logo-green.png

Identerati Office Hours Episode

There are a bunch of FIDO keys in the card form factor, but most of them don’t have an HID antenna to open door locks. Combining biometric and phsyical access is a game changer for physical access control–no more card sharing.
Shared Signals wants to limit the damage of compromised accounts used from one website to gain access to accounts on another website. CAEP uses the Shared Signals event framework to defines some typical events: Session Revoked, Credential Change, Assurance Level Change, Device Compliance Change, Session Established.
Authorization decisions are only as good as the data used to make them. An identity data fabric, identity data lake, or master user record pulls data from many sources, which it prioritizes by authoritative ranking by data element.
Agama is a domain specific language (“DSL”) for identity orchestration. It’s governed at the Linux Foundation Janssen Project. There is also an Agama project archive format, which is a standard way to package all the assets required by an IDP to run an Agama Project.
In native mobile applications, authentication often involves redirecting users to an external browser to complete the login process. This approach disrupts the seamless user experience that mobile app users expect.
Couldn’t make it to “EIC” (the European Identity Conference)? Luckily Sebastian and Henk took notes for you, and we scheduled this debrief session to discuss.
There have been a few blog posts (and resulting social media and forum discussions) going around the past few weeks about #passkeys, mostly painting them (or organizations who have been working hard to bring passkeys to users all over the world) in a negative light.
AI represents a huge opportunity for digital identity advancement potential: proactive security for organizations, efficient workflow automation for the workforce, faster development, and a better UX for customers.
Software to assist with Identity Governance, and reviewing user’s access has been around for a decade. Many implementors struggle with integrating quickly and onboarding applications.
Mike has been working on a new design for distributed authorization in the Janssen Project which could enable near real-time JWT token revocation. Revoking JWTs more quickly can limit the blast area of account takeover.
This episode Kalyan will discuss and even demo how Bhutan rolled out foundational identity with the CREDEBL Platform. We’ll also discuss the Singapore SingPass model, which enables sign-in to over 2,700+ services government and private sector websites.
Agama is a domain specific language (“DSL”) for identity orchestration. It’s governed at the Linux Foundation Janssen Project. There is also an Agama project archive format, which is a standard way to package all the assets required by an IDP to run an Agama Project.