Delegated Authentication

Delegated Authentication

We all know about Federated Authentication (more commonly known as Single-Sign-On [SSO])… so what is Delegated Authentication? I’d argue it’s a necessary part of the larger Delegated Authorization problem space. So let’s start with a use case.

Alice and Bob are married and in their marriage, Alice takes care of all the medical aspects. This includes having accounts at multiple sites for supplements and medical health portals. In a sad turn of events, Alice contracts cancer and passes away. Bob now needs to access many of these sites to stop subscriptions for supplements, or change medical information.

I hope many of you are saying, why not just use User Managed Access (UMA) for this? Alice can authorize Bob to access her resources at the supplement site; problem solved? However, that requires the site to support UMA and as yet UMA has not had a large adoption rate. This is less a statement about the usefulness of UMA and rather, I believe, at statement about the understanding of the need to support delegated authorization use cases.

The current solution

Today, this situation is often solved by Alice sharing her password for the sites with Bob and allowing Bob to login as Alice (what I call impersonation). This solution is very simple if that work has been done ahead of time, but it does hide information from the supplement site and in some cases may actually break the terms of service.

An alternative proposal

What if instead, Bob could present a “delegated authentication credential” to the supplement site that proved he was authorized to access Alice’s account now that Alice is no longer living? A number of things would need to be true for the supplement site to accept such a credential…

  • Proof that Alice is dead or incapacitated
  • Proof that Bob is authorized to act as Alice’s “fiduciary”
  • Proof that the entity presenting the credential is Bob

With delegated authentication instead of impersonation (aka password sharing), the supplement site can make much better decisions allowing Bob to change/stop subscriptions while restricting Bob from taking other actions as an example.

I realize that this is a bit of paradigm shift in the way we think about authentication and it also provides a new attack vector (how difficult is it for an attacker to obtain a “delegated authentication credential” for a user). I have thoughts about other use cases, but I’ll stop here and ask for feedback on whether this is just too far out there? Or is this something that needs to be considered as more of our lives become digital?

P.S. I also realize that no sites support this mechanism either, and doing so correctly has its own complexities. This model may fit a bit better with the issuer-holder-verifier (aka Wallets) model while UMA works well with existing federated authentication models.

Tom Jones

trustregistry.us = No Human Left Behind. Let's fix this now!

6mo

That's funny really. Now we need a mandatory certificate proving you are incapacitated or dead? Perhaps get that guy with the scythe a trust registry?

Like
Reply
Karin Wieslander

Business Analyst | Enterprise Architect | SCRUM | Verksamhetsanalys

7mo

Also interesting for cases where a caretaker has to manage e.g. banking and health contacts for a person that cannot handle them themselves. Or even subscriptions or customer relations where login and authorisation is becoming ever more frequent.

Thinking one of the situations are based on a formal statement. The other based on a format statement after a judgement and therefore a little different. But as long as the data agreements carry the legal basis it should be fairly straight forward.

Esther Makaay

VP of Digital Identity at Signicat

7mo

I believe this is one of the strongest transactions that identity wallets can support: authorisations based on credentials. The wallet is the element that can bind authorisations (or mandates or whatever you call them) to the user of that wallet, while providing proof of the person granting that authorisation by the verifiability of the credential. This means that authorisations do not need to be directly linked to a specific digital identity (e.g. an account or token), nor do they need to reside in the same domain as the federation of those identities. (Today many authorisations mean that both parties need to have an "account" or identity in the same federation.)

Frazier Evans

ICAM Architect / Subject Matter Expert at Appian Logic LLC.

7mo

Thanks for sharing, George

To view or add a comment, sign in

More articles by George Fletcher

  • When Science Fiction becomes Reality

    This morning as I was preparing for the 41st addition of the Internet Identity Workshop, I started down this rabbit…

    2 Comments
  • Identifiers for Agentic AI

    I’ve seen many discussions regarding identifiers for Agentic AI when it comes to security, audit, compliance and…

    46 Comments
  • A Delegated Authorization Use Case

    This use case has come up in previous articles and posts, and I’d like to take a deeper look at what’s possible today…

    20 Comments
  • Is Federated Authorization a thing?

    While I don’t often hear these words combined, I do see work that could be classified this way. Take for instance the…

    14 Comments
  • Components of an on-behalf-of delegation pattern

    While at the OAuth Security Workshop (Feb 2025) and more recently the Internet Identity Workshop (April 2025), I had…

    29 Comments
  • Authentication or Authorization: Which comes first?

    I remember having this conversation with Ian Glazer at an European Identity and Cloud Conference a few years ago. We…

    24 Comments
  • What might an on-behalf-of token look like?

    In a previous Obtaining an on-behalf-of Authorization Token, I described a method for obtaining an on-behalf-of…

    11 Comments
  • Obtaining an On-Behalf-Of authorization token

    In this article I want to focus on what steps are required for a customer care system to obtain an on-behalf-of token…

    21 Comments
  • The importance of "Consent Receipts" in an AI Agent world

    In my last post on the topic of delegated authorization use cases, the comments brought up the use case of an AI Agent…

    11 Comments
  • Off to New Adventures!

    Today marks my last day at Capital One. The last 3 years have been rewarding, unexpected and challenging both…

    76 Comments

Others also viewed

Explore content categories