-
Play video Is FIDO The Key to a Passwordless Future? Three Strategies for Success
Is FIDO The Key to a Passwordless Future? Three Strategies for Success
This session will draw on the experiences of organizations that are successfully using FIDO today to help you develop the strategies and best practices to take full advantage of this ground-breaking technology.
26:07
-
Play video Beyond Bearer Tokens with HTTP Message Signatures
Beyond Bearer Tokens with HTTP Message Signatures
This session dives into what Bearer Tokens are, how they work, and how they can augment or replace existing API protection mechanisms such as bearer access tokens and cookies.
21:59
-
Play video The State of FIDO Authentication
The State of FIDO Authentication
This session provides an update on FIDO adoption, what has changed in the last year, and how the Alliance has positioned FIDO for adoption at scale.
25:27
-
Play video Identity Standards: What's Up, What's New, What's Next
Identity Standards: What's Up, What's New, What's Next
Alex will share his thoughts on the importance of Open Standards, and some areas of amazing recent progress. Additionally, he will discuss a few emerging areas and the opportunity they present for enhancing user security.
32:46
-
Play video Distributed Open Identity: Self-Sovereign OpenID: A Status Report
Distributed Open Identity: Self-Sovereign OpenID: A Status Report
This session will provide an overview of Self-sovereign Identity a philosophy and bring the audience up-to-speed on what is happening in the space including Demo of such implementations.
22:26
-
Play video Enabling Scalable Multi-Lateral Federations with OpenID Connect
Enabling Scalable Multi-Lateral Federations with OpenID Connect
This presentation will describe progress implementing and deploying OpenID Connect Federation, upcoming interop events and results, and next steps to complete the specification and foster production deployments.
26:45
-
Play video The Burden of Proof
The Burden of Proof
Explore proof-of-possession in OAuth and endeavor to equip you with the knowledge to discern fact from fiction when it comes to cryptographic defenses against the use of stolen OAuth tokens.
49:12
-
Play video Beyond 2.0: OAuth, TXAuth, XYZ, and Growing New Standards
Beyond 2.0: OAuth, TXAuth, XYZ, and Growing New Standards
The OAuth 2.0 protocol has been successful across the internet, but it has many shortcomings. Learn how we are building the next generation identity and security protocols that could lay the groundwork for the next decade of internet security.
20:42
-
Play video Transaction Tokens: Solving the External Internal Authorization Problem
Transaction Tokens: Solving the External Internal Authorization Problem
This talk will explore a mechanism that allows for the external authorization model to remain simple for developers while providing a multi-level (coarse-grained to fine-grained) authorization model internally.
26:17
-
Play video The Power of SCIM
The Power of SCIM
In this talk we’ll dive into how identity professionals can use SCIM to accelerate their identity deployments and increase application coverage.
20:23