Home - GluuFederation/identerati-office-hours GitHub Wiki

Welcome to the Identerati Office Hours Wiki!

Episodes

Episode Title Guest Co-Host
83 OpenID Verifiable Credential Update Kristina Yasuda Torsten Lodderstedt
82 Achieving Standard DID Methods Daniel Buchner
81 OAuth Status List and Attestation-Based Client Authentication Paul Bastian Christian Bormann
80 The intersection of federated identity, web 3, and self sovereignty Nat Sakimura
79 Authorization for the Modern Enterprise? Gal Helemski
78 The 2025 NHI Cybersecurity Landscape Lalit Choda
77 How Cedar Simplies Authz for Developers Dinesh Rajasekharan
76 Why Identity Orchestration Matters? Eric Olden
75 Trinsic's pivot from SSI to identity acceptance Mike Schwartz Riley Hughes
74 Cedarling Launch Mike Schwartz Mike Neuenschwander
73 The Future of AuthZ, from A to Z Rohit Khare Alex Olivier
72 Intro to MOSIP for foundational national identity SasiKumar Ganesan Yodahe Zemichael
71 Connect.id TBD Andrew Black Dima Postnikov
70 Removing Cloud Providers From the Zero Trust Equation Fabian Kammel
69 [THANKSGIVING]
68 UN and OpenWallet Collaboration for Digital Public Infrastructure Daniel Goldscheider Venkatesen (Vijay) Mauree
67 Unraveling the 6Ws of Identity Security with ObserveID Axay Desai Richard A Weeks
66 Demystifying Non‐Human Identity Management Ryan Bradley Karl McGuinness
65 Improving bank mobile security Anders Rundgren Michael Buckland
64 Amazon's Cedar Open Source Strategy Ricardo Sueiras Julian Lovelock
63 Beyond Whack‐a‐Mole: Future‐Proof Against Tomorrow's Threats Heather Vescent Eric Leach
62 Reflecting on FIDO's evolution to passkeys Yuriy Ackermann [Jari Takkala
59 Product Manager Strategies for Trust and Safety Dario Salice Jeroen Kemperman
58 Corporate Wallets Alen Horvat Nuttawut Kongsuwan
57 Latest developments in DIDs Markus Sabadello Drummond Reed
56 How modern AuthZ will change banking Or Weis Dave Hyland
55 Certificate Rotation: Why TLS is still a pain point Ben Burkert
54 Jumping the Decentralized Identity S Curve Tina Srivastava Rew Islam
53 ID Transformer Okta to Ping in 45 Days Steve Giovannetti
52 Canada's 103‐1 Digital Trust and Identity Tim Bouma Bonnie Yau
51 NIST Digital Identity Assurance Levels Kenneth Myers Tom Clancy
50 Universal Online Identification Lisa LeVasseur Pernille Tranberg
49 Latest News on EU Wallet Initiatives Annet Steenbergen Teemu Kääriäinen
48 Apache Fortress ANSI RBAC with OpenLDAP Shawn McKinney Nate Klingenstein
47 IAM asleep at the wheel Lasse Andresen Moushmi Banerjee
46 Yes please to multi‐layer authz Omri Gazitt Nicholas Hunt
45 Intro to the Cedarling Kevin Kampman
44 Securing identity and context in microservices Atul Tulshibagwale
43 Intersection of IAM Alexandre Sieira Marc Boorshtein
42 Strata Identity Continuity Granville Schmidt Mark Callahan
41 National ID Challenges Hosni Dubu Joni Brennan
40 You got the JWT... now what Gabriel Manor - Liechtman Alexandre Babeanu
39 Blockchain vs. The Right To Be Forgotten ‐ one Solution Jeffery Stollman Praveen Kumar Marupadige
38 Immortal passwords versus vulnerable humans Lee Tschetter Gautam Dev
37 The Rise of Browser Identity APIs Samuel Goto
36 Deepfakes II: BioID's Combat Strategy Ann-Kathrin Freiberg Pavel Balashov
35 The Next generation of Open Banking and Bank ID is beginning Darrell Geusz Adrian Doerk
34 Fear not the rise of the machines, for we have standards Pieter Kasselman Evan Gilman
33 Consent Is Dead: How Bad Is It Really Eve Maler Jean-François LOMBARDO
32 No things in IGA: Considering non‐human account management André Koot Senthil Chandrasekaran
31 The Three Wallet Problem Dan Robertson
30 OpenFGA Deep Dive Andres Aguiar Damian Schenkelman
29 Deploying passkeys for high‐security use cases Rolf Lindemann John Bradley
28 Transparency Performance Schema for Regulators Salvatore (Sal) D'Agostino Mark (Smartopian) Lizar
27 Holy Grail: A Physical and Logical Access Card Mike Baker Darren Wieder
26 Shared Signals CAEP Shayne Miel Mike Kiser
25 Empowering Authorization Through Data Eric Anderson (Dr) Rogério (Augusto) Rondini
24 Enhancing User Experience in First Party Native Applications Rifaat Shekh-Yusef Godwin Amila
23 EIC Debrief Sebastian Rohr Henk Marsman
22 Debunking Misconceptions About Passkeys Tim Cappalli Matthew Miller
21 Go Beyond With AI & Identity Mike Berthold Gautam Hazari
20 Identity Governance for the Whole Enterprise Jim Montgomery Frank (Francisco) Wray
19 Continuous Authorization Rohit Khare
18 Best ROI for National ID Jacques von Benecke Armando J. Manzueta Peña
17 Agama Low Code Identity Orchestration Prabath Siriwardena Dhaval Desai
16 Post Deep‐Fake: Can Identity Fraud Even Be Stopped Anymore? Ofer Friedman David Mahdi
15 New in OAuth: First Party Native Authn and Global Token Revocation Aaron Parecki
14 What's Unique About NFT's Stephen Wilson Otto Mora
13 Big Tech Can't Solve Identity Crisis Rizel (Bobb-Semple) Scarlett Jeffrey Schwartz
12 SSI beyond identities Alexandre Gomes Edgar Silva
11 Rethinking the Rush to Policy as Code Paul Figura Patrick Parker
10 Cerbos Deep Dive Brad Tumy Emre Baran
9 Zero Standing Priviledge Ian Glazer Vladislav Shapiro
8 "Digital Double" with Asanka, Mike and Phil Phil Windley Asanka Abeysinghe
7 BlastRADIUS: Time to Upgrade Alan Dekok
6 Live from IIW: Open ID 4 VP OpenID4VP over Browser API Kristina Yasuda Torsten Lodderstedt
5 Best Practices for Client Authn Nat Sakimura
4 Authz Renaissance: Why now David Brossard Gerry Gebel
3 Token Exchange Discussion with Tyk, Gluu, and Curity Jacob Ideskog Ahmet Soormally
2 Why the US needs a trust framework for privacy Ross Foard David Kelts
1 Compare‐‐Contrast: India Aadhaar v. United States SSN Kaliya Young Matt Vogel