Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Decentralized Identity Explained

You're reading from   Decentralized Identity Explained Embrace decentralization for a more secure and empowering digital experience

Arrow left icon
Product type Paperback
Published in Jul 2024
Publisher Packt
ISBN-13 9781804617632
Length 392 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Rohan Pinto Rohan Pinto
Author Profile Icon Rohan Pinto
Rohan Pinto
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Part 1 - Digital Identity Era: Then
2. Chapter 1: The History of Digital Identity FREE CHAPTER 3. Chapter 2: Identity Management Versus Access Management 4. Part 2 - Digital Identity Era: Now
5. Chapter 3: IAM Best Practices 6. Chapter 4: Trust Anchors/Sources of Truth and Their Importance 7. Chapter 5: Historical Source of Authority 8. Chapter 6: The Relationship between Trust and Risk 9. Chapter 7: Informed Consent and Why It Matters 10. Chapter 8: IAM – the Security Perspective 11. Part 3 - Digital Identity Era: The Near Future
12. Chapter 9: Self-Sovereign Identity 13. Chapter 10: Privacy by Design in the SSI Space 14. Chapter 11: Relationship between DIDs and SSI 15. Chapter 12: Protocols and Standards – DID Standards 16. Chapter 13: DID Authentication 17. Chapter 14: Identity Verification 18. Part 4 - Digital Identity Era: A Probabilistic Future
19. Chapter 15: Biometrics Security in Distributed Identity Management 20. Index 21. Other Books You May Enjoy

What is identity management?

Everyone has a sense of self. In this digital age, our identities take the shape of database records and qualities. The tendency for online businesses is to collect these qualities to better serve us or to create a unique user experience based on the data that’s obtained about our dynamic and static attributes.

A unique feature distinguishes us from other types of web users. An email address, social security number, or phone number may be used as this property. We obtain these characteristics from our employers in the form of jobs or titles, the business division to which we belong, the responsibilities that we do in projects, or the tier to which we belong in the organizational structure. Attributes associated with our personal and professional lives fluctuate and alter throughout time when we go through life changes such as changing jobs, getting married, and so on.

The following diagram depicts the critical components of an identity management...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime