Posts tagged 'identity' – Page 2

architecture

Identity 9: Phone Numbers are User Identities

Although the InternetWide Architecture is building structures to support advanced modern-day users now and in the far future, the properties of personal control over online identity can start really modest, with a simple phone number.

>> Continue reading <<

architecture

Identity 8: 1+1=2 Authorisation Mechanisms

While we are tightening our infrastructure, we may also consider letting guests into our setup. As you might expect, we intend to do this in the tightest possible manner.

>> Continue reading <<

architecture

Identity 7: Welcoming Guests

While we are tightening our infrastructure, we may also consider letting guests into our setup. As you might expect, we intend to do this in the tightest possible manner.

>> Continue reading <<

architecture

Identity 6: Inheritance of Identities

This article explains how we perceive the relations between the various kinds of identities that we described before. Spefically, we turn to inheritance between identities.

>> Continue reading <<

architecture

Identity 5: Integrating Kerberos and SAML

The ideal identity system integrates well with the web, and with non-web applications. The systems that are most seriously used in these realms are SAML and Kerberos, respectively. But until now, they didn't mix...

>> Continue reading <<