Are you hopelessly addicted to identity standards? You know, those crazy specifications that underlie much of the modern practice of identity management, including federation, strong authentication and API security? Perhaps you are looking for a place where you can make sense out of identity standards without actually having to read them from front to back? Do some of you want to know all about Microsoft spec implementations, while others of you want industry insight without the spin of any particular implementation?
If you match any of these descriptions, fear not - you are in the right place. Our merry band of standards experts and guest bloggers are here to help you work smart. We will analyze the specs, so you don't have to (unless you want to in which case we'll debate the finer points). Each entry will be tagged so that you know what level of expertise is required and which posts talk about pure specs vs. implementations. If we talk about both, we will put the implementation details last. There may be a few best practices sprinkled in there too! We reserve the right to postulate, opinionate, and generally have a good time.
If this is just the blog you've been looking for, watch this bat-channel for adventures in OAuth, SAML, JWT, FIDO, OpenID Connect, and all sorts of other great topics. We’re excited you’re along on this journey and please reach out to us in the comments if there are any topics you’d love to hear about!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.