Posts tagged 'identity'

adminstration

Access 5: Juggling Keys in the Rules DB

Access Control is powerful. System-central storage is a bit iffy. How do we stop people from abusive tapping?

>> Continue reading <<

adminstration

Access 4: ARPA2 Access Control for Mail

We just demonstrated how you can configure access control in a local database. The next step is to actually put it to use. Lets control our email!

>> Continue reading <<

adminstration

Access 3: ARPA2 Access Control and Groups for Admins

Let's say you own a domain name, and have software that uses ARPA2 Access Control. How, then, can you grant or revoke access?

>> Continue reading <<

architecture

Identity 16: Support Levels for Realm Crossover

The essential game of Realm Crossover is one of juggling realms as part of identities. This brings us a number of "support levels" that we could describe. This forms an interesting perspective on the growing path of the InternetWide Architecture.

>> Continue reading <<

identity

Identity 15: Entering Security Codes

Strong security starts with big numbers, in the range of 38 digits (128 bits) for the current level, with an imminent upgrade to 77 digits (256 bits) to thwart Quantum Computers. We can make such security codes a little less dreadful to use.

>> Continue reading <<