Element Deep Dive 

Module 4: Identity Management

I’m going to need to see some ID

Learning Objectives

  • Why is Identity Management important?
  • What is the Goal of Identity Management?
  • What are the Identity Management requirements at each level?
  • What are some examples and issues with Identity Management?

Vocabulary & Terms

Blank

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Solution Documentation Package (SDP)

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Adequate Evidence

yadayadyaddyadydayadyadyadyadyadyadyadyda

blank
Solution Documentation Package (SDP)

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla eget gravida odio. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Cras hendrerit leo eu nisi suscipit.

Elements

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Levels

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Courses, Classes, and Modules

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

1 – Why Is Identity Management Important?

THIS LEARNING OBJECTIVE IS MISSING FROM SCRIPT

2 – What is the Goal of Identity Management in the BMM?

The goal of identity management in a blockchain solution is to ensure that controls are in place for identity and access management.

Controls include:

  • Methods to identify users of a system and establish a user profile, address, or other identifier.
  • Define the activities and processes to bind a user to a known identity or dissociate a user from a real-word identity to protect anonymity.
  • Associating user profiles with one or more roles and/or permissions
  • Associating roles and levels of access and permissions
  • Allocating users to groups
  • Adding, modifying, or removing users, roles, groups, and permissions
  • Limiting access to individuals and groups based on defined rules.

3 – What are the Identity Management Requirements at Each Level?

LEVEL 1 Initial 

  • Some portion of identity management is documented or implemented
    (But it does not require full Anti-Money Laundering AML or KYC compliance)

LEVEL 2 – Documented 

  • Establish methods for user identification and profile creation.
  • Implement processes to associate or dissociate users from known identities for anonymity protection.
  • Associate user profiles with roles and permissions for defining access levels.
  • Connect roles and permissions appropriately based on assigned tasks and access needs.
  • Allocate users to groups based on shared characteristics or permissions.
  • Manage user, role, group, and permission changes effectively for system accuracy.
  • Implement access limitations based on predefined rules for control.
  • Ensure compliance with legal and regulatory requirements.

LEVEL 3 – Validated At BMM level three, a solution has demonstrated that it functions as intended and the concept has been proven

  • Adequate evidence that the solution’s access controls, as defined in the SDP, have been verified and deemed appropriate.

    LEVEL 4 – Production 

    • Production, Identification, Authentication and Access Management are monitored

    LEVEL 5 – Optimizing 

    • Processes in place to regularly verify that only authorized stakeholders may access and use the solution
    • Controls for the identification and permissions are regularly reviewed to identify and implement improvement opportunities

    4 – Issues & Examples

    Example 1 

    Dummy text dummy text dummy text dummy text Dummy text dummy text dummy text dummy text Dummy text dummy text dummy text dummy text Dummy text dummy text dummy text dummy text Dummy text dummy text dummy text dummy text Dummy text dummy text dummy text dummy text