Identity Management: a first principle idea.
Rick discusses this history of identity management up to the current state.
Resources:
- “A Brief History of Digital Identity,” by Block Systems.
- "AN H-ISAC FRAMEWORK FOR CISOsTO MANAGE IDENTITY,” H-ISAC, April 2020.
- “An Introduction to Identity Management,” By John K Waters, CSO, 15 October 2007.
- “Computer password inventor Fernando Corbato dies at 93,” by Jon Fingas, engadget, 13 July 2019.
- “Digital Identity Guidelines: NIST Special Publication 800-63-3,” by Paul Grassi, Michael Garcia, and James Fenton, National Institute of Standards and Technology (NIST), June 2017.
- “Fernando Corbató: American physicist and computer scientist,” by William Hosch, Encyclopædia Britannica, 8 July 2020.
- “History of Identity Management Infographic,” by IdRamp.
- “History of LDAP,” by ldapwiki.com.
- “History of SAML,” by saml.xml.org, 2015.
- “Identity 2.0 Keynote,” by Dick Hardt, Youtube, 8 February 2006.
- "IDENTITY FOR THE CISO NOT YET PAYING ATTENTION TO IDENTITY,” H-ISAC.
- “Kerberos and Windows Security: History,” by Robert Broeckelmann, Medium, 16 May 2018.
- “LDAP and Kerberos, So Happy Together,” By Juliet Kemp, ServerWatch, 12 January 2009.
- “The Difference Between LDAP and SAML SSO,” by Zach DeMeyer, JumpCloud, 3 April 2019.
- “The Evolution Of IAM (Identity Access Management,)” by SolutionsReview, Youtube, 3 September 2019.
- “The Laws of Identity,” by Kim Cameron, Architect of Identity, Microsoft Corporation, 11 May 2005.
- “SAML2 vs JWT: Understanding OAuth2,” by Robert Broeckelmann, Medium, 23 January 2017.
- “SAML2 vs JWT: Understanding OpenID Connect Part 1,” by Robert Broeckelmann, Medium, 25 March 2017.
- “What is IAM? Identity and access management explained,” by James Martin and John Waters, CSO, 9 October 2018.
- “What is Identity and Access Management and Why is it a Vital IT Security Layer?” by Matt Miller, BeyondTrust, 29 November 2018.
- “What is IAM? Identity and access management explained,” by James Martin and John Waters, CSO, 9 October 2018.
- “What is Identity and Access Management and Why is it a Vital IT Security Layer?” by Matt Miller, BeyondTrust, 29 November 2018.
- “What is OAuth2?” by Tech Primers, 30 June 2017.
- “What is OAuth? How the open authorization framework works,” By Roger A. Grimes and Josh Fruhlinger, CSO, 20 September 2019.
- “What is OAuth really all about - OAuth tutorial,” by Java Brains, 23 November 2019.