In many identity flows today, the user experience is the same regardless of the operation the user is trying to perform. This often means that from the user's perspective, they have a binary experience; either they are already logged and are NOT challenged, or they are not logged in and are challenged. The concepts of this talk go beyond "adaptive authentication" in that "authentication strength" is only one of the vectors being considered. This talk will define a set of identity "vectors" that can be used to provide better user experiences across the full life-cycle of user identity and service interactions.
Key takeaways: |
|
* A set of identity vectors that should be managed within the identity system |
The challenge is to offer user-friendly login procedures via social media accounts, passwords or biometric devices while securing and respecting personal data at the same time. This combination must be taken seriously to provide a smooth Customer Experience (CX) and to guarantee that every consumer can control the access to his personal information. Join this panel to hier the best practise advises of experts in the branch.
As digital identity penetrates and permeates through all aspects of human society, it is helping make consumer services widely available, secure, and personalized. But there is a dark side to this. Identity Management design has largely evolved from the field of security engineering, where designs are often based on the model of an average, or typical, user. This ignores the vast diversity in skills, ages, cultural backgrounds, devices, genders, races and (dis)abilities of the overall user base. The result is quite often exclusionary experiences and services that are not accessible to some people, many of whom are often disadvantaged to begin with.
|