-
Notifications
You must be signed in to change notification settings - Fork 7
20250918
Atul Tulshibagwale edited this page Sep 18, 2025
·
1 revision
| Name | Affiliation | Participation Agreement signed? |
|---|---|---|
| Tobin South | WorkOS & Stanford | Yes |
| Atul Tulshibagwale | SGNL | Yes |
| Rick Burta | Okta | Yes |
| Paul Templeman | Independent | Yes |
| Eleanor Meritt | Independent | Yes |
| Chris Phillips | Independent | Yes |
| Apoorva Deshpande | Okta | Yes |
| Adwait Shinganwade | Independent | Yes |
| Tom jones | ind | yes |
| Vaibhav Narula | Independent | Yes |
| Vlad Shapiro | Costidity | Yes |
| Flemming Andreasen | Cisco | Yes |
| Aldo Pietropaolo | Independent (Soon Sophos Advisor) | Yes |
| Alex Babeanu | Indykite | Yes |
| Anuradha Karunarathna | WSO2 | Yes |
| Macy Abbey | Okta | Yes |
| Martin Besozzi | Independent | Yes |
| Elie Azerad | Independent | Yes |
| Bill Fisher | NIST | |
| Gail Hodges | OIDF | N/A staff |
- Tobin’s weekly updates (5 minutes)
- Julianna Cafik presentation on Mobile Drivers Licenses (OIDF, NIST) and AI (20 minutes)
- (Tentative) Jeff Lombardo led discussion on taxonomy (15 minutes)
- AOB
- (Juliana) Doing work with the financial services sector, in risks to FS from Gen AI / Agentic AI
- High Assurance Identity verification is a critical problem to solve
- Current identity constructs, 3 principles
- Functional
- Separation principle
- The separation principle was designed to separate your physical identity documents from online interaction
- Contextual
- Context:
- Protects identity of the physical documentation
- Governed independently (independent of …)
- Consistent user experience
- Agentic AI behaves very differently from what we are used to
- Agentic AI being weaponized to exploit current identity constructs:
- Synthetic identity creation (fake identity cards)
- Deepfake drive social engineering (used to impersonate individuals while onboarding or verification)
- Attack surrogates (mimic user behavior to bypass verification steps)
- Why are they effective?
- The construct is not identity
- Lack of non repudiation
- Fragmented governance: No unified platform for verification and assurance
- It’s accelerated due to the power of GenAI tools available easily
- What can we do?
- Raise the identity assurance
- Can we enhance the assurance of claimed identities?
- Epicenters of effort:
- EU ID Wallet
- NIST NCCoE MDL project
- Build a new identity construct:
- Use of MDL to do Customer Identification Program (CIP), or Know Your Customer (KYC) process
- There are a number of standards to implement this
- We can start to establish key policies critical to financial services through MDLs
- Core stakeholder collaboration:
- Issuer (DMV or similar government agency)
- Digital Wallet
- Identity Service Provider
- Financial Institutions
- OIDF is working on a new eKYC metadata
- Metadata spec aligned with MDLs
- Enables FIs gain assurance?
- Tying together holder authentication from the wallet to the MDL
- Required for FIs to rely on this
- Contribute and Engage:
- Provide feedback to NIST
- Collaborate with standards bodies
- Participate in technical workshops
- (Bill Fisher) NIST Publications are here: https://pages.nist.gov/nccoe-mdl-project-static-website/
- (Atul) What is an Identity Service Provider
- Provides a verifier embedded in the IdP
- MDLs have issuers, e.g. DMV
- There’s an Identity Management service at the relying party
- It’s an orchestration layer, which enables the FI to go through their EKYC process asynchronously
- A passkey or other authenticator is provisioned to the account holder as a result of this process.
- (Alex) How is the trust between …
- (Julianna) Trust is a bit weird to talk about. I can talk about cryptographic verifiability
- (Alex) How can a verifier trust the issuer? Not just the claims
- (Julianna) It would depend on which region you are in. In EU it is different from the US
- (Bill Fisher) There are two questions of trust: Issuer and Wallet
- If you look at the MDL white paper we put out there, we look at 3 different areas.
- You can verify the issuer’s public key
- Or you can go to AAMVA To get the public keys and then trust those keys
- When you get cryptographic credentials from a state, you still want to make sure the credentials are not issued fraudulently.
- In EU there is a big compliance regime. We don’t have that in the US yet.
- In FIDO we are looking to issue guidelines. AAMVA is also working on this.
- The MDL assurance white paper is tackling a number of the trust issues (including trust in the wallet)
- (Vlad) I work for an FI. Can we use the same thing for ID verification in case someone forgets their building entry card?
- (Bill Fisher) MDLs are a form of a verifiable digital credential
- You can create an VDC in your FI for entry into your financial institution
- ISO standards for proximity, similar to how MDLs are used in the TSA checkpoints
- You’ll be issuing your own form of VDC for this. Some vendors might be supporting this already
- OIDF eKYC only focuses on the online use case.
- (Vlad) Online case is great, for access to VPN, for example.
- (Bill) One more thing: We don’t look at MDLs as an authentication solution. It’s more to provide a series of attributes.
- (Bill) We are using passkeys instead for authentication. You might want to use MDL for account recovery, verification, etc.
- (Paul) In terms of NIST project, was there any thought of how AI agents might …
- You could use OID4VP or the ISO alternative
- (Bill) You have OID4VP or HAIP. We have a thought on how agents could consume MDLs
- If you had an agent that could validate an MDL, you could do it.
- Just getting interoperability at the credentials level is not sufficient for making it useful at the relying party
- There could be innovative ways of making this work
- (Bill) The real value is in attack mitigation. Existing processes (e.g. knowledge-based authentication, document possession, facial recognition) are all subvertable by AI
- You need cryptography backed credentials to address this
- (Julianna) We understand that we have a problem right now in agentic AI exploiting our current identification / verification constructs
- We’ve proven out through interops, ISO, etc. that the standards are present and useful. It is now up to the FIs to adopt
- We need to define the new constructs for identification and authorization here. The existing one is broken / being actively exploited.
- (Govindaraj) I wanted to focus on account takeovers. You might do KYC initially, but where the user doesn’t use a strong authentication method such as passkey (the adoption is low right now), what can we do to improve adoption of passkeys. We have seen this often in the FI world
- Not many financial services systems integrate in this way with the MDL or other systems
- (Bill) There’s no silver bullet for ATO. Several banks including KeyBank presented at Identiverse / Authenticate to reduce ATO using…
- MDLs can help with account recovery. If you are depending on identity proofing, MDLs are a good way to ease that process.
Mark: George Fletcher and I were discussing this in eKYC
Google’s announcement of “AP2” (Agent Payments Protocol)
- They’ve included verifiable credentials as a part of it
- They’ve defined a “human present” and “human not present” scenario
- W3C community group is looking at this too.
(Nick)
- AP2 is based on A2A, is trying to use …
- We’re trying to define a credential that can act as a payment token
- There are a few interesting ways in which these can be supplied
- E.g. an agent can be instructed to buy a ticket, but wait a week to find a good time to buy
- Uses a pre-signed authorization for a specific amount and merchant?
- 1Password is interested in storing such credentials
- Demo at Autnenticate conference
(Tom)
- Trying to put together a taxonomy. I’d like to make progress on it
- We have talked about having it on the agenda, but haven’t made progress.
(Nick)
- There’s an on-going issue in MCP about taxonomy
- Putting together a list of working groups. I can share after this call.
(Tom)
- I’d like it to be more than just MCP
- There’s no common language for the groups to talk to each other.
(Nick)
- Let’s put together a Google Doc and start working on it. We might be duplicating work that is happening in MCP
Tom’s taxonomy doc is here: AAIM.docx
(Gail)
- Other groups are also depending on this group to develop the taxonomy.
- It’ll be an impressive win if we can get ITU to use our taxonomy
- (Tom) The other group is: …
(Govindaraj)
- (Back to AP2)
(Brian)
- Curious about who signs the credential for payment. How does trust work?
(Paul): Wallet relying party authentication: https://bmi.usercontent.opencode.de/eudi-wallet/eidas-2.0-architekturkonzept/content/ecosystem-architecture/trust/wallet-relying-party-authentication/#trust-architecture