Hello Identity Standards World!

This post has been republished via RSS; it originally appeared at: Identity Standards Blog articles.

Are you hopelessly addicted to identity standards? You know, those crazy specifications that underlie much of the modern practice of identity management, including federation, strong authentication and API security? Perhaps you are looking for a place where you can make sense out of identity standards without actually having to read them from front to back?  Do some of you want to know all about Microsoft spec implementations, while others of you want industry insight without the spin of any particular implementation?

 

If you match any of these descriptions, fear not - you are in the right place.  Our merry band of standards experts and guest bloggers are here to help you work smart.  We will analyze the specs, so you don't have to (unless you want to in which case we'll debate the finer points).  Each entry will be tagged so that you know what level of expertise is required and which posts talk about pure specs vs. implementations.  If we talk about both, we will put the implementation details last.  There may be a few best practices sprinkled in there too! We reserve the right to postulate, opinionate, and generally have a good time.

 

If this is just the blog you've been looking for, watch this bat-channel for adventures in OAuth, SAML, JWT, FIDO, OpenID Connect, and all sorts of other great topics. We’re excited you’re along on this journey and please reach out to us in the comments if there are any topics you’d love to hear about!

 

 

REMEMBER: these articles are REPUBLISHED. Your best bet to get a reply is to follow the link at the top of the post to the ORIGINAL post! BUT you're more than welcome to start discussions here:

This site uses Akismet to reduce spam. Learn how your comment data is processed.