114 |
ODRL in the AI era |
Joshua Cornejo |
|
|
113 |
Verifiable Credentials Update |
Ramesh Narayanan |
SasiKumar Ganesan |
|
112 |
Introduce ZSP to support Zero Trust inititatives |
Palak Chheda |
Anuj Sharma |
|
111 |
Lessons from Failure and a Path Forward |
Ankit Gupta |
Gustavo J Gallardo |
|
110 |
Is W3C's Credentials API the Future? |
Dr. Daniel Fett |
|
|
109 |
Federation Challenges of BlueSky and Mastadon |
Aaron Parecki |
|
|
108 |
The Many Faces of Delegated Authorization |
George Fletcher |
|
|
107 |
Intelligent Vehicle Experience |
Shashank Dhariwal |
Roland Baum |
|
106 |
On-Demand Access with TBAC + ServiceNow |
Vlad Shapiro |
|
|
105 |
Truth vs. Disinformation in the Age of Generative AI |
Harrison Tang |
Joe Andrieu |
|
104 |
PAM 101 |
Rainer Hörbe |
|
|
103 |
Passkey implementation != passkey adoption |
Vincent Delitz |
Andre Priebe |
|
102 |
Bringing Trust to Data with JWT‐Based Access |
Mike Schwartz |
Rajiv Rajani |
|
101 |
The Future of Education & Workforce Credentials |
Kerri Lemoie, PhD |
Dmitri Zagidulin |
|
100 |
Is TBAC the Next Big Thing? |
Eve Maler |
|
|
99 |
OpenID Provider Commands: New JWT Tokens for RP Acct Mgt |
Dick Hardt |
Karl McGuinness |
|
98 |
Eclipse Decentralized Claims Protocol |
Peter Koen |
Jim Marino |
|
97 |
Patterns and Anti-patterns in Privileged Access Management (PAM) |
Rainer Hörbe |
Martin Sandren |
|
96 |
iShare: Bringing Trust to Data with JWT-Based Access |
Rajiv Rajani |
|
|
95 |
Are JWTs bad for authz? |
Eli Nestorov |
|
|
94 |
The IPSIE Standard: A New Era of Policy Interoperability |
Travis Tripp |
Mark Maguire |
Dean Saxe |
93 |
Is TBAC the Future? Gluu, SGNL & Strata Weigh In |
Gerry Gebel |
Atul Tulshibagwale |
|
92 |
Tracking Identity Threats Before They Track You |
Mark Batchelor |
Amie Dsouza |
|
91 |
Powering Continuous Identity with OAuth and OpenID |
Sean O'Dell |
|
|
90 |
The Ecosystem Driving MOSIP’s Mission |
Ramesh Narayanan |
Sanjith Sundaram |
|
89 |
Detecting and Correcting API Drift |
Mayur Upadhyaya |
Jamie Beckland |
|
88 |
Rethink AuthZ: Immutable, Versionable Auth* Models & Trusted Delegation |
Nicola Gallo |
Antonio Radesca |
|
87 |
Why Identity Orchestration Matters? |
Eric Olden |
|
|
86 |
OpenID Verifiable Credential Update |
Kristina Yasuda |
Torsten Lodderstedt |
|
82 |
Achieving Standard DID Methods |
Daniel Buchner |
|
|
81 |
OAuth Status List and Attestation-Based Client Authentication |
Paul Bastian |
Christian Bormann |
|
80 |
The intersection of federated identity, web 3, and self sovereignty |
Nat Sakimura |
|
|
79 |
Authorization for the Modern Enterprise? |
Gal Helemski |
|
|
78 |
The 2025 NHI Cybersecurity Landscape |
Lalit Choda |
|
|
77 |
How Cedar Simplies Authz for Developers |
Dinesh Rajasekharan |
|
|
76 |
Why Identity Orchestration Matters? |
Eric Olden |
|
|
75 |
Trinsic's pivot from SSI to identity acceptance |
Mike Schwartz |
Riley Hughes |
|
74 |
Cedarling Launch |
Mike Schwartz |
Mike Neuenschwander |
|
73 |
The Future of AuthZ, from A to Z |
Rohit Khare |
Alex Olivier |
|
72 |
Intro to MOSIP for foundational national identity |
SasiKumar Ganesan |
Yodahe Zemichael |
|
71 |
Connect.id TBD |
Andrew Black |
Dima Postnikov |
|
70 |
Removing Cloud Providers From the Zero Trust Equation |
Fabian Kammel |
|
|
68 |
UN and OpenWallet Collaboration for Digital Public Infrastructure |
Daniel Goldscheider |
Venkatesen (Vijay) Mauree |
|
67 |
Unraveling the 6Ws of Identity Security with ObserveID |
Axay Desai |
Richard A Weeks |
|
66 |
Demystifying Non‐Human Identity Management |
Ryan Bradley |
Karl McGuinness |
|
65 |
Improving bank mobile security |
Anders Rundgren |
Michael Buckland |
|
64 |
Amazon's Cedar Open Source Strategy |
Ricardo Sueiras |
Julian Lovelock |
|
63 |
Beyond Whack‐a‐Mole: Future‐Proof Against Tomorrow's Threats |
Heather Vescent |
Eric Leach |
|
62 |
Reflecting on FIDO's evolution to passkeys |
Yuriy Ackermann |
[Jari Takkala |
|
59 |
Product Manager Strategies for Trust and Safety |
Dario Salice |
Jeroen Kemperman |
|
58 |
Corporate Wallets |
Alen Horvat |
Nuttawut Kongsuwan |
|
57 |
Latest developments in DIDs |
Markus Sabadello |
Drummond Reed |
|
56 |
How modern AuthZ will change banking |
Or Weis |
Dave Hyland |
|
55 |
Certificate Rotation: Why TLS is still a pain point |
Ben Burkert |
|
|
54 |
Jumping the Decentralized Identity S Curve |
Tina Srivastava |
Rew Islam |
|
53 |
ID Transformer Okta to Ping in 45 Days |
Steve Giovannetti |
|
|
52 |
Canada's 103‐1 Digital Trust and Identity |
Tim Bouma |
Bonnie Yau |
|
51 |
NIST Digital Identity Assurance Levels |
Kenneth Myers |
Tom Clancy |
|
50 |
Universal Online Identification |
Lisa LeVasseur |
Pernille Tranberg |
|
49 |
Latest News on EU Wallet Initiatives |
Annet Steenbergen |
Teemu Kääriäinen |
|
48 |
Apache Fortress ANSI RBAC with OpenLDAP |
Shawn McKinney |
Nate Klingenstein |
|
47 |
IAM asleep at the wheel |
Lasse Andresen |
Moushmi Banerjee |
|
46 |
Yes please to multi‐layer authz |
Omri Gazitt |
Nicholas Hunt |
|
45 |
Intro to the Cedarling |
Kevin Kampman |
|
|
44 |
Securing identity and context in microservices |
Atul Tulshibagwale |
|
|
43 |
Intersection of IAM |
Alexandre Sieira |
Marc Boorshtein |
|
42 |
Strata Identity Continuity |
Granville Schmidt |
Mark Callahan |
|
41 |
National ID Challenges |
Hosni Dubu |
Joni Brennan |
|
40 |
You got the JWT... now what |
Gabriel Manor - Liechtman |
Alexandre Babeanu |
|
39 |
Blockchain vs. The Right To Be Forgotten ‐ one Solution |
Jeffery Stollman |
Praveen Kumar Marupadige |
|
38 |
Immortal passwords versus vulnerable humans |
Lee Tschetter |
Gautam Dev |
|
37 |
The Rise of Browser Identity APIs |
Samuel Goto |
|
|
36 |
Deepfakes II: BioID's Combat Strategy |
Ann-Kathrin Freiberg |
Pavel Balashov |
|
35 |
The Next generation of Open Banking and Bank ID is beginning |
Darrell Geusz |
Adrian Doerk |
|
34 |
Fear not the rise of the machines, for we have standards |
Pieter Kasselman |
Evan Gilman |
|
33 |
Consent Is Dead: How Bad Is It Really |
Eve Maler |
Jean-François LOMBARDO |
|
32 |
No things in IGA: Considering non‐human account management |
André Koot |
Senthil Chandrasekaran |
|
31 |
The Three Wallet Problem |
Dan Robertson |
|
|
30 |
OpenFGA Deep Dive |
Andres Aguiar |
Damian Schenkelman |
|
29 |
Deploying passkeys for high‐security use cases |
Rolf Lindemann |
John Bradley |
|
28 |
Transparency Performance Schema for Regulators |
Salvatore (Sal) D'Agostino |
Mark (Smartopian) Lizar |
|
27 |
Holy Grail: A Physical and Logical Access Card |
Mike Baker |
Darren Wieder |
|
26 |
Shared Signals CAEP |
Shayne Miel |
Mike Kiser |
|
25 |
Empowering Authorization Through Data |
Eric Anderson |
(Dr) Rogério (Augusto) Rondini |
|
24 |
Enhancing User Experience in First Party Native Applications |
Rifaat Shekh-Yusef |
Godwin Amila |
|
23 |
EIC Debrief |
Sebastian Rohr |
Henk Marsman |
|
22 |
Debunking Misconceptions About Passkeys |
Tim Cappalli |
Matthew Miller |
|
21 |
Go Beyond With AI & Identity |
Mike Berthold |
Gautam Hazari |
|
20 |
Identity Governance for the Whole Enterprise |
Jim Montgomery |
Frank (Francisco) Wray |
|
19 |
Continuous Authorization |
Rohit Khare |
|
|
18 |
Best ROI for National ID |
Jacques von Benecke |
Armando J. Manzueta Peña |
Kalyan Kulkarni |
17 |
Agama Low Code Identity Orchestration |
Prabath Siriwardena |
Dhaval Desai |
|
16 |
Post Deep‐Fake: Can Identity Fraud Even Be Stopped Anymore? |
Ofer Friedman |
David Mahdi |
|
15 |
New in OAuth: First Party Native Authn and Global Token Revocation |
Aaron Parecki |
|
|
14 |
What's Unique About NFT's |
Stephen Wilson |
Otto Mora |
|
13 |
Big Tech Can't Solve Identity Crisis |
Rizel (Bobb-Semple) Scarlett |
Jeffrey Schwartz |
|
12 |
SSI beyond identities |
Alexandre Gomes |
Edgar Silva |
|
11 |
Rethinking the Rush to Policy as Code |
Paul Figura |
Patrick Parker |
|
10 |
Cerbos Deep Dive |
Brad Tumy |
Emre Baran |
|
9 |
Zero Standing Priviledge |
Ian Glazer |
Vladislav Shapiro |
|
8 |
"Digital Double" with Asanka, Mike and Phil |
Phil Windley |
Asanka Abeysinghe |
|
7 |
BlastRADIUS: Time to Upgrade |
Alan Dekok |
|
|
6 |
Live from IIW: Open ID 4 VP OpenID4VP over Browser API |
Kristina Yasuda |
Torsten Lodderstedt |
Joseph Heenan |
5 |
Best Practices for Client Authn |
Nat Sakimura |
|
|
4 |
Authz Renaissance: Why now |
David Brossard |
Gerry Gebel |
|
3 |
Token Exchange Discussion with Tyk, Gluu, and Curity |
Jacob Ideskog |
Ahmet Soormally |
|
2 |
Why the US needs a trust framework for privacy |
Ross Foard |
David Kelts |
|
1 |
Compare‐‐Contrast: India Aadhaar v. United States SSN |
Kaliya Young |
Matt Vogel |
|