Identity federation and strong authentication

92
Identity Federation and Strong Authentication Justin Richer October 7, 2015 [email protected]

Transcript of Identity federation and strong authentication

Page 1: Identity federation and strong authentication

Identity Federation and Strong Authentication

Justin RicherOctober 7, [email protected]

Page 2: Identity federation and strong authentication
Page 3: Identity federation and strong authentication

Hej!

Page 4: Identity federation and strong authentication

Skål!

Page 5: Identity federation and strong authentication
Page 6: Identity federation and strong authentication

Who am I?

Page 7: Identity federation and strong authentication
Page 8: Identity federation and strong authentication
Page 9: Identity federation and strong authentication
Page 10: Identity federation and strong authentication

http://bit.do/oauthbook

*See me for a discount code!

Page 11: Identity federation and strong authentication

Identity

Page 12: Identity federation and strong authentication

Digital Identity

Page 13: Identity federation and strong authentication
Page 14: Identity federation and strong authentication

Who are you?

Page 15: Identity federation and strong authentication
Page 16: Identity federation and strong authentication
Page 17: Identity federation and strong authentication
Page 18: Identity federation and strong authentication
Page 19: Identity federation and strong authentication
Page 20: Identity federation and strong authentication
Page 21: Identity federation and strong authentication
Page 22: Identity federation and strong authentication
Page 23: Identity federation and strong authentication
Page 24: Identity federation and strong authentication
Page 25: Identity federation and strong authentication
Page 26: Identity federation and strong authentication
Page 27: Identity federation and strong authentication

Let’s make this better

Page 28: Identity federation and strong authentication

http://yubi.co/1g

Page 29: Identity federation and strong authentication

Approach 1:Change who you ask

Page 30: Identity federation and strong authentication
Page 31: Identity federation and strong authentication
Page 32: Identity federation and strong authentication
Page 33: Identity federation and strong authentication

Federated Digital Identity

Page 34: Identity federation and strong authentication
Page 35: Identity federation and strong authentication
Page 36: Identity federation and strong authentication
Page 37: Identity federation and strong authentication
Page 38: Identity federation and strong authentication
Page 39: Identity federation and strong authentication
Page 40: Identity federation and strong authentication
Page 41: Identity federation and strong authentication

Modularity

Page 42: Identity federation and strong authentication
Page 43: Identity federation and strong authentication
Page 44: Identity federation and strong authentication
Page 45: Identity federation and strong authentication
Page 46: Identity federation and strong authentication
Page 47: Identity federation and strong authentication
Page 48: Identity federation and strong authentication
Page 49: Identity federation and strong authentication
Page 50: Identity federation and strong authentication

Features and/or Bugs

Page 51: Identity federation and strong authentication
Page 52: Identity federation and strong authentication
Page 53: Identity federation and strong authentication
Page 54: Identity federation and strong authentication
Page 55: Identity federation and strong authentication
Page 56: Identity federation and strong authentication
Page 57: Identity federation and strong authentication
Page 58: Identity federation and strong authentication

http://bit.do/oauthbook

*See me for a discount code!

Page 59: Identity federation and strong authentication

Approach 2:Change what you ask

Page 60: Identity federation and strong authentication
Page 61: Identity federation and strong authentication
Page 62: Identity federation and strong authentication
Page 63: Identity federation and strong authentication

Strong Authentication

Page 64: Identity federation and strong authentication
Page 65: Identity federation and strong authentication
Page 66: Identity federation and strong authentication
Page 67: Identity federation and strong authentication
Page 68: Identity federation and strong authentication
Page 69: Identity federation and strong authentication
Page 70: Identity federation and strong authentication
Page 71: Identity federation and strong authentication
Page 72: Identity federation and strong authentication
Page 73: Identity federation and strong authentication

Features and/or Bugs

Page 74: Identity federation and strong authentication
Page 75: Identity federation and strong authentication
Page 76: Identity federation and strong authentication
Page 77: Identity federation and strong authentication
Page 78: Identity federation and strong authentication
Page 79: Identity federation and strong authentication

Putting it All Together

Page 80: Identity federation and strong authentication

Approach 3:Serial Authentication

Page 81: Identity federation and strong authentication
Page 82: Identity federation and strong authentication
Page 83: Identity federation and strong authentication
Page 84: Identity federation and strong authentication
Page 85: Identity federation and strong authentication

Approach 4:Parallel Authentication

Page 86: Identity federation and strong authentication
Page 87: Identity federation and strong authentication
Page 88: Identity federation and strong authentication
Page 89: Identity federation and strong authentication

In Conclusion

Page 90: Identity federation and strong authentication

+

Page 91: Identity federation and strong authentication

Mange tak!