Book description
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them.
By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn how to more effectively leverage identity across their businesses.
This book helps you:
- Learn why functional online identity is still a difficult problem for most companies
- Understand the purpose of digital identity and why it's fundamental to your business strategy
- Learn why "rolling your own" digital identity infrastructure is a bad idea
- Differentiate between core ideas such as authentication and authorization
- Explore the properties of centralized, federated, and decentralized identity systems
- Determine the right authorization methods for your specific application
- Understand core concepts such as trust, risk, security, and privacy
- Learn how digital identity and self-sovereign identity can make a difference for you and your organization
Publisher resources
Table of contents
- Foreword
- Preface
- 1. The Nature of Identity
- 2. Defining Digital Identity
- 3. The Problems of Digital Identity
- 4. The Laws of Digital Identity
- 5. Relationships and Identity
- 6. The Digital Relationship Lifecycle
- 7. Trust, Confidence, and Risk
-
8. Privacy
- What Is Privacy?
- Correlation
- Privacy, Authenticity, and Confidentiality
- Functional Privacy
-
Privacy by Design
- Principle 1: Proactive Not Reactive; Preventive Not Remedial
- Principle 2: Privacy as the Default Setting
- Principle 3: Privacy Embedded into Design
- Principle 4: Full Functionality—Positive-Sum, Not Zero-Sum
- Principle 5: End-to-End Security—Full Lifecycle Protection
- Principle 6: Visibility and Transparency—Keep It Open
- Principle 7: Respect for User Privacy—Keep It User-Centric
- Privacy Regulations
- The Time Value and Time Cost of Privacy
- Surveillance Capitalism and Web 2.0
- Privacy and Laws of Identity
- 9. Integrity, Nonrepudiation, and Confidentiality
- 10. Names, Identifiers, and Discovery
- 11. Authentication and Relationship Integrity
- 12. Access Control and Relationship Utility
- 13. Federated Identity—Leveraging Strong Relationships
- 14. Cryptographic Identifiers
- 15. Verifiable Credentials
- 16. Digital Identity Architectures
- 17. Authentic Digital Relationships
- 18. Identity Wallets and Agents
- 19. Smart Identity Agents
- 20. Identity on the Internet of Things
- 21. Identity Policies
- 22. Governing Identity Ecosystems
- 23. Generative Identity
- Index
- About the Author
Product information
- Title: Learning Digital Identity
- Author(s):
- Release date: January 2023
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098117696
You might also like
book
Solutions Architect's Handbook
From fundamentals and design patterns to the different strategies for creating secure and reliable architectures in …
book
Solutions Architect's Handbook - Second Edition
Third edition out now with coverage on Generative AI, clean architecture, edge computing, and more Key …
book
The Pragmatic Programmer: your journey to mastery, 20th Anniversary Edition, 2nd Edition
"One of the most significant books in my life." —Obie Fernandez, Author, The Rails Way "Twenty …
book
Learning Go, 2nd Edition
Go has rapidly become the preferred language for building web services. Plenty of tutorials are available …