-
Play video Authentication and Beyond with FIDO and Push Notifications
Authentication and Beyond with FIDO and Push Notifications
The talk aims at simplifying the complexities around the FIDO protocol and how to leverage it in practice to achieve stronger authentication.
26:00
-
Play video Browser Features vs Identity Protocols
Browser Features vs Identity Protocols
This session will review the main browser changes that have affected identity over the last few years – Chrome’s SameSite and Safari’s ITP2 in particular, interpreting them as part of a larger trend and attempting to predict the future.
28:41
-
Play video Maximizing Failover Efficiency
Maximizing Failover Efficiency
Jon Lehtinen shares his experiences testing several DNS architectures, and highlights how different resolution methods, failover policies, and other seemingly inconsequential components greatly impact how instantaneous- or not- your failover can be.
22:23
-
Play video Taking an Identity Centric Approach
Taking an Identity Centric Approach
This session will discuss real-world experiences in creating a more-robust, identity-centric IAM program and helping sell that program to the C-suite in terms that go beyond compliance and how those minor changes have helped organizational leaders.
19:52
-
Play video An Enterprise's Journey to Risk Based Authentication
An Enterprise's Journey to Risk Based Authentication
This session will show you how our presenters leveraged a cloud based risk assessment service to make their MFA smarter without interrupting the normal end user experience.
21:32
-
Play video How IAM Supported the HP Company Divestitures
How IAM Supported the HP Company Divestitures
This has a more technical focus, including discussion of enabling 802.1x, rebuilding a directory service, adding MFA and FIDO credential, and changing customer and partner IAM systems.
26:23
-
Play video ONE-Identity Multi Tenancy Architecture at PayPal
ONE-Identity Multi Tenancy Architecture at PayPal
This session outlines the conceptual architecture and approaches how PayPal is leveraging industry-leading standards (OAuth/SAML/SCIM/GraphQL) to create various integration pattern
27:37
-
Play video Scaling Strong Authentication
Scaling Strong Authentication
Join our expert panel for an in-depth discussion of the challenges and pitfalls of handling strong authentication at large scale – and an exploration of possible solutions.
49:39
-
Play video Scalable Decentralized Identity
Scalable Decentralized Identity
In the Decentralized Identity model, the identifiers by which actors are known or related metadata are sometimes resolvable against a Decentralized Ledger Technology (DLT).
38:16
-
Play video ID Service from Mastercard - Your Digital Identity, Your Choice
ID Service from Mastercard - Your Digital Identity, Your Choice
Mastercard seeks to lead the creation of a collaborative user centric new trust ecosystem, to allow all types of digital interactions, where user data will be verified in a secure and privacy-sensitive way.
25:27
-
Play video Centralized Policy-Based Access Control in a Distributed Microservice World with Open Policy Agent
Centralized Policy-Based Access Control in a Distributed Microservice World with Open Policy Agent
This talk is targeted toward a more technical audience. Outline: •What is OPA •What Problems does it solve? •How can OPA be used in a Policy-Based Access Control architecture •Example live demo use cases.
28:04
-
Play video How to RBAC
How to RBAC
Leslie shares her experience implementing RBAC in a fast-moving SaaS company and offers tips and tricks to help you plan and execute your own RBAC transition. This talk is process-focused and platform-neutral.
20:26
- Load More