Confirmed users
78
edits
(→Identity Speaks: Upcoming Conference Schedule: remove PyCon and LibrePlanet talks) |
(→Vision) |
||
Line 31: | Line 31: | ||
User identities encompass much more than just an email address, of course, and so the next components of the Mozilla identity system will include payments, profile and data sharing on the users terms and more. | User identities encompass much more than just an email address, of course, and so the next components of the Mozilla identity system will include payments, profile and data sharing on the users terms and more. | ||
= Identity Design Principles = | |||
draft 01 APR 2013 | |||
Relationship (like a doorman) not mechanism (like a lock) | |||
We've used the metaphor of a lock and key for passwords. This is too cold and impersonal. It is an abstraction that serves the cold metal of hardware, but does nothing to help you build a relationship with the person. An account allows a computer to recall this person, much like a doorman who can recognize a familiar face and recall their shared history to have a meaningful conversation. | |||
HIERARCHY OF NEEDS | |||
Reliability | |||
I want access to my information 100% of the time, wherever I am. | |||
And don't blame me for unreliable service! The service should be percieved to be reliable. | |||
* Can access when and where needed. | |||
* Data is safe from unintentional loss. | |||
* In-browser password manager is allowed to function normally, not disabled. | |||
Safety | |||
At all points of centralization, the service should be resistant to attack. The service should be perceived as secure/protected. | |||
* Passwords stored securely. | |||
* If I lose my device and attacker cannot remotely wipe another machine. | |||
* Information from one account cannot be used to hack another site | |||
Proportionality | |||
The approach you use should be appropriate to the threat. | |||
* Password character requirements should be reasonable. Don't ask for 72chars, capital + number that rotates every 90 days unless you are a high-risk target. | |||
* Keep user logged in for long sessions unless you are a high-risk target. | |||
Creating a supportive environment | |||
Don't treat me as an intruder in my own house. Tone should be human and recognize that remembering credentials is a difficult thing to do. Be polite and forgiving of imperfect memory. | |||
* Error messages should have positive tone. Shaming language around forgetting password only create unnecessary stress. | |||
* After login it redirect user to where there intended to go. | |||
* Remember my configurations. | |||
* Clear how to access self help documents and forums. | |||
Be the user's trusted agent | |||
Provide a safe and secure way to take your information around the web | |||
* Easy access to contacts, contents of your "wallet." | |||
Responsibilities of Relying Party sites | |||
There are several issues which are directly related to accounts which are outside the scope of Persona. These are guidelines for relying party sites implementing Persona. | |||
* Site reflects whether the user is logged in or not. | |||
* Rules are clear when and why I need to login or out | |||
* Usernames should only be used if you have public-facing content that needs to be anonymous. | |||
* Site has clear policies about who has access to and who owns user data. | |||
* Site employs ethical practices around what they do with user data and data porability. | |||
* Changes to terms and privacy policies are presented with clear language. | |||
= 2013 Identity Goals = | = 2013 Identity Goals = |