Posts tagged 'identity' – Page 4

architecture

Identity 8: 1+1=2 Authorisation Mechanisms

While we are tightening our infrastructure, we may also consider letting guests into our setup. As you might expect, we intend to do this in the tightest possible manner.

>> Continue reading <<

architecture

Identity 7: Welcoming Guests

While we are tightening our infrastructure, we may also consider letting guests into our setup. As you might expect, we intend to do this in the tightest possible manner.

>> Continue reading <<

architecture

Identity 6: Inheritance of Identities

This article explains how we perceive the relations between the various kinds of identities that we described before. Spefically, we turn to inheritance between identities.

>> Continue reading <<

architecture

Identity 5: Integrating Kerberos and SAML

The ideal identity system integrates well with the web, and with non-web applications. The systems that are most seriously used in these realms are SAML and Kerberos, respectively. But until now, they didn't mix...

>> Continue reading <<

architecture

Identity 4: Tips and Tricks

The various forms of identity offered under the InternetWide Architecture can sometimes be used in clever ways, for example to construct identities with limited access or temporary validity. A number of possible tricks follow.

>> Continue reading <<