Leadership


The OpenID Foundation (OIDF) was formed in June 2007 to help promote, protect and enable the OpenID technologies and community. This entails managing intellectual property, brand marks as well as fostering viral growth and global participation in the proliferation of OpenID. The OIDF does not dictate the technical direction of OpenID; instead it will help enable and protect whatever is created by the community.

Community Board Members

Nat SakimuraNat Sakimura

Chairman

Nomura Research Institute
Nat Sakimura is the research lead on Digital Identity at Nomura Research Institute (NRI). Bringing Power to control his identity in the Cyber Space back to the People is what he aims at. He was a co-outher of OpenID Provider Authentication Policy Extension (PAPE) specification, the OpenID Connect Core and Artifact Binding specification, JSON Web Token (JWT) specification, XRD specification, and the co-chair of the OASIS Open Reputation Management Systems TC. He has been the elected member of the OpenID Foundation board since 2008 as well as the founding board member of the Kantara Initiative. He has served in various Japanese government committees and is currently a member of the (Identity) Information Coordination Platform Technical Working Group in the Cabinet Secretariat which deals with the forthcoming Citizen Identity system. Nat holds a M.SA degree in Economics from University of Western Ontario, and a B.A. in Economics from Hitotsubashi University, Japan. His interests include digital identity, privacy, distributed systems, music, and poetry.

John BradleyJohn Bradley

Treasurer

Ping Identity
Mr. Bradley is an Identity Management subject matter expert and IT professional with a diverse background. Mr. Bradley has over 15 years experience in the information technology and identity management field. Mr. Bradley advises Government Agencies and commercial organizations on the policy and technical requirements of Identity Management, Federated Identity, PKI and smart card solutions. Mr. Bradley communicates effectively with clients, vendors, staff and standards organizations to brief them on complex state-of-the-art identity management concepts, best practices, and technical requirements. He is also Chair of the Federation Interoperability WG at Kantara. He is treasurer of the openID Foundation, on the advisory board for OIX, and an active contributor to SAML and other OASIS specifications at OASIS. . Mr. Bradley is one of the leaders of OSIS, and the Kantara Interoperability Review Board, forums that vendors use for industry interoperability testing, and thus has an in-depth understanding not only of the factors that contribute to success, but of upcoming trends that affect whether strategic planning will ensure optimal effectiveness for future operability. Recently John has been co-authoring the ICAM protocol profiles at Protiviti Government Services on behalf of GSA, and continues to support the FICAM interoperability Lab. Current projects include co-authoring the next version of the openID specification and related standards.

Mike JonesMike Jones

Secretary

Microsoft
Michael B. Jones is a Standards Architect at Microsoft. He is working to make people’s online interactions seamless, secure, and more valuable. He was an author and editor of the OpenID Provider Authentication Policy Extension (PAPE) specification, is the editor of the OAuth 2.0 Bearer Token specification, is an editor for the OASIS Identity Metasystem Interoperability TC, is co-author of the emerging JSON Web Token (JWT) specification, which will be used by the OpenID Artifact Binding specification, and is an active member of the OpenID Artifact Binding working group. He represented Microsoft on the boards of the OpenID Foundation and the Information Card Foundation in 2008 and 2009 and served both boards in an advisory capacity in 2010. He served on the USENIX board from 2000-2008, including as board president from 2004-2008. He was a researcher at Microsoft Research from 1992 to 2005 and earned his Ph.D. in Computer Science from Carnegie Mellon University in 1992. His interests include digital identity, privacy-protecting systems, distributed systems, networking, operating systems, musical performance, outdoor activities, and his fellow human beings.

George FletcherGeorge Fletcher

Community Representative

AOL
George Fletcher’s identity “credentials” include work on OpenID Connect, OpenID 2, OAuth, OAuth2, User Managed Access (Kantara Initiative) as well as contributions to the Security Services (SAML) and XRI OASIS TCs. Previously, George also worked on the Liberty Alliance Identity Web Service Framework. In addition to his identity work, George Fletcher has 20+ years of software development and architecture experience covering a wide variety of disciplines including artificial intelligence, “real-time” media processing, graphical information systems, consumer electronic devices and large scale Internet deployments. George Fletcher is currently Chief Architect for Consumer Identity Services at AOL Inc.

Corporate Board Members

Adam DawesGoogle – Adam Dawes

Adam has been a product manager at Google for over six years and currently manages the OAuth authentication and authorization infrastructure. He has worked in computer security for a decade, building email security, identity and policy controls at Postini and later for Google Apps. Previously, Adam led the product development at Autodaq (now Openlane), a B2B e-commerce site for the automotive industry. He holds an MBA from Stanford and a BA in visual arts from Harvard.

Anthony NadalinMicrosoft – Anthony Nadalin

Anthony is a partner architect at Microsoft working in the Government Engagement Team leading the Standards and Public Policy practice. Anthony spent 27 years with IBM where he was the Chief Security Architect responsible for the security strategy for software group products. Anthony participates in many standards organizations (OASIS, IEEE, W3C, ITU, ISO) aligning security strategy with standards.

Oracle – Prateek Mishra

Prateek is Technical Director, SOET (Standards, Open-Source and Emerging Technologies) group at Oracle Corporation. The group works on challenging architectural issues in identity management and security with a focus on cloud services and the enterprise.

His best known technical contribution is the conceptualization and creation of the SAML security standard. He proposed the use of security assertions to communicate security information in 2000 and organized the first interop demonstration at Catalyst 2002. During 2000-2007, he was an Editor, Contributor and Co-Chair of the OASIS SAML Technical Committee which created the SAML 1.0, SAML 1.1 and 2.0 specifications.

He holds a Ph.D. in Computer Science from the University of Utah. In a previous career, he conducted funded research in programming languages and distributed systems at Stony Brook University.

PayPal – Lydia Varmazis

Pam DinglePing Identity – Pam Dingle

Pam is a Senior Technical Architect at Ping Identity. Pam blogs at http://eternallyoptimistic.com and tweets at http://twitter.com/pamelarosiedee. In her spare time Pam sometimes writes PHP code for Joomla and Drupal sites at http://pamelaproject.com, or plays photographer in either San Francisco or Calgary.

Symantec – Brian Berliner

US Department of Health and Human Services, Office of the National Coordinator – Debbie Bucci

Dale OldsVMware – Dale Olds

Dale Olds is a VMware Principle Engineer and Cloud Platform Identity Architect working on VMware Identity Manager. He led development of the identity system for CloudFoundry, was a Distinguished Engineer at Novell, an architect of the Novell Cloud Security Service, and a leader of the Bandit, Higgins, and OSIS open source identity projects. Dale was the Chief Architect and lead implementer of Novell Directory Services (NDS) and eDirectory. He is listed as an inventor on numerous patents and has received Novell’s Edison, President’s, and Inventor Hall of Fame awards. Other industry experience focused on open standards, Linux, and Internet content delivery services.

Members of the community can monitor board discussions and communicate collectively with the board on the board mailing list.Board of AdvisorsExecutive Director OpenID Counsel

Eric SachsEric Sachs

Google, Director of Product Management for Identity

Eric Sachs currently leads the Identity team at Google.  He has worked in the areas of user identity and security for hosted Web applications since 1992. Since joining Google in 2003, he has worked as a Product Manager for many services, including the Google Account login system, Google Apps for Your Domain, orkut.com social network, Google Health, & Google Security.  Eric also led an effort to move Google’s internal systems to cloud-based technologies by leveraging the same developer tools that Google makes available publicly. Eric is now one of the key leaders for industry efforts to increase adoption of Internet Identity standards including OAuth and OpenID.  Before Google, Eric was the co-founder of Interliant, which provided hosted corporate email services. While at Interliant, Eric led co-development projects with both IBM and Microsoft to build platforms for hosting consumer and enterprise Web applications. Eric graduated with a B.A. in computer science in 1993 from Rice University.

Don ThibeauDon Thibeau

Don Thibeau is the Executive Director of The OpenID Foundation. Thibeau is also Chairman of the Board of the Open Identity Exchange (OIX), a non-profit, technology-agnostic, multi-tenant platform for certification listing services and trust frameworks for identity authentication in global internet and telecommunications applications. OIX was the first US government-authorized certification authority and was founded by companies including Google, PayPal, AT&T, Symantec, Verizon and Equifax. His expertise includes the data, identity and social layers of identity authentication and authorization. He has held senior management positions with Kodak, LexisNexis, Qsent and TransUnion. Thibeau, a former Presidential appointee, has testified before Congress and speaks and writes white papers on data privacy, identity standards and technologies and related regulatory issues. He blogs on these issues at openid.net.

Tom SmedinghoffTom Smedinghoff

Partner in the Privacy & Data Protection practice group in the Chicago office of Locke Lord LLP. His practice focuses on the developing field of information law and electronic business activities, with an emphasis on electronic transactions, identity management, data security, privacy, and corporate information governance issues. Mr. Smedinghoff has been actively involved in developing e-business, e-signature, data security, and information legal policy both in the U.S. and globally. He currently serves as chair of the Identity Management Legal Task Force of the American Bar Association (ABA) Section of Business Law, and co-chair of its Cyber Security Committee. Previously, he was chair of the ABA Section of Science & Technology Law (1999-2000), chair of the ABA Electronic Commerce Division (1995-2003), and chair of the International Policy Committee (2008-2011). He is also a member of the U.S. Delegation to the United Nations Commission on International Trade Law (UNCITRAL), where he participates in the Working Group on Electronic Commerce and helped to negotiate the international e-commerce treaty titled the “United Nations Convention on the Use of Electronic Communications in International Contracts” and the UNCITRAL “Model Law on Electronic Signatures.” He was also the ABA Advisor to the Uniform Law Commission Committee to Implement the UN E-Commerce Convention (2008 – 2010), and served as an ABA Advisor to the Uniform Law Commission committee that drafted the Uniform Electronic Transactions Act. Mr. Smedinghoff is the author of the book titled INFORMATION SECURITY LAW: THE EMERGING STANDARD FOR CORPORATE COMPLIANCE, (IT Governance Publishing, 2008). He is also the editor and primary author of the e-commerce book titled ONLINE LAW: THE LEGAL GUIDE TO DOING BUSINESS ON THE INTERNET (Addison Wesley, 1996), as well as numerous articles on electronic transactions, identity, privacy, and data security law issues.