asteroza + identity   142

Trying to improve LDAP, preferably not AD where CN is the keying. Founded by a ex-MS guy who hated being one of 5 guys with the exact same name at MS?
office365  profile  identity  management  addon  AD  active  directory  windows  LDAP 
january 2019 by asteroza
ID4me – One ID for everything, everywhere
Dovecot makers are planning to extend IMAP to realtime chat, but need a federated ID backend using domain names. Looks like they will implement this through PowerDNS and this spec/group
ID4me  federated  ID  authentication  identity  backend  standard  specification  realtime  chat  IM  IMAP  dovecot  PowerDNS 
march 2018 by asteroza
A specification and reference implementation of a framework for secure distributed identity provisioning. Intended for short lived certs between microservices for mutual TLS authentication, but should be usable for other identity scenarios...
microservice  identity  framework  security  software  PKI  certificate  authentication  TLS  short  lived 
october 2017 by asteroza
Special Publication 800-63 | NIST
64 character passwords without required specials, no forced rotation without evidence of compromise, no SMS 2FA, password paste OK
NIST  800-63  digital  identity  service  requirements  password  policy  guidance  information  reference  security 
june 2017 by asteroza
How to use BeyondCorp to ditch your VPN, improve security and go to the cloud
The BeyondCorp security engineering team at Google just announced their fourth research paper.
google  BeyondCorp  deperimeterization  perimeterless  VPN  security  platform  cloud  IAP  identity  aware  proxy 
june 2017 by asteroza
Annual Credit - Home Page
You can get one free web report from the big three credit report agencies here
US  personal  credit  report  service  free  finance  money  tools  security  identity  theft  check  information 
may 2014 by asteroza
Using a blockchain concept to get over the PGP key directory server hump.
security  blockchain  keychain  identity  authentication  key  PKI  directory  cryptography  PGP  SSH  GPG  Delicious 
april 2014 by asteroza
SecureKey: Building Trusted Identity Networks
Apparently these guys have a deal with the USPS, to setup a cloud federated identity platform, so you can use bank website logins (or other identity providers deemed secure) to logon/verify identity with US federal websites. Sorta Fed OpenID?
cloud  identity  management  authentication  service  government  ID  password  security  federated  provider  USA  portal  Delicious 
january 2014 by asteroza
EVRYTHNG - Every Thing Connected
This startup is trying to step up the "internet-of-things" b2c/c2c/m2c/c2m/m2m concept. Evolving it more into a "Facebook-of-things" platform where items/products have active digital identities using something like UPC/UUID/MAC addresses. Which leads to an evolution of CRM to product relationship management (PRM?). The end game is to be like Versign for SSL certs, in the space of web identity management of connected objects.
management  relationship  product  identity  digital  web-of-things  platform  m2m  internet-of-things  Delicious 
october 2012 by asteroza
Glynx Private Room
Interesting, but not open source kinda kills it...
persona  communication  realtime  directory  p2p  2.0  identity  Glynx  Delicious 
april 2012 by asteroza
東京新聞:共通番号、15年1月に利用開始 政府、法案概要を決定:政治(TOKYO Web)
Japanese government is going to attempt a national number register for all citizens, and eventually force all interaction using this number, such as national pensions, national health care, and disaster relief. Naturally, such central consolidated information will allow the national government to keep tabs on anyone easily, rather than disappearing into the current prefectual and municipal systems. Since Jukinet went so well the first time around...
jukinet  identity  monitoring  government  ID  registry  number  citizen  national  japan  Delicious 
december 2011 by asteroza
TagMeNot privacy: no face recognition, don't tag, blur my face.
Needs some critical mass of users to get the necessary uptake, but conceptually this isn't a bad idea. There is the issue of the marker code being legible enough for OCR/QRcode detection software to detect. This puts a limit on the data payload/complexity of the tag, since if viewed from far away, the QRcode wouldn't be decodable, despite detecting that a QRcode of some kind is present.
QRcode  privacy  marker  image  tag  identity  opt-out  face  recognition  security  mark  sign  protection  defense  TagMeNot  Delicious 
june 2011 by asteroza
National Strategy on Trusted Identities in Cyberspace
Your internet drivers license, courtesy of the Federal government and assorted big private players with lobbyists.
NSTIC  national  online  identity  credential  system  ID  internet  drivers  license  false  security  privacy  government  NIST  standard  policy  Delicious 
april 2011 by asteroza
Samsung OLED RFID display
Damn it, there goes another patent I was preparing. Interesting potential alternative to holograms for authenticity checks. Using the reader's emitted power for the display is a good trick that keeps the size down.
Samsung  RFID  OLED  display  remote  power  contactless  identity  ID  card  ISO  14443  security  Delicious 
january 2010 by asteroza
My Name is E
A pseudo Poken competitor for social network identity information exchange, oriented towards mobile phones, but seems to also have a Poken-like RFID dongle too
delivery  exchange  E  social  network  business  card  contact  info  mobile  phone  cellphone  smartphone  iPhone  identity  networking  contacts  sync  web  2.0  alternative  Poken  Delicious 
july 2009 by asteroza
pseudo LBS chance encounter dating service? " 'Toothing?"
mobile  social  identity  bluetooth  networking  internet-of-things  object  privacy  presence  SNS  ID  proximity  aka-aki  chance  encounter  toothing  Delicious 
february 2009 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  2.4GHz  2FA  3.0  800-63  802.1x  802.15.4  access  accountability  active  AD  addon  addressbook  administration  advocacy  AEPnetworks  aggregator  ajax  aka-aki  algorithm  alternative  amazon  analysis  analytics  anonymity  antiadvertising  antiskimming  antisnoop  antisurveillance  AOptix  apache  API  applet  appliance  application  architecture  art  articles  ASP  attention  auditing  authentication  authentification  Authentify  authorization  automated  Avaya  avoidance  aware  Azigo  back  backend  badge  Bandit  barcode  based  baseline  BATlogin  beacon  beamauth  behavior  BeyondCorp  bigbrother  bioelectric  biometric  biometrics  BlackDog  blackhat  blockchain  blog  bluetooth  book  bookmark  bracelet  brand  browser  BrowserID  burner  business  buzz  C#  CAC  camera  cameraphone  card  cardspace  case  cellphone  Centeris  centric  certifcate  certificate  certified  CF  chance  change  channel  charmbadge  charmtag  chat  check  Cisco  citizen  Clamshell  CLI  clickpass  client  ClipperZ  cliqset  cloud  communication  communications  community  comparison  compliance  concept  conference  confirmation  connect  contacless  contact  contactless  contacts  context  contextual  control  controlled  corporation  coupled  credential  credentials  Credentica  credit  cryptography  cultural  culture  DandyID  dashboard  data  database  debian  decentralized  defense  definitions  delegated  Delicious  delivery  dependency  deperimeterization  design  development  devices  diagram  Dick  Digicash  digital  directory  disappearing  discussion  DiSO  display  distributed  DKIM  dns  documentary  documents  dovecot  driverless  drivers  E  e-passport  e-residency  Echo  edge  electronic  electronics  email  encoded  encounter  Encryptakey  encryption  endpoint  engine  enterprise  entitlement  entity  ephemeral  ESOE  estonia  EU  europe  exchange  explanation  extension  extensions  external  face  facial  factor  fail  fake  false  federated  federation  feedback  FIDO  film  finance  finger  fingerprint  firefox  firewall  flash  FOIA  form  framework  Francis  fraud  free  freedom  freeze  Fukuyama  futurism  Gardanto  gateway  gem  generator  Glynx  google  GoogleApps  governance  government  GPG  graph  group  guardian  GUI  GUID  guidance  guide  hacking  half  hanko  Hardt  hardware  hash  heartbeat  Higgins  hosting  hostproof  howto  human  humor  IAM  IAP  icons  ID  iD3  ID4me  ideas  identicon  identification  Identify  identity  IdM  IM  image  IMAP  incognito  info  infocard  information  infosec  infrastructure  installation  integration  interaction  interface  intermediary  internal  internet  internet-of-things  investigation  IoT  iphone  IR  iris  ISO  J-SOX  JanRain  japan  japanese  java  javacard  javascript  JCOP  JSON  JSOX  jukinet  JWT  K9  karma  kerberos  key  keyboard  keychain  laser  ldap  lecture  lexicon  liberty  library  license  licensing  LID  lifehacks  Lifelock  lightweight  Likewise  linux  listening  lived  lobbying  local-openID  location  lock  lockbin  logging  logic  login  lookup  loosely  LXACML  m2m  mac  magnetic  magstripe  management  manager  mapper  mark  marker  marketing  Marubeni  matching  mechanism  media  memory  message  meta  metrics  microformats  microservice  microsoft  middleware  mixed  mobile  module  money  monitoring  movie  mozilla  multifactor  muscle  MyID  NAC  name  national  Naymz  Nedu  netowrk  network  networking  news  NFC  NIST  no  node  NSTIC  nTAG  number  OASIS  oauth  OAuthpassword  object  office365  OIDC  OLED  on  online  OOBA  OpenAM  OpenID  openID  OpenID4Java  openldap  OpenSEA  opensource  opensoure  OPSEC  opt-out  oriented  OSIS  OSX  OTP  out-of-band  outline  outlook  p2p  PAM  panopticon  paranoia  parasite  participatory  party  passive  password  passwords  pattern  PayPal  people  perimeterless  person  persona  personal  personel  PGP  phone  photo  php  phpMyID  picture  PIM  PIV  PKI  platform  plugin  PlusID  Poken  policy  portable  portal  position  post  power  PowerDNS  PR  presence  presentation  prevention  principles  privacy  Privaris  product  profile  programming  programs  protection  protocol  prototype  provider  provisioning  proxcard  proximity  proxy  pseudoanonymity  pseudonym  QRcode  quarantine  race  rack  Radiant  RBAC  reader  realtime  recognition  recovery  reference  registry  relationship  remediation  remote  report  reputation  requestion  requirements  research  resources  retina  reuse  RFID  role  RTLS  ruby  SaaS  SalesForce  SAML  Samsung  scanner  search  secret  secure  security  Seldo  selector  seminar  sender  sensor  sensors  SEO  serial  server  service  services  sharing  shell  Shibboleth  shield  short  sidetree  sign  signature  signing  signon  sinatra  single  single-sign-on  slector  sll  smartcard  smartphone  SMS  SNS  social  society  sociology  sociometric  software  sousveilance  specification  split  spoofing  SSH  SSO  stamp  standalone  standard  standards  steganography  storage  stripe  submission  suite  supplicant  support  surveillance  sxip  sxipper  sync  synchronization  sysadmin  system  systems  tag  tagger  TagMeNot  technology  temporary  terms  text  theft  third  tips  TLS  token  tools  toothing  tor  tracking  trackur  transnational  travel  tricks  trust  TrustBearer  tutorial  twitter  two  U2F  Ubiquity  UI  UK  unique  universal  US  USA  USB  user  user-centric  username  utilities  UUI  validation  vault  venn  verification  verified  video  virtual  voice  vpn  wallet  wearable  wearables  web  web-of-things  webAPI  webdev  WebFinger  WebFist  widget  wifi  windows  wireless  words  wristband  XACML  XMPP  Yadis  YADIS  YubiKey  zeroknowledge  zigbee  ZKS 

Copy this bookmark: