This is the first in a series of blogs, that will start to look at some use cases for leveraging block chain technology in the world of identity and access management. I don't proclaim to be a BC expert and there are several blogs better equipped to tackle that subject, but a good introductory text is the O'Reilly published "Blockchain: Blueprint for a New Economy" . I want to first look at access request management. An age old issue that has developed substaintially in the last 30 years, to several sub-industries within the IAM world, with specialist vendors, standards and methodologies. In the Old Days Embedded/Local Assertion Managment So this is a typical "standalone" model of access management. An application manages both users and access control list information within it's own boundary. Each application needs a separate login and access control database. The subject is typically a person and the object an application with function
Recipes for Digital Identity & Security