Identity 8: 1+1=2 Authorisation Mechanisms
While we are tightening our infrastructure, we may also consider letting guests into our setup. As you might expect, we intend to do this in the tightest possible manner.
>> Continue reading <<
While we are tightening our infrastructure, we may also consider letting guests into our setup. As you might expect, we intend to do this in the tightest possible manner.
>> Continue reading <<
While we are tightening our infrastructure, we may also consider letting guests into our setup. As you might expect, we intend to do this in the tightest possible manner.
>> Continue reading <<
This article explains how we perceive the relations between the various kinds of identities that we described before. Spefically, we turn to inheritance between identities.
>> Continue reading <<
The ideal identity system integrates well with the web, and with non-web applications. The systems that are most seriously used in these realms are SAML and Kerberos, respectively. But until now, they didn't mix...
>> Continue reading <<
The various forms of identity offered under the InternetWide Architecture can sometimes be used in clever ways, for example to construct identities with limited access or temporary validity. A number of possible tricks follow.
>> Continue reading <<