Lorna Garey | Content Strategist | September 19, 2024
How many people can you identify by sight? If you’ve got typical facial recognition capabilities, science says about 5,000. But as more of our lives move into the digital realm, the skills honed over millennia to identify friends and foes by cheekbone structure and eye shape need enhancing.
Enter the concept of digital identity. For a typical consumer looking to place a food order, a digital identity, or digital persona, might comprise personal data, such as name and street address, combined with activity data, like past orders, and device identifiers, such as a hash based on the IMEI number of your smartphone or cached cookies on a PC. That collection of digital data lets the restaurant’s ecommerce engine recognize who’s ordering dinner and trust that the transaction is legitimate.
Humans, organizations, applications, and devices all have digital identities, which may include hundreds or thousands of data points. Without that trust, commerce would grind to a halt.
A digital identity is a collection of data points that comprise the characteristics, attributes, and activities that identify an entity. Along with authorization technology, digital identity verifies a person, organization, application, or device as both authorized to access certain assets or data and as the legitimate holder of that access. For example, when an employee logs on in the morning, the enterprise network recognizes a username and password combination associated with an employee as well as the hardware footprint of the PC that was issued to the employee. Those and other data points authenticate the employee so the system will grant access to the data and applications he or she needs to do their job.
Note that authorization is separate from identity management. In terms of standards, OAuth, which stands for Open Authorization, is an industry-standard protocol for authorization—granting access to information, websites, or applications. In contrast, OpenID, for Open Identifier, is a decentralized authentication protocol that allows entities to use a single set of credentials. Unlike OAuth, which focuses on authorization and granting access, OpenID is all about establishing an identity across different platforms. They work together.
For individuals, particularly in the social media and consumer spheres, a digital identity is similar to an online or a digital persona, sometimes called a digital footprint. While people are increasingly aware of their online personas, digital identities are also relevant to organizations, applications, and hardware.
For organizations, as an example, digital identities authenticate the parties involved in a B2B contract. That recognition may authorize use of electronic signatures and trusted document sharing, thus automating the contracting process and allowing access to delivery information, pricing lists, and ordering systems.
In an application-to-application use of digital identity, systems communicate using machine-readable credentials to verify identities as the application accesses services and data, often without human intervention. The increasingly popular microservices architectures that break software into small, independent code bundles that communicate via APIs illustrate this type of digital identity.
Hardware uses of digital identities include the Trusted Platform Module (TPM) chips installed in enterprise PCs that can store cryptographic keys and certificates to establish the device’s—and by extension, an employee’s—digital identity. For smartphones, TPM-like functions include Android Knox and Apple’s Secure Enclave. Pacemakers, insulin pumps, smart credit cards, and employee IDs with chips also depend on digital identities.
Internet of Things (IoT) devices straddle the hardware/software divide, requiring digital identities to communicate securely with other edge devices and the online cloud platforms that collect and process their data.
A digital identity and a user are related but distinct concepts. A digital identity refers to the electronic data that is associated with a person, often used for online verification, while a user is an individual who owns an account used to interact with digital systems or platforms.
A digital identity verifies that a user is the legitimate account owner. Depending on the situation, it may also refer to an entry in an identity management system that’s associated with the individual and used to verify who a person is. One user may have multiple associated digital identities used to gain access to different platforms. What’s relevant is whether the user has a digital identity that authorizes access to a specific system.
As with digital identity versus user, digital identity versus account is a many-to-one proposition. An individual may have dozens of digital identities, while an account represents a single point of interaction with a specific system.
Consider Colleen, an account manager with a regional retailer. Colleen’s digital identity isn’t tied to a single platform used by the company. It’s a collection of attributes, like password and employee ID, that she uses to authenticate with the systems she needs to do her job. Colleen’s accounts might include a cloud-based ERP she uses to check inventory, an HR app to log her time, and a CRM system to keep track of customers in her region.
Here’s an analogy: Think of Colleen’s digital identity portfolio as a wallet containing digital personas unique to her in the form of several credit cards, a library card, a few loyalty cards, and a chipped employee ID. When looking to check out a library book, the relevant digital identity is different from the digital persona she would use if she’s paying for groceries with a frequent buyer card, pulling out her employee ID to swipe into an entry kiosk at the workplace, or logging into the ERP to check the day’s sales numbers.
The librarian, grocery clerk, security guard, and cloud provider all recognize Colleen as an authorized user and know which account is relevant, but none of them can see her entire digital identity.
Key Takeaways
In the IT realm, digital identity refers to the data trail an entity generates when interacting with websites, enterprise systems, cloud software, and other online realms. A digital identity allows a person or device to be recognized and authenticated in the digital world.
Let’s look at how a smart security system a business might install depends on a variety of digital identities. The security setup uses connected devices such as cameras, motion sensors, and door locks that feed data to a central hub hosted by a cloud provider. The system can be controlled remotely through a website or mobile app. Some employees are authorized to enter at any time, while others may unlock internal or external doors only during business hours. Only security staff can log into the cloud hub to view sensitive information, such as video footage or entry logs.
Each person, service, and device associated with the security system has a unique digital identity established with a combination of factors, like a username and password, hard-wired device ID, MAC address, or cryptographic key. The devices in the security system periodically check in with the central cloud-based hub. A separate verification process confirms the device’s identity and that it’s authorized to connect and exchange data.
Once a device authenticates itself, the system establishes a secure communication channel. Depending on the device’s digital identity, the channel may be encrypted to protect sensitive data in transit and prevent unauthorized access. The digital identity of the device also establishes data provenance. That is, collected data is attributed to the device. This is crucial for applications where data integrity is critical, like a camera monitoring a safe or cash register.
Employees’ job roles determine their digital identities for purposes of interacting with the security system. Digital identity and authorization management prevents unauthorized people or devices from accessing the network and viewing or manipulating devices or data.
Digital identities work by compiling information that uniquely identifies an individual, organization, application, or device online. A human’s digital identity data may include name, email address, employee ID number, social media profiles, purchase history, and identifiers for a smartphone and computer. For a device, say an IoT sensor, hardware identifiers like MAC addresses, unique chip identifiers, or cryptographic certificates issued by a trusted authority establish identity.
Trust is the result of solid digital identity management. For online systems to function, they must be able to establish with confidence that an entity—human or otherwise—is who or what it claims to be.
Digital identities are critical to identity and access management (IAM)—the technology and policy framework that governs access to resources—because they’re what enable IAM systems to create and activate new accounts, verify the legitimacy of entities trying to access resources, grant permissions based on identity and role, and then suspend or deactivate access as needed.
IAM plus digital identities let organizations manage data and system access in a way that balances security with giving people the tools to get their jobs done. IAM systems rely on the attributes associated with a digital identity to make access control decisions and enforce the policies an organization has put in place. Meanwhile, IAM features like single sign-on (SSO) simplify users’ digital identity wallets by reducing the need for multiple logins across different applications. Think of it as digital identity providing the “who,” while IAM establishes the framework and rules to control access.
The elements that comprise a digital identity, sometimes called digital identifiers, vary depending on whether the entity is a person, an organization, an application, or a device. For humans, digital identity attributes are both inherent, such as eye color or place of birth, and user-generated, such as social media and email accounts.
A digital identity also comprises data about relationships among people, companies, devices, and locations. For example, a VP of finance may establish his identity with a username, password, and second-factor authentication app, while other factors, including the hardware fingerprint of a PC or smartphone and the physical location where the device is connecting from, will inform whether to grant access to a company bank account.
Attributes that comprise a person’s digital identity include the following:
For nonhuman entities, like IoT devices or a microservice, digital identifiers might include the following:
Digital identities are important because they’re the basis for authentication and authorization—without which there would be no trusted digital communication among people, organizations, applications, and devices.
And the more our lives and businesses move into the cloud, the more important digital identities become. The cloud offers a vast array of use cases for digital identities, mostly around how users and applications interact with cloud resources.
Key reasons digital identities are important include the following:
Collaboration. Cloud platforms facilitate collaboration between employees, customers, and external partners, but trust requires digital identities to establish that entities in the ecosystem are who they say they are. Once identities are established, for example, a marketing team might use a cloud-based project management tool to collaborate with multiple external design agencies. Digital identities provide secure access for each agency while restricting access to their projects.
Location flexibility. A key selling point for cloud services is that they’re accessible from anywhere. Digital identities make this flexibility possible by providing a way to manage users and accounts despite geographically dispersed locations. New employees or devices can be easily added to the cloud service with identity provisioning.
Reduced complexity. Digital identities simplify access management in enterprise and cloud environments. IAM and single sign-on (SSO) allow users to use all the cloud applications they need for their jobs with one set of strong credentials, because now they don’t need to juggle multiple passwords, authenticators, and accounts. That pays off for security.
Regulatory compliance. Many data privacy and sovereignty regulations mandate robust access controls. Digital identities help organizations comply by ensuring that only authorized users can see certain data sets and that access logs are accurate and complete.
Secure access controls. Many of us work almost exclusively in various cloud platforms that contain sensitive data and applications, yet there’s no way to swipe in with a chipped ID card, like with a physical office. Digital identities enable providers to authenticate the people and devices attempting to access their services. For example, many companies use cloud-based ERP suites that contain financial, inventory, customer, and other data. Digital identities help ensure that only authorized employees with the appropriate permissions gain access.
In today’s online age, almost everyone uses digital identities in one form or another. Whether it’s creating an account on a social media platform, buying from an ecommerce site, logging into a cloud platform for work, or accessing online financial or healthcare services, digital identities have become an essential part of our everyday lives.
Major users of digital identity data include the following:
It’s essential that individuals and companies be aware of the diverse types of digital identities that they create and use to grant access. That’s the only way to maintain privacy and security while successfully navigating an increasingly digital landscape.
Common types of digital identities include the following:
Digital identity and privacy are interconnected concepts for humans operating online. That digital identity wallet we talked about before contains items of value, including PII, account and credit card data, a digital trail of where we’ve been online, and more. Privacy is about controlling who has access to that information, and that comes down to data protection technologies and best practices.
For some companies and consumers, laws and regulations, like GDPR, give individuals a legal right to control the PII that comprises their digital identities and define how it may be used by third parties. Best practices to protect online privacy include regularly reviewing the privacy settings on social media platforms, apps, and websites associated with your digital identity to control who can see your information and what data is collected about you. Be mindful of the information you share online, and consider disabling location services on apps and websites unless you’re actively using them.
Privacy also requires use of security technologies and processes that protect digital identity.
Short answer: Be mindful of what data you put online, use strong passwords and multifactor authentication, and keep software updated. That holds true for both individuals and companies, which must also protect their own digital identities, the personal customer data they’re entrusted with, and what their connected devices are up to.
Best practices for individuals and organizations to keep their digital identities safe include the following:
For organizations:
For IT teams charged with ensuring secure applications and protecting the identities of connected devices, key steps to take include the following:
By following these best practices, individuals and organizations can significantly reduce the risk of digital identity theft and data breaches. Remember: Digital identity protection is an ongoing process, so stay vigilant and adapt your strategies as technology and threats evolve.
Digital identity is an increasingly important part of our personal and business lives, as we rely more and more on digital platforms and technologies for communication, commerce, and entertainment. As such, the field of digital identity is rapidly evolving. Areas to watch include the following:
As companies customize large language models (LLMs) with their own data, they should be mindful of digital identity—after all, these AI entities exist within the digital space and interact with the world on your behalf via chatbots and other applications. Managing the digital identity of a generative AI system has three stages.
A GenAI system’s digital identity isn’t human, but it’s also not a static application or device. As companies adopt more AI, they need a plan to ensure its online identity aligns with the outward face of the organization.
Oracle’s identity and access management (IAM) solutions let you control who has access to your resources. Manage user access and entitlements across a wide range of cloud and on-premises applications. And you can be as granular as you need—specify who can access which resources, and how. Access is granted at the group and compartment level, which means you can write a policy that gives a group a specific type of access within a specific compartment, or to the tenancy itself. Manage policies, user and group credentials and passwords, MFA, and other digital identity elements via a cloud native, identity-as-a-service (IDaaS) platform and provide employees with federated and social logon options.
And Oracle helps your application developers embed IAM features including strong authentication, self-service management of profiles and passwords, and terms-of-use consent. With robust APIs, SDKs, and sample code, developers can easily add robust IAM functionality.
In today's interconnected world, our digital identities are a representation of who we are online. They make our lives more convenient by enabling us to access online services and conduct transactions easily. But the cost is heightened vigilance to protect our digital identities from theft, fraud, and misuse via strong security measures, such as two-factor authentication and regular monitoring of online accounts.
A cloud provider’s business viability depends on top-tier network, hardware, software, and data security. That includes advanced identity management, and it’s why cloud is leveling the security playing field, as we discuss in this trends report.
What are the four forms of digital identity?
The four forms of digital identity are human-centric—people and organizations—plus applications and devices.
From a human POV, digital identity focuses on the core attributes and data that make up an online persona, including name, email, preferences, and behavior, as well as how individuals and organizations manage their attributes, choose what information to share, and configure privacy settings.
A software- and system-centric view focuses on how applications and connected devices recognize and manage digital identities. Considerations include the information a system uses to identify authorized users as well as any unique identifiers associated with a device that allow it to be recognized and interact with a network or platform, like MAC address or IMEI. The digital identity of an online service or application can be proven with digital certificates or embedded code.
A comprehensive understanding of digital identity considers both user- and system-centric perspectives.
How is your digital identity created?
A person’s or company’s digital identity is created via an ongoing process of accumulating data over months and years. For a consumer, every time you sign up for a social media platform, shop online, or access any service that requires registration, you add a card to your digital identity “wallet.” Your browsing history, search queries, and devices you use add to your identity, as do your social posts.
Why do I need a digital ID?
A digital ID, also known as an electronic ID, is a form of identification that may be issued by a government, a company, or generated by an individual. They allow people to prove their identities online. A digital ID has a number of benefits. It can enable someone to securely access online services, such as a bank account, and prove their identity without the risk of personal information, like a password, being compromised. It may eliminate the need for physical documents for people who may not have access to traditional forms of identification, such as a driver's license or passport.