e-Healthcare e-Banking e-Gaming e-Insurance e-Commerce e-Government Guide to building a secure and trusted BYOID environment Bring-Your-Own-Identity is not new. People have been using their social media login credentials for other applications for some time now. But how do you ensure these users are who they claim to be? How can you establish a Trusted Bring-Your-Own-Identity environment? SUMMARY 1 Identity, past & present 3 2 Trends that impact digital identity 4 3 Business challenges around Bring-Your-Own-Identity (BYOID) 8 4 Solution: establishing a secure & trusted Bring-Your-Own-Identity environment 10 5 Business benefits of a trusted Bring-Your-Own-Identity framework 13 6 Trusted BYOID use cases 16 7 How can I establish a trusted BYOID framework for my business? 18 8 About VASCO 19 9 Glossary 20 10 Sources 21 1 Identity, past & present In the past an identity was given to you; often in the form of an ID-card, driver’s license or social security number issued to you by a government authority. The benefit of this approach is that the identity has been verified and validated. Unfortunately this type of approach does not hold ground in today’s interconnected world where more and more transactions take place online. In today’s digital world, identity is something you create yourself. It is often a combination of attributes and characteristics. These attributes can be split into 4 main categories: • Legal attributes: social security number, ID number, date of birth • Social attributes: attributes related to your preferences and relations with family, friends & colleagues • Physical attributes: age, gender, DNA, picture, avatar • Behavioral attributes: websites you visit, online purchases you make, news feeds you subscribe to, social shares Any or all of these attributes can be combined to form a digital identity. From there, a digital identity can be used to create an online account (for a certain service or application). Example: User: John Smith Digital ID: Professional1 Attributes linked to “Professional1” include: Male, DOB, lives in Brussels Belgium… User John uses his “Professional1” Digital ID to create an account on LinkedIn 3 2 Trends that impact digital identity 2.1 The mobile revolution We live in an increasingly inter-connected world. The explosive growth in smart phones and tablets has triggered an always-on economy, where users expect to access online applications 24/7 and conduct transactions from any device. Global Mobile Devices and Connections The number of global users of mobile phones, capable of executing apps, is expected to cross the 50% mark for global smartphone penetration in 2017 and reach 59% by 2019, growing from 28% in 2013 (source 4). 4 On average, a European smartphone owner has 26 apps installed on his smartphone and almost 50% use a social media network on their smartphone on a daily basis. Users expect to be able to access all their applications from any device. Most of these apps, if not all of them, require a user to be logged in, thus adding to the complexity of password management and attribute control. Global mobile devices and connections Top 10 countries with the highest average number of installed apps per smartphone user* Source data: http://mashable.com/2013/09/05/most-apps-download-countries/ Source data: http://www.thinkwithgoogle.com/ 5 2.2 Social media Social media is here to stay. There are 2.08 billion active social media accounts. 29% of the entire world population actively uses an account, for an average of 2 hours and 25 minutes a day. Facebook has 1,366 billion monthly users, almost 20% of the current global population. There are 17 different social platforms that claim more than 100 million monthly users. This increased competition has triggered social media providers to come up with new business models to help them retain and increase their community footprint. A key element in achieving this has been the “social login”, where users are able to use their social media credentials to subscribe and login to other applications. Social login usage 6 2.3 The Internet of Things The Internet of Things (IoT) is growing, and with as wearables become an increasingly hot trend, it’s growing even faster. According to Cisco Systems (Source 2) we will reach 50 billion connected devices in 2020, estimating 99% of devices will be connected to the Internet (currently around 1%). Global internet device installed base forecast 2.4 Bring Your Own Device (BYOD) The Bring Your Own Device (BYOD) concept is common in technology-related companies where employees use their personal laptop, smartphone or tablet to log on to the corporate network & applications. According to a global survey among CIO’s conducted by Gartner (Source 1), 38% of companies expect to stop providing devices to workers by 2016 and switch entirely to BYOD. 7 3 Business challenges around BringYour-Own-Identity (BYOID) The aforementioned trends provide a clear insight into the possible impact on and risk for our (online) privacy. In addition to the impact on our privacy, there are also other business challenges that need to be addressed. 3.1 What is Bring-Your-Own-Identity? BYOID is an emerging approach to identity validation in which organizations allow users to authenticate to a website and consume web services using a digital identity that has already been established with a third party. Instead of requiring visitors to create a new identity during the registration process, using an existing digital identity enables the user to leverage a “valid” identity from a current service provider. Example: User John uses his Twitter account to subscribe and log in to his favorite online newspaper. 3.2 Legally binding transactions Actions or transactions made by a user using a social login are, at least for now, not legally binding. Therefore, using social logins lacks the required non-repudiation that associates actions or changes to a unique individual in a legally binding way. 3.3 Attribute control and transparency Who owns the user attributes and data and how will the attributes and data be accessed? As an application owner, it is necessary to be transparent with your users about which data will be accessed and how it will be used. 8 3.4 Security Getting rid of multiple passwords for multiple accounts is one of the greatest advantages of BYOID. At the same time it creates a single point of failure. If one is using a social login, and that social media account is compromised, this means all other web accounts are also at risk. Some social media platforms are trying to address this password security issue by implementing two-factor authentication. Unfortunately these solutions don’t always offer the best mix of user convenience, security and total cost of ownership, and can even create additional friction for the user. 3.5 Trust – Lack of validation Anyone can create a social media account. There is no validation of the identity or attributes provided by the user. 9 4 Solution: establishing a secure & trusted bring-your-own-identity environment 4.1 The digital identity playing field Application owners: • Deliver online applications & services to the market (= value) • Are looking to recruit new users Identity providers: • Have large user communities • Are looking to offer new services to their user-base in order to increase brand loyalty Users: • Are looking for more personalized, user friendly and secure online services • Want to be in control of their personal data (attributes) 4.2 Defining the framework Establishing a Trusted BYOID framework implies that users, application providers and ID providers are able to interact with each other online, in a secure and transparent way. Up until recently the only way to accomplish this would have been for application providers to integrate the different login solutions, offered by the different ID-providers, on a one-to-one basis. The sheer time and resources required to establish and maintain this setup immediately eliminates it as a viable solution. In addition, this type of approach does not consider the users’ need for attribute control, convenience and security. What is needed is a secure platform, that connects all parties involved. Access to this platform should be secured with easy to use, two-factor authentication functionality, such as a mobile app to generate secure and unique one-time-passwords. 10 This secure platform also needs to be easily, yet securely, accessible by all parties involved: • Application providers will benefit since they only need to integrate one platform API, similar to a Facebook or Google connect, resulting in faster time to market and lower development/maintenance costs. Additionally, it enables them to add easy to use twofactor authentication security to their applications. Perhaps the biggest benefit for the application providers is that he is able to collect validated user attributes, which are delivered by the ID-provider and authorized by the user, to offer his users a more personal and secure online service. • ID-providers that link to the platform are able to offer their user community secure access to a whole new range of online applications, resulting in a competitive differentiator that will increasing their customer loyalty. • Users will benefit from such a platform as well. They will be able to access all online applications on the platform with a single and secure login, eliminating the need for insecure static passwords. However, the biggest benefit for the user will undoubtedly be that he or she will be able to decide which of his/her (validated) attributes are shared with which application. Offering the user this type of control over his attributes will increase trust. It is clear that by enabling the use of validated attributes online, such a platform can pave the way for entirely new online business models and use cases that were previously impossible to accomplish due to legal constraints, especially on the mobile platform. A few examples: • Legally signing a contract from your tablet • Submitting an insurance claim from your mobile phone • Verifying a users’ legal age in order to allow access to certain online services and content 11 The biggest challenges in establishing such a secure & trusted BYOID framework will lay in: 1. The technical availability of a secure platform that can support this framework 2. The willingness of all three parties involved to adopt such a platform Without a trusted BYOID platform - • Complex integration • No or low security • Not convenient With a trusted BYOID platform Trusted BYOID platform + • Easy integration • High security with two-factor authentication • More user friendly (secure single sign-on) 12 5 Business benefits of a trusted BYOID framework The implementation of a trusted BYOID platform has several important business benefits for all parties involved. 5.1 Cost-Efficient & scalable Application owners and identity providers don’t need to integrate or maintain different online identity standards (that might conflict), but have one standard implementation. This means they can focus more on their core business, cut back expenses and improve financial efficiency. 5.2 Economic benefits Aside from the fact that a trusted Bring-Your-Own-ID platform ensures a secure way of logging in, it also offers economic benefits. The various application providers no longer need to integrate different API’s and maintain them. Using a single trusted BYOID platform does the trick and can save significant cost. 5.3 UX: user is in control of his attributes It is important for a user to know and authorize which of his digital identity attributes are being shared with the web application or service he is signing up to. Using a trusted BYOID platform, the user is in control of his own attributes and will know what kind of information is shared with application owners. Additionally, a recent international study has shown that users who are able to manage their online privacy are up to 52% more willing to share information than those who aren’t. By giving users more control over their personal data, they will reward you by sharing more information with you. 5.4 Trust as a competitive differentiator Using a secure and trusted digital identity platform will render your online services more trustworthy. This in turn will reflect positively on your brand reputation, giving you a competitive edge. 13 5.5 Know Your Customer - KYC New Know-Your-Customer (KYC) regulations requires businesses to verify the identity of their customers in order to prevent ID theft and fraud. Using a trusted BYOID platform will help online service providers to comply with these new KYC regulations. At the same time they are able to offer their users a more personalized service by leveraging their user (attribute) knowledge. 6.6 Enhanced conversion rates & faster onboarding Using long signup forms and asking users to provide additional personal data makes user onboarding a challenging process. Enabling users to re-use their existing validated digital attribute data when signing up for new online services will greatly facilitate the onboarding process. Especially in regulated environments such as banking, insurance, ecommerce and gambling, the ability to share validated attributes in a secure way will help increases online user conversions. Additionally, this type of approach reduces user mistakes during the sign-up process. 14 5.8 Increase operational efficiency Using a trusted digital ID-platform will enable businesses to move some of their processes and services online. Especially businesses offering labour intensive services or services that previously required physical ID validation (example: insurance, finance, government, etc) can expect to gain operational efficiency, reduce costs and develop new online business streams. 15 6 Trusted BYOID use cases 6.1 Insurance industry Although virtually all insurance companies offer some level of online services these days; most (if not all) of them still require you to send some physical proof of your identity when taking out an insurance policy. Today this is done either by printing, signing and faxing/emailing back the signed contract and by including a copy of your ID-card or similar. This implies a lot of time, resources and costs are directly related to handling the vast paper flows. By integrating their online services with a trusted ID-platform, insurance companies and agents can offer their customers the ability to legally sign insurance policies & claims online. Imagine the time gains and cost reductions that could be achieved by adopting such a model. 6.2 iGaming industry The boom of the online gaming & gambling industry over the recent years, has triggered a whole set of new legislation & regulation to come into effect. Although the exact legislation might differ per country or state, in most cases online gaming/gambling providers are required by law to “Know-Your-Customer” (KYC). This means they will need to perform some sort of age, or even location, verification. Integrating these verification steps into the user registration process will often hinder the onboarding efforts and reduce conversion rates. By linking their online gaming/gambling service to the trusted ID-platform, providers of these services could re-use already validated user attributes. This would enable them to greatly facilitate the onboarding process while at the same time complying with legal requirements. 6.3 Government/public sector Similar to the private sector, government agencies are increasingly under pressure from their citizens to offer secure and convenient public services 24/7. Although some governments have already made great strides in digitalizing their public services offering, requesting official documents today will still require users to drive down to a local administration center and provide some form of physical identification in order to obtain required documents. 16 Though different public services are already offered online today in some countries (library, police, tourist information, tax declaration, pension fund, etc.), most often they are not interconnected and require users to use different login and authentication credentials in order to gain access. The result is a poor user adoption rate which results in a less than optimal returnon-investment (something which is increasingly important also for governments in these dire economic times). At the same time, government agencies hold a vast numbers of validated user (citizen) attributes (age, address, sex, D.O.B., etc.), and this is an asset that is not maximized today. By enabling their citizens to use government-validated credentials for other “commercial” online services, governments (both local and federal) can help increase user adoption for their own services. At the same time the ability to use government validated attributes will enable service providers to comply with new online transaction security and KYC regulations. A pre-requisit for such a framework to succeed is the availability of a secure and trustworthy digital ID-platform. 17 7 How can I establish a trusted BYOID framework for my business? VASCO’S trusted BYOID platform MYDIGIPASS® MYDIGIPASS is the secure and trusted BYOID platform of VASCO Data Security, a world leader in strong user authentication, electronic signature and ID-management solutions. Application providers can easily integrate the MYDIGIPASS “secure connect” API into both their online and mobile applications in order to increase security, comply with legal requirements, facilitate user onboarding and gain customer knowledge. Identity providers are able to join the MYDIGIPASS platform and offer their user community access to a full range of new and secure online services under their own brand. Users can download the MYDIGIPASS mobile app from the appstore, create a free account and gain secure access to all supported applications (that have integrated the API). Additionally, users are able to stay in control of their digital identity attributes. The user decides which of his/her attributes are shared with which application. Banking level security Easy deployment Costefficient 2-factor authentication 1 implementation Flexible pricing Supports mobile, eID, intel IPT & hardware tokens Pay as you grow Proven DIGIPASS technology ® Free for your users 18 8 About VASCO VASCO is the world leader in providing Two-factor authentication and Electronic Signature solutions to financial institutions. More than half of the Top 100 global banks rely on VASCO solutions to enhance security, protect mobile applications, and meet regulatory requirements. VASCO also secures access to data and applications in the cloud, and provides tools for application developers to easily integrate security functions into their web-based and mobile applications. VASCO enables more than 10,000 customers in 100 countries to secure access, manage identities, verify transactions, and protect assets across financial, enterprise, E-commerce, government and healthcare markets. Learn more about VASCO at vasco.com and on Twitter, LinkedIn and Facebook. 19 9 Glossary Term Explication 2-Factor authentication Security logon process with 2 different stages in order to log on. An example of the 2nd step is an SMS passcode or generated code on your smartphone. ASP Application Service Provider Attribute Parts of your (online) identity, which contain specific characteristics that form your identity. BYOD Bring-Your-Own-Device; Employees are using their own private laptop/ smartphone/tablet on their daily job instead of using company provided material. BYOID / BYOI Bring-Your-Own-Identity is an emerging approach to identity validation in which organizations allow users to authenticate to a website and consume web services using a digital identity that has already been established with a third party. Instead of requiring visitors to create a new identity during the registration process, using an existing digital identity enables the user to leverage a “valid” identity from a current service provider. eID Governmental trusted and validated online identity service using an electronic ID. Already 150 million verified e-IDs in Europe. ID-provider Government was the only ID-provider for ages, but with the rise of social media, these players (like Facebook and Google) are now playing a role as online ID-providers. IoT The Internet of Things; All connected devices on the internet such as wearable’s, internet connected fridges and smart cars. KYC Know Your Customer MYDIGIPASS Trusted Identity Platform from VASCO Onboarding The process of converting a visitor of your application into a user/customer with a profile. 20 10 Sources 1. http://www.gartner.com/newsroom/id/2466615 2. http://share.cisco.com/IoE/index.html 3. http://www.thinkwithgoogle.com 4. https://www.forrester.com/ 5. http://www.prweb.com/releases/2012/1/prweb9086226.htm 6. https://datafloq.com/read/login-data-gold-social-login-data-platinum/92 7. https://mydigipass.vasco.com 8. http://wearesocial.sg/blog/2015/01/digital-social-mobile-2015 21
© Copyright 2025 Paperzz