authority-delegation-garden-patch

part_of::Allen (2023) Least and Necessary Design Patterns

Insights: Allen (2023) Least and Necessary Design Patterns

Lens Perspectives

Why this matters for the garden: The article provides a named methodology (inside-out design patterns) that Allen uses across his corpus. Understanding this methodology as a reusable tool helps interpret other Allen articles where he applies similar inversions (data minimization to selective disclosure, authority to autonomy, restriction to enablement).

Why this matters for self-sovereign identity: The six patterns form a taxonomy that any credential system designer can use as a checklist. The “necessary access” pattern in particular provides the conceptual foundation for negotiation-based credential exchange — the verifier declares what it needs, the holder decides whether to participate.

Garden Node Candidates

Extract as Pattern:

Extract as Model:

Extract as Principle:

Extract as Gloss:

Connections to Existing Garden Nodes

Connects to Allen (2024) Progressive Trust: Progressive trust is the operational mechanism for implementing necessary access — trust and data disclosure increase incrementally based on demonstrated need. The necessary access pattern provides the theoretical justification; progressive trust provides the interaction model. [source: garden-level inference]

Connects to Allen (2021) Principal Authority: Principal authority defines who gets to make decisions about data. Necessary access defines what data is needed for a given function. Together they form a two-part test: does this principal have authority to request this data, and is this data necessary for the function? [source: garden-level inference]

Connects to [[Allen (2023) Origins of Self-Sovereign Identity]]↑: The dignity framing in this article connects directly to the self-sovereign identity origins. Self-sovereign identity is the identity-domain expression of the broader commitment to individual dignity over institutional control. [source: garden-level inference]

Connects to [[Allen (2025) How My Values Inform Design]]↑: The dignity-first framing is the values-level commitment; the least and necessary patterns are the design-level implementation. “Respect and dignity” as the root motivation for security design is the values article’s thesis expressed as architecture. [source: garden-level inference]

Key Tensions for Garden Exploration

Implementation gap. The six patterns are cleanly described conceptually but have no worked implementation examples. A garden inquiry could ask: what does a verifiable credential system implementing “necessary access” look like concretely?

Least vs. necessary conflict resolution. When a least-access analysis and a necessary-access analysis of the same system produce conflicting answers, how is the conflict resolved? The article presents them as complementary but does not address the case where they disagree.

Transitive data access is underexplored. The article acknowledges the ecosystem dimension of data access but does not fully develop how transitive authority applies to data flows through third parties, analytics providers, and aggregators.

Extraction Targets

  1. Inside-out methodologyExtracted: Inside-Out Methodology as Design Pattern Innovation (Gloss)
  2. Necessary accessExtracted: Necessary Access (Gloss)
  3. Selective correlation → Pattern Form named [[Selective Correlation]]↑
  4. Six-pattern taxonomy → Model Form named [[Least and Necessary Taxonomy]]↑
  5. Dignity as security objectiveExtracted: Dignity Not Asset Protection as Security Design Frame (Gloss)
  6. Transitive authority → Gloss Form named [[Transitive Authority]]↑