A Guide to Claims-based Identity and Access Control


Book Description

As systems have become interconnected and more complicated, programmers needed ways to identify parties across multiple computers. One way to do this was for the parties that used applications on one computer to authenticate to the applications (and/or operating systems) that ran on the other computers. This mechanism is still widely used-for example, when logging on to a great number of Web sites. However, this approach becomes unmanageable when you have many co-operating systems (as is the case, for example, in the enterprise). Therefore, specialized services were invented that would register and authenticate users, and subsequently provide claims about them to interested applications. Some well-known examples are NTLM, Kerberos, Public Key Infrastructure (PKI), and the Security Assertion Markup Language (SAML). Most enterprise applications need some basic user security features. At a minimum, they need to authenticate their users, and many also need to authorize access to certain features so that only privileged users can get to them. Some apps must go further and audit what the user does. On Windows®, these features are built into the operating system and are usually quite easy to integrate into an application. By taking advantage of Windows integrated authentication, you don't have to invent your own authentication protocol or manage a user database. By using access control lists (ACLs), impersonation, and features such as groups, you can implement authorization with very little code. Indeed, this advice applies no matter which OS you are using. It's almost always a better idea to integrate closely with the security features in your OS rather than reinventing those features yourself. But what happens when you want to extend reach to users who don't happen to have Windows accounts? What about users who aren't running Windows at all? More and more applications need this type of reach, which seems to fly in the face of traditional advice. This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or information technology (IT) professional who designs, builds, or operates Web applications and services that require identity information about their users.




The Power of Identity Claims


Book Description

This book draws on research in psychology and behavioral economics to show how striving to live up to our identity claims profoundly affects our daily lives. The author argues the claims we make about who we are and what we stand for powerfully influence us, and our social world. Asking questions such as: Why do people resist the temptation to cheat when cheating would benefit them greatly and no one would find out? Why do people express different beliefs about climate change when they are first reminded of their political affiliation? Why do people prefer to be compensated for donating blood with cholesterol screening than with money? Miller puts forth a novel and compelling argument regarding how strongly our identity claims affect our daily lives. The book provides explanations for many forms of puzzling behavior, such as why people sometimes act against their economic self-interest, how they avoid situations that test their moral identities, and how they respond to failures to live up to their moral identities. It paints an intriguing picture of people's investment in their identity claims by showing how they seek opportunities to demonstrate their validity, avoid actions and circumstances that challenge their legitimacy, and employ psychological defenses when others challenge their legitimacy. Based on extensive research in the fields of psychology, economics, and political science, this book is fascinating reading for students and academics interested in identity and the self. It also provides an expanded tool kit for those who seek behavioral change in their organization or community.




Distorted Descent


Book Description

Distorted Descent examines a social phenomenon that has taken off in the twenty-first century: otherwise white, French descendant settlers in Canada shifting into a self-defined “Indigenous” identity. This study is not about individuals who have been dispossessed by colonial policies, or the multi-generational efforts to reconnect that occur in response. Rather, it is about white, French-descendant people discovering an Indigenous ancestor born 300 to 375 years ago through genealogy and using that ancestor as the sole basis for an eventual shift into an “Indigenous” identity today. After setting out the most common genealogical practices that facilitate race shifting, Leroux examines two of the most prominent self-identified “Indigenous” organizations currently operating in Quebec. Both organizations have their origins in committed opposition to Indigenous land and territorial negotiations, and both encourage the use of suspect genealogical practices. Distorted Descent brings to light to how these claims to an “Indigenous” identity are then used politically to oppose actual, living Indigenous peoples, exposing along the way the shifting politics of whiteness, white settler colonialism, and white supremacy.




Reasons of Identity


Book Description

The current legal and political context is perhaps more congenial than ever before to considering claims made by minorities for the protection of some aspect of their identity. This book argues that diverse societies depend for their success on having courts and legislatures which are capable of assessing these identity claims in a fair and transparent manner. Despite the ubiquity of these claims today, how public decision makers assess minority identity claims in the course of decision making is only vaguely understood and mostly ignored in normative political theory and public policy analysis. This book examines several key approaches used by national and international institutions to assess the identity claims of religious, cultural, and Indigenous minorities today. It takes up the central challenges to the public assessment of identity claims which raise concerns about the incommensurability and questionable authenticity of such claims, and about the risks of essentializing and domesticating the identities of the people who advance identity claims. It develops a guide to aid in the fair assessment of identity claims which is grounded on the requirements that public institutions must respect what people claim is deeply important to their self understandings and ways of life without merely accepting such claims at face value or deferring to claimants in every case, and public institutions must have the capacity to reflect on their own unfair biases. The guide developed in this book aims at interrogating the strength of any identity claim on bases that are respectful of differences without being blinded by them.




The Ethics of Identity


Book Description

A bold vision of liberal humanism for navigating today’s complex world of growing identity politics and rising nationalism Collective identities such as race, nationality, religion, gender, and sexuality clamor for recognition and respect, sometimes at the expense of other things we value. To what extent do they constrain our freedom, and to what extent do they enable our individuality? Is diversity of value in itself? Has the rhetoric of human rights been overstretched? Kwame Anthony Appiah draws on thinkers through the ages and across the globe to explore such questions, developing an account of ethics that connects moral obligations with collective allegiances and that takes aim at clichés and received ideas about identity. This classic book takes seriously both the claims of individuality—the task of making a life—and the claims of identity, these large and often abstract social categories through which we define ourselves.




The Essence of the Self


Book Description

In this volume, Geoffrey Madell develops a revised account of the self, making a compelling case for why the "simple" or "anti-criterial" view of personal identity warrants a robust defense. Madell critiques recent discussions of the self for focusing on features which are common to all selves, and which therefore fail to capture the uniqueness of each self. In establishing his own view of personal identity, Madell proposes (a) that there is always a gap between ‘A is f and g’ and ‘I am f and g’; (b), that a complete description of the world offered without recourse to indexicals will fail to account for the contingent truth that I am one of the persons described; and (c), that an account of conscious perspectives on the world must take into account what it means for an apparently arbitrary one of these perspectives to be mine. Engaging with contemporary positions on the first person, embodiment, psychological continuity, and other ongoing arguments, Madell contends that there can be no such thing as a criterion of personal identity through time, that no bodily or psychological continuity approach to the issue can succeed, and that personal identity through time must be absolute, not a matter of degree. Madell’s view that the nature of the self is substantively different from that of objects in the world will generate significant discussion and debate among philosophers of mind.




The Identity Trade


Book Description

The successes and failures of an industry that claims to protect and promote our online identities What does privacy mean in the digital era? As technology increasingly blurs the boundary between public and private, questions about who controls our data become harder and harder to answer. Our every web view, click, and online purchase can be sold to anyone to store and use as they wish. At the same time, our online reputation has become an important part of our identity—a form of cultural currency. The Identity Trade examines the relationship between online visibility and privacy, and the politics of identity and self-presentation in the digital age. In doing so, Nora Draper looks at the revealing two-decade history of efforts by the consumer privacy industry to give individuals control over their digital image through the sale of privacy protection and reputation management as a service. Through in-depth interviews with industry experts, as well as analysis of media coverage, promotional materials, and government policies, Draper examines how companies have turned the protection and promotion of digital information into a business. Along the way, she also provides insight into how these companies have responded to and shaped the ways we think about image and reputation in the digital age. Tracking the successes and failures of companies claiming to control our digital ephemera, Draper takes us inside an industry that has commodified strategies of information control. This book is a discerning overview of the debate around who controls our data, who buys and sells it, and the consequences of treating privacy as a consumer good.




Leibniz's Principle of Identity of Indiscernibles


Book Description

Examines the place and role of the identity of indisernibles, which rules out numerically distinct but perfectly similar things, in Leibniz's philosophy.




Identity's Strategy


Book Description

This work is an investigation into the persuasive techniques inherent in presentations of identity. strategies involved in the expression of personal identity. Drawing on Kenneth Burke's Dialectic of Constitutions, Anderson analyzes conversion narratives to illustrate how the authors of these autobiographical texts describe dramatic changes in their identities as a means of influencing the beliefs and action of their readers. capacity for self-understanding and self-definition. Communicating this self-interpretation is inherently rhetorical. Expanding on Burkean concepts of human symbol use, Anderson works to parse and critique such inevitable persuasive ends of identity constitution. Anderson examines the strategic presentation of identity in four narratives of religious, sexual, political, and mystical conversions: Catholic social activist Dorothy Day's The Long Loneliness, political commentator David Brock's Blinded by the Right, Deirdre McCloskey's memoir of transgender transformation, Crossing, and the well-known Native American text Black Elk Speaks. Mapping the strategies in each, Anderson points toward a broader understanding of how identity is made - and how it is made persuasive.




Identity Politics in the Public Realm


Book Description

In an age of multiculturalism and identity politics, many minority groups seek some form of official recognition or public accommodation of their identity. But can public institutions accurately recognize or accommodate something as subjective and dynamic as "identity?" Avigail Eisenberg and Will Kymlicka lead a distinguished team of scholars who explore state responses to identity claims worldwide. Their case studies focus on key issues where identity is central to public policy. By illuminating both the risks and opportunities of institutional responses to diversity, this volume shows that public institutions can either enhance or distort the benefits of identity politics.