Learning Library

← Back to Library

From Passports to Digital Workers

Key Points

  • Grant Miller traces the roots of identity management back to the 16th‑century passport introduced by King Henry V, framing modern identity as a continuation of early border‑control concepts.
  • He explains that today’s identity management separates “who you are” (authentication) from “what you’re allowed to do” (authorization), adding roles and tasks to the classic who‑where‑what model.
  • Miller illustrates his own identity as an example—Grant, IBM CTO, distinguished engineer, access‑focused—showing how each attribute determines the tools, data, and systems he can access.
  • The talk emphasizes that digital workers (both humans and automated agents) primarily interact with other computer systems and data, executing jobs and retrieving information rather than engaging in simple one‑to‑one human interactions.
  • Ultimately, effective identity governance ensures that the right roles perform the right tasks on the right resources, mirroring the historic need to verify travelers’ identities and permissions.

Full Transcript

# From Passports to Digital Workers **Source:** [https://www.youtube.com/watch?v=DYMv926QeRE](https://www.youtube.com/watch?v=DYMv926QeRE) **Duration:** 00:11:55 ## Summary - Grant Miller traces the roots of identity management back to the 16th‑century passport introduced by King Henry V, framing modern identity as a continuation of early border‑control concepts. - He explains that today’s identity management separates “who you are” (authentication) from “what you’re allowed to do” (authorization), adding roles and tasks to the classic who‑where‑what model. - Miller illustrates his own identity as an example—Grant, IBM CTO, distinguished engineer, access‑focused—showing how each attribute determines the tools, data, and systems he can access. - The talk emphasizes that digital workers (both humans and automated agents) primarily interact with other computer systems and data, executing jobs and retrieving information rather than engaging in simple one‑to‑one human interactions. - Ultimately, effective identity governance ensures that the right roles perform the right tasks on the right resources, mirroring the historic need to verify travelers’ identities and permissions. ## Sections - [00:00:00](https://www.youtube.com/watch?v=DYMv926QeRE&t=0s) **From Passports to Digital Workers** - Grant Miller links the 16th‑century introduction of passports by King Henry V to modern identity management for digital workers, illustrating that the core principles of verifying who someone is, their origin, and their permitted actions have stayed fundamentally the same. - [00:03:04](https://www.youtube.com/watch?v=DYMv926QeRE&t=184s) **Identity Governance in Client-Server Systems** - It explains how organizations must identify and control both human and non‑human system identities in client‑server environments, using functional or system IDs, network restrictions, and governance frameworks to manage access and tasks. - [00:06:11](https://www.youtube.com/watch?v=DYMv926QeRE&t=371s) **From Monolithic Systems to Digital Workers** - The speaker contrasts traditional generic, monolithic systems with purpose‑built, autonomous digital workers that perform specific tasks, collaborate with each other and humans, and are evolving toward assistant‑like roles. - [00:09:19](https://www.youtube.com/watch?v=DYMv926QeRE&t=559s) **Rethinking Digital Workers in Enterprises** - The speaker urges viewing digital workers not as monolithic bots but as privileged agents assigned specific tasks within integrated process flows. ## Full Transcript
0:00Howdy, everyone. 0:01My name is Grant Miller. 0:02I am a distinguished engineer and the CTO for Access Transformation at IBM. 0:08And I'm going to talk about digital workers and how those relate to identity management. 0:15Before I get in too deep into the whole thought and idea of digital work as an identity, 0:20I kind of want to go back a little bit and see where identity and the whole process came from. 0:25You really have to go back several hundred years, actually to the late 16th century, 0:30when King Henry, the fifth, introduced the concept of the passport. 0:34And this was the first time that we really saw the idea of identity management and governance come into play. 0:41And so what happened is that we had an individual. 0:46Who wanted to travel and go across borders. 0:49And we needed to know who they were. 0:52Where they were from. 0:55And also what they were allowed to do. 1:02Were they allowed to travel to a different border, to a different country? 1:05A nice thing that also was introduced at this time 500 years ago was the concept of recording everything. 1:12So making sure there was a record of all of your travels and all of the times that you crossed over borders. 1:18And this is what we saw come out in the in the 16th century. 1:22Now, fast forward today and we get into IT 1:26identity management. 1:27And the concepts are basically very much the same as they were 500 years ago. 1:32So we still need to know who a person is, where they came from and what they are trying to do. 1:37And this is so that we can make sure that the right people and the right roles of an organization 1:43can perform the tasks and job that they're assigned to do. 1:46Now we term, our terminology has changed a little bit since then. 1:50Instead of who, where, what necessarily we actually call this authentication. 1:55So we authenticate who the person is and the where and the what has really become the authorization. 2:00Where what job are they trying to do? 2:03What is their task? 2:04What is the role they're trying to do? 2:05So we've add did a little bit more to this than what we had before. 2:09So we have the role. 2:12And we have the task. 2:13So let me go back to my introduction. 2:16When I introduced myself at the very beginning of this, I said, Who am I? 2:21He was Grant. 2:23I am from IBM. 2:25My role was a DE. 2:28And my task is access. 2:33And so all of these components really define my identity and ultimately drive what I'm allowed to do, 2:39what tools I can access, what data I can access, what systems I need to access to complete my job. 2:44Now, as we also look at this and think about this, I'm not just acting with other humans and individuals. 2:50I do a lot of that. 2:51But primarily what I'm going to be dealing with is working with with other systems. 2:57And so they'll be a computer systems that I need to interact with. 3:02There'll be data that I need to interact with. 3:05And so oftentimes I will connect into a system to run a task or run some sort of a job. 3:11It'll retrieve data that will bring that back to me, or I might retrieve data directly myself. 3:16There are also times when it's just not a 1 to 1 system in human interaction, 3:21but there will be another computer system in the background somewhere. 3:25So this is a client server kind of model and we need to interact across different systems and all of those are interact with data. 3:32So we have a whole bunch of non-human identities working with human identities. 3:37But the concept around identity stays fundamentally exactly the same. 3:42We still need to know who these systems are. 3:45And a lot of times we do this with functional IDs or we do them with system 3:49IDs or some way to represent the system that's coming in. 3:53We also know where this could be. 3:55What IP address do we allow to come in from, what networks, what sub networks. 3:59And we also need to know, again, what they're allowed to do. 4:04So there is some task that the system is trying to do. 4:08So it's very much what we've always seen and what we've been seeing in the past, same concepts that have applied. 4:13Now, one thing that has emerged over the last the recent years is 4:18now we have lots of systems, lots of digital identities, real lots human identities. 4:23And we do manage and we need to govern all that. 4:26And so we have added governance. 4:30Across all of these systems, which is identity, governance and administration and. 4:36And this now can look and make sure that any IDs, any systems, are they still in place? 4:41Are they still allowed to do what they do? 4:43Have you changed jobs? 4:44Have you left the company? 4:45Are you a new hire? 4:46All of these things, all the lifecycle management around identities still need to be governed. 4:50So this is where the governance play of that. 4:52So this is what we're pretty much fairly used to in how identity management works today. 4:57So let's jump ahead a little bit. 5:00And now we have the concept of automations and intelligent systems coming into play. 5:06Now, early on, we really had chat bots. 5:11And we had copilots. 5:13And these are systems that we can interact with as a human and work with the with the chat bot. 5:18The chat bot may also work with systems to retrieve data or take actions 5:24that need to be happen and then bring insight and information back to us. 5:28And that's okay, right? 5:29It's still behaving a lot like how we have thought of systems in the past and we still need to know who, where, what's allowed. 5:40All of these things still happen 5:42and we're still actually, you know, logging all of the actions that all of these systems are doing. 5:47Now, the interesting thing about this system that's happening, these are autonomic systems. 5:52We still think of them very much like non-human identities. 5:55So they're still operating as functional IDs or system IDs or connecting 5:59in ways that we have been familiar with for a long time and how to do it. 6:03So we've applied all that. 6:05So the governance that goes on across these is still very much the same. 6:11We still govern this much like we would any of these systems or any are much like we do humans. 6:16So now let's jump to current and even maybe projecting a little bit into the future. 6:22And now we're starting to get the idea and the concept of digital workers. 6:27Now, digital worker is a little bit different in that instead of 6:31these systems, which are really they're they're somewhat generic and monolithic. 6:38Systems. 6:39In other words, you ask, they have a task, they can go off. 6:42They know exactly what they're supposed to do, what they're supposed to interact with. 6:46They've been built that way and they return a response. 6:48These systems are actually a lot more autonomic, and they're really specifically designed to be digital workers. 7:00And they have a specific task. 7:02They are assigned to accomplish one specific task. 7:06And and in the end of the day, what they're really doing is augmenting. 7:13Human teams. 7:14So they're really here to support us, to do automation, to help in flows. 7:18And the way to really think about this is that it's not just a single digital worker that exists. 7:25There could be multiple digital workers. 7:27And and they're working together. 7:30You know, they have to interact with each other. 7:32They have to interact with maybe potentially a copilot. 7:35They have to interact with systems. 7:36And a lot of times in the future, we may see that we will get digital workers that are really more of a digital assistant. 7:43So instead of as an individual, I work with a system or any of these other 7:48parts of the enterprise, I will just work with my assistant. 7:51My assistant then will work with other digital workers and they will start figuring out what needs to be done. 7:57Now, where I describe this to be more of a generic monolithic system, these become what is known as a gen tech flows. 8:07And this is because we have multiple agents, multiple digital workers, 8:10all trying to interact together and it becomes part of a flow. 8:13And that flow can change as we try to do different questions that I want to have answered. 8:18Now we get back to identity management. 8:21A lot of this still remains the same. 8:24I still need to know the who, the where, though, what they're allowed to do. 8:28I need to log everything. 8:30But now there's a little bit of a spin on this, 8:32that's a little bit different because now I have a whole ecosystem 8:35of these digital workers who are interacting with a lot of different stuff. 8:39And so if I'm starting the conversation and I ask the digital worker 8:44and they ask a digital worker and they ask a digital worker, the whole identity now needs to cascade, 8:49I'm the one actually asking and my rights and privileges need to flow through the whole system. 8:54So all of this who aware what now must cascade. 8:59And it does this for humans. 9:02Plus digital workers. 9:05And so this adds a layer of complexity over what we have before. 9:08And the same thing projects out on our governance, governance. 9:11And the path was I can govern my chat bot, I can govern my systems and the identities user, 9:16I can govern the humans and what the humans are doing. 9:19But now I have this network in this ecosystem, 9:22and so I have to have a more integrated view of what tasks they're doing, what tasks 9:26are allowed and what actions and logs that I'm seeing them happen. 9:29So it becomes a much more integrated environment. 9:32And this is where we are seeing everything change. 9:38All right. So what does that mean for you? 9:40So I'd like to leave you with four things to think about as 9:45you start dealing with the digital worker and the digital worker age that's coming. 9:49And I want you to think about things that you need to take into consideration. 9:53The first thing that you should think about is don't think of digital workers as systems, right? 10:02Don't think of them as monolithic chat bots and copilots. 10:05You really need to think of them as a digital worker and they're going to have privileges or rights, 10:11and they're going to be working on behalf of other agents or people. 10:14So that's the first thing to consider. 10:16A second consider then you need to consider and do is when you start thinking about 10:21a process of an enterprise, you think about processes and flows that you do work. 10:26Break those processes down into task. 10:28And your digital worker should be assigned the task. 10:31They manage that task instead of having a chat bot that can do whatever you need for it, 10:36each step and your process should have a task and that should be assigned a digital worker. 10:41And then you bring digital workers to get together, an agent to flow, to do whatever it is you're trying to accomplish. 10:47So break everything down and you kind of think of this much like you think of an object 10:51already in program or you have high cohesion. 10:53In other words, an agent is assigned a very specific task 10:56and you have loose coupling so that you can simply ask it what it needs to do. 11:00And it doesn't get intertwined with a lot of other systems. 11:03Keep it very simple. 11:04The third thing that you need to really take into consideration 11:07is understand this whole ecosystem, understand all of these interactions, understand 11:13what it means to have a humans interacting with digital workers, 11:17with systems, with bots, and what all that drives from an identity perspective. 11:21Keep that in the back of your mind as you start thinking and designing through the system. 11:25And then finally, IGA or identity governance and administration becomes the who, the where, the what has to be propagated. 11:36It has to be cascaded. 11:37It has to be integrated across all of that stuff. 11:39Out single systems of governance in the past are going to evolve. 11:43So you have to start thinking about that as you're doing your solutions. 11:47And with that, I hope that this helps your understanding of digital workers and where things are going. 11:53And I'll see you next time.