Remove tags multi source identity
article thumbnail

Prioritizing AI? Don’t shortchange IT fundamentals

CIO Business Intelligence

Fundamentals like security, cost control, identity management, container sprawl, data management, and hardware refreshes remain key strategic areas for CIOs to deal with. Containers and certificates Privilege management depends on identity management, another area that demands continued attention. And that’s going to constantly change.”

Hardware 143
article thumbnail

Exploring Self-Sovereign Identity in India

Phil Windley

Summary: I spent almost two weeks talking with people about self-sovereign identity in Switzerland and India. I'm more excouraged than ever that self-sovereign identity holds the key to real change in how we live our digital lives with security, privacy, and dignity. Self-sovereign identity is making noise.

Banking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

You've Had an Automobile Accident: Multi-Source Identity to the Rescue

Phil Windley

Creating an identity system that is flexible enough to support the various ad hoc scenarios that the world presents us with can only be done using a decentralized system like Sovrin that allows multiple credentials from various authorities to be shared in the ways the scenario demands.

article thumbnail

Token-Based Identity

Phil Windley

Summary: Token-based identity systems move us from talking about who, to thinking about what, so that people can operationalize their digital lives. Token-based identity systems support complex online interactions that are flexible, ad hoc, and cross-domain. Account- and token-based identity are not mutually exclusive.

Insurance 137
article thumbnail

Learning NVP, Part 4: Adding Hypervisors to NVP

Scott Lowe

This build of OVS is identical to the open source build in every way except that it includes the ability to create STT tunnels and includes some extra NVP-specific utilities for integrating OVS into NVP. Specify a display name (I use the hostname of the hypervisor itself), and—optionally—add one or more tags.

article thumbnail

Multi-Source and Self-Sovereign Identity

Phil Windley

Summary: Self-sovereign identity is multi-source, but not all multi-source identity systems are self-sovereign. Self-sovereign identity means the individual or organization controls and manages their identity. The world is full of credentials. The Issuer/Holder/Verifier Trust Triangle.

article thumbnail

The Laws of Identity

Phil Windley

Summary: In this post, I make a case that Sovrin not only conforms to Kim Cameron's Seven Laws of Identity, but constitutes the identity metasystem he envisioned in 2004. In 2005, Microsoft's Chief Identity Architect, Kim Cameron wrote an influential paper called The Laws of Identity (PDF). An Identity Metasystem.

Banking 88