Tag: IAM

Consumer Centric Identity

The case for an open loop identity system

Lessons for identity from real-time payments and mobile wallets Ask anyone in the digital identity world, and invariably they will say that identifying someone to do a transaction is complicated. Anyone who thinks you can present a mobile wallet and bingo, you are verified to transact, is the equivalent of saying a swan glides but…
Read more

Feeling secure enough to use open source for IAM projects

Identity is big, really big, especially when it is customer facing. There are a lot of moving parts to build, pieces to hook up, and external functionality to integrate. The whole makes the identity ecosystem which was once a dream of a few but is fast becoming a reality for many. Part of this movement…
Read more

The Cloud’s the Limit for Secure, Complaint, Identity Storage, and Personal Data

Back in 2009, I gave a talk about Cloud identity. It went down, less like a fluffy Cloud and more like a lead balloon. It was too early – way too early. But as we reach peak Cloud adoption, with rates of uptake reaching 93%, the sky’s the limit for digital identity. Cloud computing has…
Read more

Data as a Smart Superstructure: A Warning to the Wise

In a previous article, I talked about how we need to build a smart identity for a smart city. The article, hopefully, pointed to building a perspective on what smart actually means. But, smart cities are built up from many smart pieces. These ‘smart pieces’ are really just an evolution of our current critical infrastructures…
Read more

Identity and The Smart City

Human beings love cities, well many of us do. We love them so much that the United Nations are predicting that by 2050, 66% of us will live in them. So how do to make sure that all of those people are housed, have clean water, can get into and out of the city easily,…
Read more

Microservices for IAM: Container Security and Personal Data

Identity and access management has become a bit of a beast. It has gone from a system that was contained within an Enterprise, usually directory driven, for very controlled purposes, to something that impinges upon almost every aspect of our daily lives. This has been driven by a number of factors: Cloud computing changing the…
Read more

Trust and the Blockchain

The story of a blockchain that may not break, but will bend. If you’re of a certain age, you will remember the dot-com revolution back in the day. I remember sitting in a meeting with the CEO of the company I was working with at the time. He sat across the table with about 5…
Read more

Identity Data in the World of GDPR

If you wake up in a cold sweat in the middle of the night with the letters GDPR floating just above your bed, then fear not, Customer Identity Access Management CIAM is your knight in shining armor. I don’t need to tell those of you working with personal data that the GDPR is nuanced and…
Read more