
||
## What is Decentralized ID?
|
||
|
||
The essence of Decentralized-ID is in creating open standards for a privacy preserving internet-wide identity layer — not owned by any one particular organization, but interoperable between all.
|
||
|
||
It's impossible to have a conversation about decentralized-id without discussing blockchain, self sovereign identity, standardization and frameworks, along with global privacy and digital identifiction regulations:
|
||
|
||
|
||
* Cryptographers, privacy advocates and digital identity enthusiasts <a href="/history/">laid the foundation</a> by deeply considering the implications of identification practices in the electronic world.
|
||
* <a href="/literature/self-sovereign-identity/evolution-of-ssi/">Self Sovereign Identity principles emerged</a> from their work, gathering momentum as the digital age began to settle in.
|
||
* The European Union's GDPR enlarged the global conversation around digital privacy practices, lending much weight to the SSI credo.
|
||
* The United Nations Sustainable Development Goals (SDGs) have also fueled efforts towards a global and widely accessible identity solution.
|
||
* The Blockchain industry exploded around <a href="https://bitcoinfo.xyz">Bitcoin</a>, proving the concept of digital scarcity, in the form of a decentralized peer-to-peer (P2P) currency.
|
||
* <a href="https://sourcecrypto.pub/decentralized-web/">Decentralized web</a> and P2P technologists also lend strength to Decentralized Identity efforts.
|
||
* Collectively arrived at solutions are trending towards congruence with the spirit of innovation, privacy concerns, and compliance within the global regulatory landscape.
|
||
|
||
## Getting Started with Decentralized ID
|
||
|
||
[A Primer on Decentralized Identity](https://selfkey.org/a-primer-on-decentralized-identity/)
|
||
> Blockchain technology has changed the world and has helped society enact radical changes, especially when it comes to privacy and identity. Decentralized identity (DID) redefines the way we share, control, and access our personal information. In short, it gives power back to the people when it comes to identity.
|
||
[The Laws of Identity](http://www.windley.com/archives/2019/01/the_laws_of_identity.shtml)
|
||
> The Internet was created without any way to identify the people who used it. The Internet was a network of machines. Consequently, all the identity in Internet protocols is designed to identify machines and services. People used the Internet through some institution (their company or university) and were part of that institution's administrative identity system. This can still be seen in the format of email addresses that identify both recipient and sender as someone@someplace. As the Internet grew to include people who weren't formally associated with an institution, every Web site and service created their own administrative identity domains. The result is the fractured plethora of identifiers, policies, and user experiences that constitute digital identity in 2019.
|
||
|
||
[Identity: The Elephant in the Enterprise Blockchain Room](https://hackernoon.com/identity-the-elephant-in-the-enterprise-blockchain-room-6f31ed8d4132)
|
||
> The adoption of permissioned blockchain technologies in the enterprise is a road full of challenges. The so called Web3 stack based on decentralized ledgers is still fundamentally immature to enable sophisticated enterprise business processes. Among the building blocks missing from enterprise blockchain platforms, identity raises to the top of the list as one of the omnipresent challenges of this new generation of enterprise solutions. At Invector Labs, we are regularly faced with the challenges of enabling identity management capabilities in permissioned blockchain solutions. As a result, we have developed certain ideas of the key capabilities and models of an identity layer for enterprise blockchain solutions which I would like to outline in this article.
|
||
|
||
[The Case for Decentralized Identity](https://www.windley.com/archives/2017/08/the_case_for_decentralized_identity.shtml)
|
||
> We cannot decentralize many interesting systems without also decentralizing the identity systems upon which they rely. We're finally in a position to create truly decentralized systems for digital identity.
|
||
|
||
[Decentralized Identity: An alternative to password-based authentication](https://www.ibm.com/blogs/blockchain/2018/10/decentralized-identity-an-alternative-to-password-based-authentication/)
|
||
|
||
[![](https://i.imgur.com/7asRg1y.png)](https://www.gsma.com/identity/wp-content/uploads/2019/11/MWCA-19-ID-seminar-Microsoft-presentation-final.pdf)
|
||
|
||
[Demistifying Decentralized Identity](https://medium.com/3box/demystifying-digital-id-6ec413b129ac)
|
||
> Identity is not a single challenge but a set of many related ones. Good identity infrastructure should make it easy to manage the user-related capabilities in a product, service, or ecosystem in an elegant and user-empowering way. Traditional solutions and common workarounds usually fail at this - they don’t preserve privacy, are too fragile, don’t have the proper underpinnings to support the interoperability needed to easily extend to new capabilities and use cases over time. Decentralized identity infrastructure works togday and can adapt easily to future needs and opportunities.
|
||
|
||
|
||
## Digital Identity Fundamentals
|
||
|
||
* [What is Digital Identity?](https://medium.com/humanizing-the-singularity/what-is-digital-identity-c77983c03306)
|
||
> The Sapir–Whorf Hypothesis, also known as the principle of linguistic relativity, posits that language constructs our reality and worldview. While the hypothesis has been contested over the years, language is unarguably fundamental to the models of the world we build in our heads — and in our systems.
|
||
* [Difference Between Authentication and Authorization](https://techdifferences.com/difference-between-authentication-and-authorization.html)
|
||
> The identity of a person is assured by authentication. On the other hand, authorization checks the access list that the authenticated person has. In other words, the authorization includes the permissions that a person has given.
|
||
* [IDPro Member Presentations - Identiverse 2019](https://idpro.org/member-present) - [playlist](https://www.youtube.com/playlist?list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf)
|
||
* [2019 - Introduction to Identity Part 1 - Identiverse](https://www.youtube.com/watch?v=T5w1EXqMqR0&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=5&t=0s)
|
||
> This workshop — provided by IDPro — will provide a comprehensive (and fun) introductory view of the identity world that will give participants a solid understanding of IAM’s foundations. Part 1 of this 2-part class begins with the basics like directories, identity proofing, provisioning, authentication (including multi-factor), authorization, as well as federation technologies like SAML, OAuth, and OpenID Connect. In Part 2, we build on those foundational technologies to explain PKI & digital certificates, privileged access management, identity for IoT, identity assurance, privacy issues, identity standards organizations, and even known attack vectors.
|
||
* [Introduction to Identity Part 2 - June 25 - Identiverse 2019](https://www.youtube.com/watch?v=zxKRUXmTLJs)
|
||
* [Modern Identity for Developers 101 - June 25 - Identiverse 2019](https://www.youtube.com/watch?v=kWpqFWz_9II)
|
||
> Modern identity promises to solve some of the thorniest problems that historically plagued handling authentication and access control in applications. That sounds great in theory, but how do thinks really look like when the rubber hits the road – what does it take to incorporate modern identity in your applications development practice? Come to this session to learn the basis of modern identity development and be better equipped to understand and participate to the session in this year’s Identiverse development track.
|
||
* [An Introduction to Mobile Identity - June 25 - Identiverse 2019](https://www.youtube.com/watch?v=25qiVyZEZOg&list=PLpKq7xRiIHaTDwAqpIU1UYpKZY03tfTMf&index=18)
|
||
|
||
|
||
## Glossaries
|
||
|
||
* [IDCommongs - Lexicon](http://wiki.idcommons.org/Lexicon)
|
||
* [Identipedia](http://wiki.idcommons.org/Identipedia)
|
||
* [Systemic Elements](http://wiki.idcommons.org/Systemic_Elements)
|
||
|
||
## Resources
|
||
|
||
* [SSI Meetup](http://ssimeetup.org/) [[**V**](https://www.youtube.com/channel/UCSqSTlKdbbCM1muGOhDa3Og)][[**ϟ**](https://www.slideshare.net/SSIMeetup/presentations/)]
|
||
* [IIW-Wiki](https://iiw.idcommons.net/Main_Page)
|
||
* [wiki.idcommons.net](http://wiki.idcommons.net/Main_Page)
|
||
* [WebOfTrustInfo](https://github.com/WebOfTrustInfo/)
|
||
* [peacekeeper/blockchain-identity](https://github.com/peacekeeper/blockchain-identity)
|
||
* [identitywoman.net](https://identitywoman.net/)
|
||
* [windley.com/tags/identity](http://www.windley.com/tags/identity.shtml)
|
||
* [Kim Camerons Identity Blog](https://identityblog.com)
|
||
* [karimStekelenburg/awesome-self-sovereign-identity](https://github.com/karimStekelenburg/awesome-self-sovereign-identity)
|