| 160 |
IDM / PAM -- TBD ??? |
.](.) |
|
|
| 159 |
IDM / PAM -- TBD ??? |
Shashwat Sehgal |
|
|
| 158 |
What Is Declarative IGA? |
Brian Iverson |
Manoj Kumar |
|
| 157 |
Third Party Risk Mgt (TPRM) needs an intervention |
Kamal Govindaswamy |
|
|
| 156 |
OPA - SpiceDB Connector |
Roland Baum |
|
|
| 155 |
Applying Governance to Digital Trust |
Scott Perry |
|
|
| 154 |
Twilio Acquires Stytch: The Future of Agent-Ready Identity |
Reed McGinley-Stempel |
|
|
| 153 |
AI Agents and the Layers of Trust: From Confusion to Decentralized Machine Identity |
Nicola Gallo |
|
|
| 152 |
Citizen Identity: Lessons from Social Security |
Leland Dudek |
|
|
| 151 |
Dashlane: Stronger Logins with FIDO2 Security Keys |
Rew Islam |
|
|
| 150 |
Agentic Access: OAuth Gets You In, Zero Trust Keeps You Safe |
Nick Taylor |
|
|
| 149.5 |
OAuth Client ID Metadata Document |
Aaron Parecki |
|
|
| 149 |
The C-Suite Guide to IAM Advisory |
Pawan Nallan Chakravartula |
|
|
| 148.5 |
Governing risk in the AI Era |
Rohit Khare |
Andor Kesselman |
|
| 148 |
Yes, we need an identity data lake |
Nicholas Bowerman |
|
|
| 147 |
Dynamic Security Orchestration |
Darran Rolls |
|
|
| 146 |
Top 5 Reasons To Use Cedar |
Emina Torlak |
|
|
| 145 |
Breaking Identity With AI Agents |
Arnaud Lacour |
Richard Bird |
|
| 144 |
SpiceDB: Lessons learned from the first 5 years |
Jake Moshenko |
|
|
| 143 |
Unlocking Continuous Zero Trust Authorization with Cedar |
Justin McCarthy |
|
|
| 142 |
IGA: From automation to intelligence |
Manoj Kumar |
|
|
| 141 |
OBO OAuth |
Thilina Senarath |
Ayesha Dissanayaka |
|
| 140 |
Digital identity, sovereignty, and the erosion of foundational principles |
Christopher Allen |
|
|
| 139 |
The role of an Event Hub in the modern enterprise IAM stack |
Sean O'Dell |
|
|
| 138 |
Re/Lock |
Prem Cherklevich |
|
|
| 137 |
iOPA: Styra Gets a Genius Bar Makeover |
Or Weis |
|
|
| 136 |
10 Years of Identiverse |
Andi Hindle |
|
|
| 135 |
Cedar Analysis Toolkit |
Spencer Erickson |
Liana Hadarean |
|
| 134 |
OIDC-A: Securing AI Agent Identity |
Subramanya Nagabhushanaradhya |
Tobin South |
|
| 133 |
Governing the Agentic Web |
Andor Kesselman |
|
|
| 132 |
Feitian KeyMS: Security Key Mgt Platform |
Ben Brieger |
Johnathan Phung |
|
| 131 |
What is the Janssen Project? |
Dhaval Desai |
|
|
| 130 |
PAM 101 |
Rainer Hörbe |
|
|
| 129 |
Function-Based Access Control? |
Kevin Kampman |
|
|
| 128 |
Youth-Powered Solutions for Africa’s Digital ID Future |
Elizabeth Garber |
Andrew Amstrong Musoke |
|
| 127 |
What is The First Person Network? |
Drummond Reed |
|
|
| 126 |
Personas: The Next Security+UX Control We Need for Identity? |
Eve Maler |
Jacob Ideji |
|
| 125 |
Is W3C's Credentials API the Future? |
Daniel Fett |
|
|
| 123 |
Outsiders Within: Managing Access in the Extended Enterprise |
Tuhin Banerjee |
Michael Freeman |
|
| 122 |
Cedar v. Rego v. OpenFGA |
Neha Rungta |
Rohit Khare |
|
| 120 |
Adapting Identity Infrastructure to Manage AI Agent Identities |
Stan Bounev |
|
|
| 118 |
IAM at 2035: A Future Guide to Identity Security |
Simon Moffat |
|
|
| 117 |
Agent Name Service (ANS) Protocol |
Ken Huang |
|
|
| 116 |
Replays Rejected: Fortifying Microservices Against Stolen Tokens |
Mert Coskuner |
Naveen CM |
|
| 115 |
The Next Big Challenge of AI Agents – Access and Authentication |
Paresh Bhaya |
Yuriy Ackermann |
|
| 114 |
ODRL in the AI era |
Joshua Cornejo |
|
|
| 113 |
Verifiable Credentials Update |
Ramesh Narayanan |
SasiKumar Ganesan |
|
| 112 |
Introduce ZSP to support Zero Trust inititatives |
Palak Chheda |
Anuj Sharma |
|
| 111 |
Lessons from Failure and a Path Forward |
Ankit Gupta |
Gustavo J Gallardo |
|
| 110 |
Is W3C's Credentials API the Future? |
Dr. Daniel Fett |
|
|
| 109 |
Federation Challenges of BlueSky and Mastadon |
Aaron Parecki |
|
|
| 108 |
The Many Faces of Delegated Authorization |
George Fletcher |
|
|
| 107 |
Intelligent Vehicle Experience |
Shashank Dhariwal |
Roland Baum |
|
| 106 |
On-Demand Access with TBAC + ServiceNow |
Vlad Shapiro |
|
|
| 105 |
Truth vs. Disinformation in the Age of Generative AI |
Harrison Tang |
Joe Andrieu |
|
| 104 |
PAM 101 |
Rainer Hörbe |
|
|
| 103 |
Passkey implementation != passkey adoption |
Vincent Delitz |
Andre Priebe |
|
| 102 |
Bringing Trust to Data with JWT‐Based Access |
Mike Schwartz |
Rajiv Rajani |
|
| 101 |
The Future of Education & Workforce Credentials |
Kerri Lemoie, PhD |
Dmitri Zagidulin |
|
| 100 |
Is TBAC the Next Big Thing? |
Eve Maler |
|
|
| 99 |
OpenID Provider Commands: New JWT Tokens for RP Acct Mgt |
Dick Hardt |
Karl McGuinness |
|
| 98 |
Eclipse Decentralized Claims Protocol |
Peter Koen |
Jim Marino |
|
| 97 |
Patterns and Anti-patterns in Privileged Access Management (PAM) |
Rainer Hörbe |
Martin Sandren |
|
| 96 |
iShare: Bringing Trust to Data with JWT-Based Access |
Rajiv Rajani |
|
|
| 95 |
Are JWTs bad for authz? |
Travis Tripp |
Eli Nestorov |
|
| 94 |
The IPSIE Standard: A New Era of Policy Interoperability |
Travis Tripp |
Mark Maguire |
Dean Saxe |
| 93 |
Is TBAC the Future? Gluu, SGNL & Strata Weigh In |
Gerry Gebel |
Atul Tulshibagwale |
|
| 92 |
Tracking Identity Threats Before They Track You |
Mark Batchelor |
Amie Dsouza |
|
| 91 |
Powering Continuous Identity with OAuth and OpenID |
Sean O'Dell |
|
|
| 90 |
The Ecosystem Driving MOSIP’s Mission |
Ramesh Narayanan |
Sanjith Sundaram |
|
| 89 |
Detecting and Correcting API Drift |
Mayur Upadhyaya |
Jamie Beckland |
|
| 88 |
Rethink AuthZ: Immutable, Versionable Auth* Models & Trusted Delegation |
Nicola Gallo |
Antonio Radesca |
|
| 87 |
Why Identity Orchestration Matters? |
Eric Olden |
|
|
| 86 |
OpenID Verifiable Credential Update |
Kristina Yasuda |
Torsten Lodderstedt |
|
| 82 |
Achieving Standard DID Methods |
Daniel Buchner |
|
|
| 81 |
OAuth Status List and Attestation-Based Client Authentication |
Paul Bastian |
Christian Bormann |
|
| 80 |
The intersection of federated identity, web 3, and self sovereignty |
Nat Sakimura |
|
|
| 79 |
Authorization for the Modern Enterprise? |
Gal Helemski |
|
|
| 78 |
The 2025 NHI Cybersecurity Landscape |
Lalit Choda |
|
|
| 77 |
How Cedar Simplies Authz for Developers |
Dinesh Rajasekharan |
|
|
| 76 |
Why Identity Orchestration Matters? |
Eric Olden |
|
|
| 75 |
Trinsic's pivot from SSI to identity acceptance |
Mike Schwartz |
Riley Hughes |
|
| 74 |
Cedarling Launch |
Mike Schwartz |
Mike Neuenschwander |
|
| 73 |
The Future of AuthZ, from A to Z |
Rohit Khare |
Alex Olivier |
|
| 72 |
Intro to MOSIP for foundational national identity |
SasiKumar Ganesan |
Yodahe Zemichael |
|
| 71 |
Connect.id TBD |
Andrew Black |
Dima Postnikov |
|
| 70 |
Removing Cloud Providers From the Zero Trust Equation |
Fabian Kammel |
|
|
| 68 |
UN and OpenWallet Collaboration for Digital Public Infrastructure |
Daniel Goldscheider |
Venkatesen (Vijay) Mauree |
|
| 67 |
Unraveling the 6Ws of Identity Security with ObserveID |
Axay Desai |
Richard A Weeks |
|
| 66 |
Demystifying Non‐Human Identity Management |
Ryan Bradley |
Karl McGuinness |
|
| 65 |
Improving bank mobile security |
Anders Rundgren |
Michael Buckland |
|
| 64 |
Amazon's Cedar Open Source Strategy |
Ricardo Sueiras |
Julian Lovelock |
|
| 63 |
Beyond Whack‐a‐Mole: Future‐Proof Against Tomorrow's Threats |
Heather Vescent |
Eric Leach |
|
| 62 |
Reflecting on FIDO's evolution to passkeys |
Yuriy Ackermann |
[Jari Takkala |
|
| 59 |
Product Manager Strategies for Trust and Safety |
Dario Salice |
Jeroen Kemperman |
|
| 58 |
Corporate Wallets |
Alen Horvat |
Nuttawut Kongsuwan |
|
| 57 |
Latest developments in DIDs |
Markus Sabadello |
Drummond Reed |
|
| 56 |
How modern AuthZ will change banking |
Or Weis |
Dave Hyland |
|
| 55 |
Certificate Rotation: Why TLS is still a pain point |
Ben Burkert |
|
|
| 54 |
Jumping the Decentralized Identity S Curve |
Tina Srivastava |
Rew Islam |
|
| 53 |
ID Transformer Okta to Ping in 45 Days |
Steve Giovannetti |
|
|
| 52 |
Canada's 103‐1 Digital Trust and Identity |
Tim Bouma |
Bonnie Yau |
|
| 51 |
NIST Digital Identity Assurance Levels |
Kenneth Myers |
Tom Clancy |
|
| 50 |
Universal Online Identification |
Lisa LeVasseur |
Pernille Tranberg |
|
| 49 |
Latest News on EU Wallet Initiatives |
Annet Steenbergen |
Teemu Kääriäinen |
|
| 48 |
Apache Fortress ANSI RBAC with OpenLDAP |
Shawn McKinney |
Nate Klingenstein |
|
| 47 |
IAM asleep at the wheel |
Lasse Andresen |
Moushmi Banerjee |
|
| 46 |
Yes please to multi‐layer authz |
Omri Gazitt |
Nicholas Hunt |
|
| 45 |
Intro to the Cedarling |
Kevin Kampman |
|
|
| 44 |
Securing identity and context in microservices |
Atul Tulshibagwale |
|
|
| 43 |
Intersection of IAM |
Alexandre Sieira |
Marc Boorshtein |
|
| 42 |
Strata Identity Continuity |
Granville Schmidt |
Mark Callahan |
|
| 41 |
National ID Challenges |
Hosni Dubu |
Joni Brennan |
|
| 40 |
You got the JWT... now what |
Gabriel Manor - Liechtman |
Alexandre Babeanu |
|
| 39 |
Blockchain vs. The Right To Be Forgotten ‐ one Solution |
Jeffery Stollman |
Praveen Kumar Marupadige |
|
| 38 |
Immortal passwords versus vulnerable humans |
Lee Tschetter |
Gautam Dev |
|
| 37 |
The Rise of Browser Identity APIs |
Samuel Goto |
|
|
| 36 |
Deepfakes II: BioID's Combat Strategy |
Ann-Kathrin Freiberg |
Pavel Balashov |
|
| 35 |
The Next generation of Open Banking and Bank ID is beginning |
Darrell Geusz |
Adrian Doerk |
|
| 34 |
Fear not the rise of the machines, for we have standards |
Pieter Kasselman |
Evan Gilman |
|
| 33 |
Consent Is Dead: How Bad Is It Really |
Eve Maler |
Jean-François LOMBARDO |
|
| 32 |
No things in IGA: Considering non‐human account management |
André Koot |
Senthil Chandrasekaran |
|
| 31 |
The Three Wallet Problem |
Dan Robertson |
|
|
| 30 |
OpenFGA Deep Dive |
Andres Aguiar |
Damian Schenkelman |
|
| 29 |
Deploying passkeys for high‐security use cases |
Rolf Lindemann |
John Bradley |
|
| 28 |
Transparency Performance Schema for Regulators |
Salvatore (Sal) D'Agostino |
Mark (Smartopian) Lizar |
|
| 27 |
Holy Grail: A Physical and Logical Access Card |
Mike Baker |
Darren Wieder |
|
| 26 |
Shared Signals CAEP |
Shayne Miel |
Mike Kiser |
|
| 25 |
Empowering Authorization Through Data |
Eric Anderson |
(Dr) Rogério (Augusto) Rondini |
|
| 24 |
Enhancing User Experience in First Party Native Applications |
Rifaat Shekh-Yusef |
Godwin Amila |
|
| 23 |
EIC Debrief |
Sebastian Rohr |
Henk Marsman |
|
| 22 |
Debunking Misconceptions About Passkeys |
Tim Cappalli |
Matthew Miller |
|
| 21 |
Go Beyond With AI & Identity |
Mike Berthold |
Gautam Hazari |
|
| 20 |
Identity Governance for the Whole Enterprise |
Jim Montgomery |
Frank (Francisco) Wray |
|
| 19 |
Continuous Authorization |
Rohit Khare |
|
|
| 18 |
Best ROI for National ID |
Jacques von Benecke |
Armando J. Manzueta Peña |
Kalyan Kulkarni |
| 17 |
Agama Low Code Identity Orchestration |
Prabath Siriwardena |
Dhaval Desai |
|
| 16 |
Post Deep‐Fake: Can Identity Fraud Even Be Stopped Anymore? |
Ofer Friedman |
David Mahdi |
|
| 15 |
New in OAuth: First Party Native Authn and Global Token Revocation |
Aaron Parecki |
|
|
| 14 |
What's Unique About NFT's |
Stephen Wilson |
Otto Mora |
|
| 13 |
Big Tech Can't Solve Identity Crisis |
Rizel (Bobb-Semple) Scarlett |
Jeffrey Schwartz |
|
| 12 |
SSI beyond identities |
Alexandre Gomes |
Edgar Silva |
|
| 11 |
Rethinking the Rush to Policy as Code |
Paul Figura |
Patrick Parker |
|
| 10 |
Cerbos Deep Dive |
Brad Tumy |
Emre Baran |
|
| 9 |
Zero Standing Priviledge |
Ian Glazer |
Vladislav Shapiro |
|
| 8 |
"Digital Double" with Asanka, Mike and Phil |
Phil Windley |
Asanka Abeysinghe |
|
| 7 |
BlastRADIUS: Time to Upgrade |
Alan Dekok |
|
|
| 6 |
Live from IIW: Open ID 4 VP OpenID4VP over Browser API |
Kristina Yasuda |
Torsten Lodderstedt |
Joseph Heenan |
| 5 |
Best Practices for Client Authn |
Nat Sakimura |
|
|
| 4 |
Authz Renaissance: Why now |
David Brossard |
Gerry Gebel |
|
| 3 |
Token Exchange Discussion with Tyk, Gluu, and Curity |
Jacob Ideskog |
Ahmet Soormally |
|
| 2 |
Why the US needs a trust framework for privacy |
Ross Foard |
David Kelts |
|
| 1 |
Compare‐‐Contrast: India Aadhaar v. United States SSN |
Kaliya Young |
Matt Vogel |
|