A video of an iOS implementation is available.
The idea of a user identity is a simple one with a goal to eliminate the requirement of a user entering a password. Any other requirement, including storing, transmitting and hashing should stay the same.
As soon as a software is installed that supports user identities, a user is presented with a screen to identify.
The user enters her email and a new residence identifier is generated 1 both securely persisted on the client. On an iPhone that should be the keychain. A request is sent to the server to approve the new residence.
The server sends an email to the user to verify the new residence. Once the residence has been approved, its identifier and the user email are hashed and persisted. This becomes the residence of the user identity which is used for a future identification.
The now owner of the identity, can use it to sign in remotely to the server and retrieve her data. The user identity along with the residence identifier should be transmitted using a secure channel and compared against the hash stored in the server.
To delete an identity, slide across on an iPhone.
The identity is permanently removed from this residence.
- In the web, a secure client storage doesn't exist.
@qnoid, my point was in reference to @leotsem when it was said "by granting permissions from the original identity client". In this scenario, the original identify client is the (now stolen) iPhone. So yes, the thief can access my Facebook without a password - like normal. But now the thief can also authenticate other devices too. On the thief's iPad, he enters your username. On my stolen iPhone, he confirms the identity. Now the thief has activated a service on his device now too.