{"id":675,"date":"2006-07-17T09:06:00","date_gmt":"2006-07-17T09:06:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm"},"modified":"2007-03-09T11:56:23","modified_gmt":"2007-03-09T11:56:23","slug":"microsofts-digital-identity-metasystem","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm","title":{"rendered":"Microsoft&#8217;s digital identity metasystem"},"content":{"rendered":"<p><!--115312734134736916-->After months of hearing about Windows Vista eye candy (and hardly scraping the surface with anything of real substance with regards to the operating system platform), there seems to be a lot of talk about digital identity at Microsoft right now. A couple of weeks back I was at the Microsoft UK Security Summit, where I saw Kim Cameron (Microsoft&#8217;s Chief Architect for identity and access) give a presentation on CardSpace (formerly codenamed &#8220;InfoCard&#8221;) &#8211; a new identity metasystem contained within the <a href=\"http:\/\/www.microsoft.com\/net\/\">Microsoft .NET Framework<\/a> v3.0 (expected to be shipped with Windows Vista but also available for XP). Then, a couple of days ago, my copy of the July 2006 <a href=\"http:\/\/www.microsoft.com\/uk\/technetmagazine\/\">TechNet magazine<\/a> arrived, themed around managing identity.<\/p>\n<p>This is not the first time Microsoft has attempted to produce a digital identity management system. A few years back, <a href=\"http:\/\/www.passport.net\/\">Microsoft Passport<\/a> was launched as a web service for identity management. But Passport didn&#8217;t work out (Kim Cameron refers to it as the world&#8217;s largest identity failure). The system works &#8211; 300 million people use it for accessing Microsoft services such as Hotmail and MSN Messenger, generating a billion logons each day &#8211; but people don&#8217;t want to have Microsoft controlling access to other Internet services (<a href=\"http:\/\/rover.ebay.com\/rover\/1\/710-5232-2978-22\/1?aid=8132995&amp;pid=1875354\" target=\"_top\">eBay<\/a><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.tqlkg.com\/image-1875354-8132995\" border=\"0\" height=\"1\" width=\"1\" \/> used Passport for a while but dropped it in favour of their own access system).<\/p>\n<p>Digital identity is, quite simply, a set of claims made about a subject (e.g. &#8220;My name is Mark Wilson&#8221;, &#8220;I work as a Senior Customer Solution Architect for Fujitsu Services&#8221;, &#8220;I live in the UK&#8221;, &#8220;my website is at http:\/\/www.markwilson.co.uk\/&#8221;). Each of these claims may need to be verified before they are acted upon (e.g. a party to whom I am asserting my identity might like to check that I do indeed work where I say I do by contacting Fujitsu Services). We each have many identities for many uses that are required for transactions both in the real world and online. Indeed, all modern access technology is based on the concept of a digital identity (e.g. Kerberos and PKI both claim that the subject has a key showing their identity).<\/p>\n<p>Microsoft&#8217;s latest identity metasystem learns from Passport &#8211; and interestingly, feedback gained via <a href=\"http:\/\/www.identityblog.com\/\">Kim Cameron&#8217;s identity weblog<\/a> has been a major inspiration for CardSpace. Through the site, the identity community has established <a href=\"http:\/\/www.identityblog.com\/?page_id=354\">seven laws of identity<\/a>:<\/p>\n<ol>\n<li>User control and consent.<\/li>\n<li>Minimal disclosure for a defined use.<\/li>\n<li>Justifiable parties.<\/li>\n<li>Directional identity.<\/li>\n<li>Pluralism of operators and technologies.<\/li>\n<li>Human integration.<\/li>\n<li>Consistent experience across contexts.<\/li>\n<\/ol>\n<p>Another area where CardSpace fundamentally differs from Passport is that Microsoft is not going it alone this time &#8211; CardSpace is based on <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/08\/microsoft-view-of-connected-systems.htm\">WS-* web services<\/a> and other operating system vendors (e.g. Apple and Red Hat) are also working on comparable (and compatible) solutions. Indeed, the <a href=\"http:\/\/osis.netmesh.org\/\">open source identity selector<\/a> (OSIS) consortium has been formed to address this technology and Microsoft provides technical assistance to OSIS.<\/p>\n<p>The idea of an identity metasystem is to unify access and prevent applications from the complexities of managing identity, but in a manner which is loosely coupled (i.e. allowing for multiple operators, technologies and implementations). Many others have compared this to the way in which TCP\/IP unified network access, which paved the way for the connected systems that we have today.<\/p>\n<p>The key players in an identity metasystem are:<\/p>\n<ul>\n<li>Identity providers (who issue identities).<\/li>\n<li>Subjects (individuals and entities about which claims are made).<\/li>\n<li>Relying parties (require identities).<\/li>\n<\/ul>\n<p>Each relying party will decide whether or not to act upon a claim, depending on information from an identity provider. In the real world scenario, that might be analogous to arriving at a client&#8217;s office and saying &#8220;Hello, I&#8217;m Mark Wilson from Fujitsu Services. I&#8217;m here to visit your IT Manager&#8221;. The security\/reception staff may take my word for it (in which case this is self-issued identity and I am both the subject and the provider) or they may ask for further confirmation, such as my driving license, company identity card, or a letter\/fax\/e-mail inviting me to visit.<\/p>\n<p>In a digital scenario the system works in a similar manner. When I log on to my PC, I enter my username to claim that I am Mark Wilson but the system will not allow access until I also supply a password that only Mark Wilson should know and my claims have been verified by a trusted identity provider (in this case the Active Directory domain controller, which confirms that the username and password combination matches the one it has stored for Mark Wilson). My workstation (the relying party) then allows me access to applications and data stored on the system.<\/p>\n<p>In many ways a username and password combination is a bad identity analogy &#8211; we have trained users to trust websites that ask them to enter a password. Imagine what would happens if I was to set up a phishing site that asks for a password. Even if the correct password is entered then the site would claim that it was incorrect. A typical user (and I am probably one of those) will then try other passwords &#8211; the phishing site now has an extensive list of passwords available which can then be used to access other systems pretending to be the user whose identity has been stolen. A website may be protected by many thousands miles of secure communications but as Kim Cameron put it, the last one metre of the connection is from the computer to the user&#8217;s head (hence identity law number 6 &#8211; human integration) &#8211; identity systems need to be designed in a way that is easy for users to make sense of, whilst remaining secure.<\/p>\n<p>CardSpace does this by presenting the user with a selection of digital identity cards (similar to the plastic cards in our wallets) and highlighting only those that are suitable for the site. Only publicly available information is stored with the card (so that should hold phishers at bay &#8211; the information to be gained is useless to them) and because each card is tagged with an image (and only appropriate cards are highlighted for use), I know that I have selected the correct identity (why would I send my <a href=\"http:\/\/www.gateway.gov.uk\/\">Government Gateway<\/a> identity to a site that claims to be my online bank?). Digital identities can also be combined with other access controls such as smartcards. The card itself is just a user-friendly selection mechanism &#8211; the actual data transmitted is XML-based.<\/p>\n<p>CardSpace runs in a protected subsystem (similar to the Windows login screen) &#8211; so when active there is no possibility of another application (e.g. malware) gaining access to the system or of screenscraping taking place. In addition, user interaction is required before releasing the identity information.<\/p>\n<p>Once selected, services that require identities can convert the supplied token between formats using the WS-Trust service for encapsulating protocol and claims transformation. For negotiations, WS-MetadataExchange and WS-SecurityPolicy are used. This makes the Microsoft implementation fully interoperable with other identity selector implementations, with other relying party implementations and with other identity provider implementations.<\/p>\n<p>Microsoft is presently building a number of components to its identity metasystem:<\/p>\n<ul>\n<li>CardSpace identity selector (usable by any application, included within .NET Framework v3.0 and hardened against tampering and spoofing).<\/li>\n<li>CardSpace simple self-issued identity provider (makes use of strong PKI so that the user does not disclose passwords to relying parties).<\/li>\n<li>Active Directory managed identity provider (to plug corporate users in to the metasystem via a full set of policy controls to manage the use of simple identities and Active Directory identities).<\/li>\n<li>Windows Communication Foundation (for building distributed applications and implementing relying party services.<\/li>\n<\/ul>\n<p>Post-Windows Vista, we can expect the Windows Login to be replaced with an CardSpace-based system. In the meantime, to find out more about Microsoft&#8217;s new identity metasystem, check out <a href=\"http:\/\/www.identityblog.com\/\">Kim Cameron&#8217;s identity blog<\/a>, The <a href=\"http:\/\/msdn.microsoft.com\/winfx\/reference\/infocard\/\">Windows CardSpace<\/a> pages and <a href=\"http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/dnlong\/html\/IntroInfoCard.asp\">David Chappell&#8217;s Introducing InfoCard article<\/a> on MSDN, and the July 2006 issue of <a href=\"http:\/\/www.microsoft.com\/uk\/technetmagazine\/\">TechNet magazine<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After months of hearing about Windows Vista eye candy (and hardly scraping the surface with anything of real substance with regards to the operating system platform), there seems to be a lot of talk about digital identity at Microsoft right now. A couple of weeks back I was at the Microsoft UK Security Summit, where &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Microsoft&#8217;s digital identity metasystem<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[1,43],"class_list":["post-675","post","type-post","status-publish","format-standard","hentry","tag-microsoft","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft&#039;s digital identity metasystem - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft&#039;s digital identity metasystem - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"After months of hearing about Windows Vista eye candy (and hardly scraping the surface with anything of real substance with regards to the operating system platform), there seems to be a lot of talk about digital identity at Microsoft right now. A couple of weeks back I was at the Microsoft UK Security Summit, where &hellip; Continue reading Microsoft&#8217;s digital identity metasystem\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2006-07-17T09:06:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-03-09T11:56:23+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.tqlkg.com\/image-1875354-8132995\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Microsoft&#8217;s digital identity metasystem\",\"datePublished\":\"2006-07-17T09:06:00+00:00\",\"dateModified\":\"2007-03-09T11:56:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm\"},\"wordCount\":1339,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"image\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.tqlkg.com\\\/image-1875354-8132995\",\"keywords\":[\"Microsoft\",\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm\",\"name\":\"Microsoft's digital identity metasystem - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.tqlkg.com\\\/image-1875354-8132995\",\"datePublished\":\"2006-07-17T09:06:00+00:00\",\"dateModified\":\"2007-03-09T11:56:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm#primaryimage\",\"url\":\"http:\\\/\\\/www.tqlkg.com\\\/image-1875354-8132995\",\"contentUrl\":\"http:\\\/\\\/www.tqlkg.com\\\/image-1875354-8132995\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2006\\\/07\\\/microsofts-digital-identity-metasystem.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft&#8217;s digital identity metasystem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft's digital identity metasystem - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm","og_locale":"en_GB","og_type":"article","og_title":"Microsoft's digital identity metasystem - markwilson.it","og_description":"After months of hearing about Windows Vista eye candy (and hardly scraping the surface with anything of real substance with regards to the operating system platform), there seems to be a lot of talk about digital identity at Microsoft right now. A couple of weeks back I was at the Microsoft UK Security Summit, where &hellip; Continue reading Microsoft&#8217;s digital identity metasystem","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm","og_site_name":"markwilson.it","article_published_time":"2006-07-17T09:06:00+00:00","article_modified_time":"2007-03-09T11:56:23+00:00","og_image":[{"url":"http:\/\/www.tqlkg.com\/image-1875354-8132995","type":"","width":"","height":""}],"author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Microsoft&#8217;s digital identity metasystem","datePublished":"2006-07-17T09:06:00+00:00","dateModified":"2007-03-09T11:56:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm"},"wordCount":1339,"commentCount":1,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"image":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm#primaryimage"},"thumbnailUrl":"http:\/\/www.tqlkg.com\/image-1875354-8132995","keywords":["Microsoft","Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm","name":"Microsoft's digital identity metasystem - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm#primaryimage"},"image":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm#primaryimage"},"thumbnailUrl":"http:\/\/www.tqlkg.com\/image-1875354-8132995","datePublished":"2006-07-17T09:06:00+00:00","dateModified":"2007-03-09T11:56:23+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm#primaryimage","url":"http:\/\/www.tqlkg.com\/image-1875354-8132995","contentUrl":"http:\/\/www.tqlkg.com\/image-1875354-8132995"},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2006\/07\/microsofts-digital-identity-metasystem.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Microsoft&#8217;s digital identity metasystem"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":606,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/08\/windows-identity-crisis.htm","url_meta":{"origin":675,"position":0},"title":"Windows identity crisis?","author":"Mark Wilson","date":"Tuesday 1 August 2006","format":false,"excerpt":"I just browsed to the Windows XP section of the Microsoft website using my Vista machine and was greeted with this: Nothing odd there you might think, until you look closely and see that the Microsoft website has identified my machine as running Windows NT...","rel":"","context":"In \"Microsoft Windows Vista\"","block_context":{"text":"Microsoft Windows Vista","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-vista"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1306,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/how-microsoft-and-rsa-plan-to-protect-our-sensitive-data.htm","url_meta":{"origin":675,"position":1},"title":"How Microsoft and RSA plan to protect our sensitive data","author":"Mark Wilson","date":"Thursday 4 December 2008","format":false,"excerpt":"Mention Microsoft and security in the same sentence and most people will scoff but these day\u00e2\u20ac\u2122s it really a bit unfair\u00e2\u20ac\u00a6 Windows security has come a long way (it still has a way to go too) but nevertheless, many of the customers that I deal with run third party solutions\u2026","rel":"","context":"In \"Digital Rights Management\"","block_context":{"text":"Digital Rights Management","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/drm"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1284,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/identity-and-security-developments-at-microsoft.htm","url_meta":{"origin":675,"position":2},"title":"Identity and security developments at Microsoft","author":"Mark Wilson","date":"Thursday 13 November 2008","format":false,"excerpt":"In amongst all the exciting new product announcements for new Windows releases and cloud computing platforms it's all too easy to miss out on some of the core infrastructure enhancements that Microsoft is making. Last week I got the chance to catch up with Joel Sider from Microsoft's Identity and\u2026","rel":"","context":"In \"Microsoft Forefront\"","block_context":{"text":"Microsoft Forefront","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/forefront"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1292,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/11\/unlocking-the-secrets-of-windows-7.htm","url_meta":{"origin":675,"position":3},"title":"Unlocking the secrets of Windows 7","author":"Mark Wilson","date":"Thursday 20 November 2008","format":false,"excerpt":"Whether or not it's true, ask people if Windows Vista was ready when it originally shipped and the response is generally a resounding \"no\". It seems that Microsoft is not taking any chances with Windows 7 as it has been reported that the new operating system is being constructed in\u2026","rel":"","context":"In \"Microsoft Windows 7\"","block_context":{"text":"Microsoft Windows 7","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-7"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5376,"url":"https:\/\/www.markwilson.co.uk\/blog\/2014\/10\/microsoft-course-review-10968b-designing-for-office-365-infrastructure.htm","url_meta":{"origin":675,"position":4},"title":"Microsoft course review: 10968B (Designing for Office 365 Infrastructure)","author":"Mark Wilson","date":"Wednesday 29 October 2014","format":false,"excerpt":"I've spent the last three days on a Microsoft Official Curriculum training course at QA - Course 10968B: Designing for Office 365 Infrastructure. Like many Microsoft courses, this is badly named (it won't teach you how to design for Office 365) but\u00a0I really did find it useful because it focuses\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1427,"url":"https:\/\/www.markwilson.co.uk\/blog\/2009\/04\/windows-7-xp-mode.htm","url_meta":{"origin":675,"position":5},"title":"Windows 7 &#8220;XP Mode&#8221;","author":"Mark Wilson","date":"Tuesday 28 April 2009","format":false,"excerpt":"Last week was a frustrating one... you see, earlier this month Paul Thurrott gave a hint about an exciting Windows 7 secret. I put 2 and 2 together and it seems that I came up with 4. The trouble was that I was given the details from an official source\u2026","rel":"","context":"In \"Microsoft Enterprise Desktop Virtualization (MED-V)\"","block_context":{"text":"Microsoft Enterprise Desktop Virtualization (MED-V)","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/med-v"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=675"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/675\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}