Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Decentralized Identity Explained

You're reading from   Decentralized Identity Explained Embrace decentralization for a more secure and empowering digital experience

Arrow left icon
Product type Paperback
Published in Jul 2024
Publisher Packt
ISBN-13 9781804617632
Length 392 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Rohan Pinto Rohan Pinto
Author Profile Icon Rohan Pinto
Rohan Pinto
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1 - Digital Identity Era: Then
2. Chapter 1: The History of Digital Identity FREE CHAPTER 3. Chapter 2: Identity Management Versus Access Management 4. Part 2 - Digital Identity Era: Now
5. Chapter 3: IAM Best Practices 6. Chapter 4: Trust Anchors/Sources of Truth and Their Importance 7. Chapter 5: Historical Source of Authority 8. Chapter 6: The Relationship between Trust and Risk 9. Chapter 7: Informed Consent and Why It Matters 10. Chapter 8: IAM – the Security Perspective 11. Part 3 - Digital Identity Era: The Near Future
12. Chapter 9: Self-Sovereign Identity 13. Chapter 10: Privacy by Design in the SSI Space 14. Chapter 11: Relationship between DIDs and SSI 15. Chapter 12: Protocols and Standards – DID Standards 16. Chapter 13: DID Authentication 17. Chapter 14: Identity Verification 18. Part 4 - Digital Identity Era: A Probabilistic Future
19. Chapter 15: Biometrics Security in Distributed Identity Management 20. Index 21. Other Books You May Enjoy

IAM principals

Identity management is the cornerstone of security that ensures that users are granted the appropriate access and that unauthorized users are prevented from accessing data, systems, and applications. IAM enterprise policies set rules for the following:

  • Identifying users and giving them designated roles
  • Recognizing the data, platforms, and other domains that IAM protects
  • Defining specific security levels and access rights for systems, sensitive data, information, and places
  • Overseeing the IAM system’s insertion, deletion, and change of individuals
  • Overseeing the IAM system’s addition, deletion, and adjustment of access rights for roles

The following diagram depicts the flow between personal cloud-based applications and organizational services, be they public or private sector applications, that enable connectivity and interoperability between these services:

Figure 8.2 – Interoperability flow between cloud infrastructures

Figure 8.2 – Interoperability flow...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime