consent 2.0: applying user-managed access to the privacy challenge
TRANSCRIPT
![Page 1: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/1.jpg)
CONSENT 2.0APPLYING USER-MANAGED ACCESS TO THE
PRIVACY CHALLENGE
Eve Maler (@xmlgrrl)
![Page 2: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/2.jpg)
The personal data gathering dark ages
Web 1.0 Web 2.0
Copyright © Identity Summit 2015, all rights reserved.
![Page 3: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/3.jpg)
Privacy goals vs. reality
aspirationrisk mitigation
cynicism
Copyright © Identity Summit 2015, all rights reserved.
![Page 4: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/4.jpg)
From the webto the IoT,
the “fear/greed” tension around data sharing is only going to
grow
Copyright © Identity Summit 2015, all rights reserved.
![Page 5: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/5.jpg)
“Post-compliance” consent toolsonly take us so far
OAuth: standard and scoped…but opt-in, app-to-app, and point-to-point
“Share”: proactive and party-to-party…but proprietary, point-to-point, and often insecure
Copyright © Identity Summit 2015, all rights reserved.
![Page 6: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/6.jpg)
Customers with identities in the digital worldneed Consent 2.0 solutions
Context The right moment to make the decision to share
Control The ability to share just the right amount
Choice The true ability to say no and to change one’s mind
Respect Regard for one’s wishes and preferences
Copyright © Identity Summit 2015, all rights reserved.
![Page 7: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/7.jpg)
Copyright © Identity Summit 2015, all rights reserved.
![Page 8: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/8.jpg)
Businesses and governments need the UMA standard to deliver Consent 2.0 successfully
Copyright © Identity Summit 2015, all rights reserved.
![Page 9: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/9.jpg)
ForgeRock’s OpenUMA solutions
will help you meet
the new privacy challenge
Copyright © Identity Summit 2015, all rights reserved.
![Page 10: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/10.jpg)
ForgeRock is delivering two key
OpenUMAcomponents by the
end of 2015
authorization server
resource server
(client)
UMA Providerbased on
UMA Protectorbased on
Copyright © Identity Summit 2015, all rights reserved.
![Page 11: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/11.jpg)
ForgeRock helps you deliver Consent 2.0 experiences to your
customers that demonstrate context, control, choice, and respect
Copyright © Identity Summit 2015, all rights reserved.
![Page 12: Consent 2.0: Applying User-Managed Access to the Privacy Challenge](https://reader036.vdocument.in/reader036/viewer/2022062710/55b3500abb61eb5c148b467c/html5/thumbnails/12.jpg)
THANKS!
Eve Maler (@xmlgrrl)