George Fletcher

@gffletch

Identity Architect ; OpenID Connect, OAuth2, UMA, OIDF; Nature Photographer (all opinions are my own and reflect only me; not my employer)

Virginia
Vrijeme pridruživanja: studeni 2007.

Tweetovi

Blokirali ste korisnika/cu @gffletch

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gffletch

  1. prije 13 sati
    Poništi
  2. 30. sij

    Selfish Plug: OpenID Foundation Community Board seat elections are open. I'd love your vote!

    Poništi
  3. 27. sij

    I'm super excited, honored and a little trepidatious to be included in this discussion on , and consumers with , and . Register here for this and many other great discussions ->

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Second Public Review Period for OpenID Connect Client Initiated Backchannel Authentication (CIBA) Core Specification Started

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    COSE and JOSE Registrations for WebAuthn Algorithms spec adding explanatory comments on design decisions

    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Ok can we get characters to represent protocols this year too? raising the bar!

    Poništi
  7. proslijedio/la je Tweet
    21. sij
    Poništi
  8. proslijedio/la je Tweet
    20. sij

    The OpenID Foundation membership has approved the following specification as an OpenID Implementer’s Draft: OpenID Connect Federation 1.0

    Poništi
  9. proslijedio/la je Tweet
    17. sij
    Poništi
  10. proslijedio/la je Tweet

    HOT OFF THE PRESS: We’ve just released Version 1.0 of the voluntary Framework! Check it out and consider adopting today.

    Poništi
  11. proslijedio/la je Tweet
    16. sij

    Controversey around is setting the stage for solutions. Join us at 2020 to dive deeper into data, identity, and privacy with , , , and . Register today!

    Poništi
  12. proslijedio/la je Tweet
    15. sij

    Join & for their talk "Surveillance Economy and Data Privacy" at 2020. 👉Use discount code SOVR2020 to get 10% off registration!

    Poništi
  13. proslijedio/la je Tweet
    15. sij

    OAuth 2.0 Token Exchange is now RFC 8693

    Poništi
  14. proslijedio/la je Tweet
    8. sij
    Poništi
  15. proslijedio/la je Tweet
    9. sij

    Looking for a simple way to beef up robustness and security of your OAuth implementation? Take a look at my article about the Pushed Authorization Requests (PAR) draft that was recently by the OAuth working group as WG document.

    Poništi
  16. proslijedio/la je Tweet
    10. sij

    "The digital economy, with recent inventions such as smart contracts, cannot meaningfully evolve into new areas without easy standard means of access to verified identities. This fundamental need inspired the new eKYC / Identity Assurance extension to OpenID Connect."

    Poništi
  17. 7. sij

    “D.N.A.,” he added, “is probably the only thing that’s harder to anonymize than precise geolocation information.” --

    Poništi
  18. proslijedio/la je Tweet
    6. sij

    Starting point of the eKYC and Identity Assurance WG is OpenID Connect for Identity Assurance 1.0. This specification provides important support for explicit attestation in a trust framework.

    Poništi
  19. proslijedio/la je Tweet
    6. sij

    I will be sharing our experiences over our first year of running our own "IDaaS" built on COTS, cloud, and containers at this years . Hope to see you there!

    Poništi
  20. proslijedio/la je Tweet
    2. sij

    Find out a bit more about our eKYC and Identity Assurance Working Group and also how you can become a member. First meeting will be 8th January - stick it in your diaries!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·