IdInterOp
by G K

1. Laws of Identity
1.1. 1. User Control and Consent
1.2. 2. Limited Disclosure for Limited Use
1.3. 3. The Law of Fewest Parties
1.4. 4. Directed Identity
1.5. 5. Pluralism of Operators and Technologies
1.6. 6. Human Integration
1.7. 7. Consistent Experience Across Contexts
2. Introduction
3. Problem Statement
4. Standards
4.1. SAML 2.0
4.1.1. Assertion
4.1.2. Protocol
4.1.3. Encryption
4.1.4. Signature
4.1.5. Profiles
4.2. OpenID 2.0
4.3. InfoCard
4.3.1. CardSpace
4.4. XRI
5. Project Initiatives
5.1. Higgins
5.2. OSIS
5.3. Pamela
5.4. Concordia
6. Use Cases
6.1. Authenticate to a CardSpace enabled relying party using an OpenID URL identifier
6.2. Authenticate to a OpenID enabled relying party with a CardSpace card over CardSpace protocol
6.3. Cardspace enabled SAML Attribute Authority for attribute exchange
6.4. OpenID enabled SAML Attribute Authority for attribute exchange
6.5. Authenticate to a Cardspace enabled relying party with Higgins iCard
6.6. Higgins enabled SAML Attribute Authority context provider
6.7. Authenticate to a Higgins enabled relying party with OpenID URL identifier
7. CardSpace
7.1. Methods
7.1.1. Self-issued card
7.1.2. Managed Card
7.1.3. Kerberos Ticket
7.1.4. X.509 Cert
7.2. Identity Selector Interoperability Profile
7.3. Mechanisms
7.3.1. WS-Trust
7.3.2. WS-SecurityPolicy
7.3.3. WS-MetadataExchange
8. Questions?
8.1. Difference between Higgins i-card & CardSpace Infocards
9. Higgins
9.1. Components
9.1.1. i-cards
9.1.2. IDAS
9.1.3. Identity Selector