tag: authentication

Why blockchain is important tool for SSI (The self sovereign identity) system?

By Vishwas Anand on 2020-09-27

This blog can be considered as a follow-up blog (but not necessarily) of a series of blogs on digital identity. Digital Identity; Past, Present and Future: Where we talked about how digital identity evolved over a period of time and where it is heading to - the SSI. In depth introduction to Self Sovereign Identity (SSI): We took a deep dive into some of the core components of SSI to understand its terminologies and overall architecture.

#SSI #digital identity #DID #authentication #centralised #federated #blockchain #user-centric

Read more

Slack integration with HyperSign SSO using SAML 2.0

By Dev Gurung on 2020-06-15

In this blog, we are going to see how we can Integrate Slack(Service Provider) with HyperSign SSO(Password-less Identity provider) using a custom SAML 2.0 configuration. Before we see what exactly we need to do to integrate Slack with HyperSign SSO, let’s see what SAML2.O is all about. SAML2.0 Security Assertion Markup Language (SAML) is an open standard that allows identity providers (in this case its HyperSign) to pass authorization credentials to service providers (like Slack, office 365, salesforce, etc), and with that, using single Identity provider, a user can log in to multiple websites without having to maintain multiple credentials.

#SSO #authentication #SAML2.0 #Slack #HyperSign

Read more

In depth introduction to Self Sovereign Identity (SSI)

By Vishwas Anand , Likitha Soorea on 2020-06-14

In our previous blog titles - Digital Identity: Past, Present and Future, we went through the journey of digital identity and tried understanding how it evolved over the period and where it is heading. We ended our discussion with the basic introduction of Self Sovereign Identity (SSI) system. If you have not read that blog, I encourage you to read that first before proceeding with this blog. In this blog, we will take a deeper dive into SSI and will try understanding how it works under the hood.

#SSI #digital identity #DID #authentication #centralised #federated #user-centric

Read more

Digital Identity: Past; Present; Future

By Vishwas Anand , Likitha Soorea on 2020-04-19

Today, many countries across the globe are implementing digital identities to accelerate the adoption of their digital services. While going through the research articles on digital identities, one of the questions raised is “why is the digital industry looking up for it?”. We’d like to share some experiences on this journey, let’s start with a basic question “what is an identity?” take a moment to think… and try to put the thoughts into a clear definition.

#SSI #digital identity #DID #authentication #centralised #federated #user-centric

Read more

Trustless - The third vertical of credentials management

By Vishwas Anand on 2020-03-14

Identity management (IM) has always been a challenge for companies, whether it’s securing their internal employee’s access to company systems and applications, or securing their customers to access the web apps and databases. This aspect has two major components, Management of identity and Management by identity. Management of identity is primarily Authentication and Management by identity is Authorization. Traditionally, common methods of managing digital identities such as usernames and passwords have been proven to be less secure.

#trust #trustless #fido #authentication #passwordless #public-key-infrastructure #cryptography

Read more