-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improved history of identity standards + adding identifiers into beginning. #26
Open
Identitywoman
wants to merge
5
commits into
intarchboard:main
Choose a base branch
from
Identitywoman:main
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Improved introductory section to add to include identifiers and set a little bit more context about the history of identity standards.
Improved introductory section to add to include identifiers and set a little bit more context about the history of identity standards.
Improved opening to add in reference to identifiers and a bit more context regarding the history of identity standards. I am sorry I didn't mean to commit to the main branch. I thought I was forking and doing it in my branch.. I will try to reverse this and do the thing in my branch and then send a pull request. Github is still a bit mysterious to me I'm doing my best.
mirjak
reviewed
Aug 14, 2023
README.md
Outdated
The identity ecosystems that support these use cases are individually and collectively vast, including classical forms of identities such as email addresses, phone numbers, and certificates, to new forms of identities built on standards such as [OAuth [1]](https://datatracker.ietf.org/doc/html/rfc6749) and [Verifiable Credentials [2]](https://www.w3.org/TR/vc-data-model/). These different identities vary in type (what sort of entity does the identity refer to?), uniqueness (does it refer to one or more entities?), security (how easy is it for identities to be spoofed?), longevity (is the identifier still valid at this moment?), and so on. | ||
The identity ecosystems that support these use cases are individually and collectively vast, including classical forms of identifiers that are network end points such as email addresses, phone numbers. There are also systems for issuing certificates that have some rudimentary identity information about the owner of public keys that are are used to secure connection between entities. | ||
|
||
The first generation of specifically self conscious identity standards emerged out of the directory wars of the 1990s and led to the develompent of [LDAP[1]](https://www.rfc-editor.org/rfc/rfc4511) and [SAML[2]](https://www.oasis-open.org/standard/saml/) and was focused on enterprise single sign on and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggested change
The first generation of specifically self conscious identity standards emerged out of the directory wars of the 1990s and led to the develompent of [LDAP[1]](https://www.rfc-editor.org/rfc/rfc4511) and [SAML[2]](https://www.oasis-open.org/standard/saml/) and was focused on enterprise single sign on and | |
The first generation of specifically self conscious identity standards emerged out of the directory wars of the 1990s and led to the develompent of [LDAP[1]](https://www.rfc-editor.org/rfc/rfc4511) and [SAML[2]](https://www.oasis-open.org/standard/saml/) and was focused on enterprise single sign on. |
bumblefudge
reviewed
Aug 14, 2023
@@ -1,8 +1,14 @@ | |||
# Proposed program on Wholistic Human-Oriented Discussions on Identity Systems (WHODIS) | |||
|
|||
Identity is a fundamental concept in both computing and human interactions. It is used as the basis for security policy enforcement in support of authentication, authorization, provisioning, and related access control technologies. For example, identities are used to identify human users or devices as part of end-to-end encryption applications, or used to authenticate entities that publish signed software artifacts. Identities may also be used for provisioning or managing devices or workloads in machine-to-machine systems. | |||
Identity is a fundamental concept in both computing and human interactions. It is used as the basis for security policy enforcement in support of authentication, authorization, provisioning, and related access control technologies. For example, identities are used to identify human users or devices as part of end-to-end encryption applications, or used to authenticate entities that publish signed software artifacts. Identitifiers may also be used for provisioning or managing devices or workloads in machine-to-machine systems. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggested change
Identity is a fundamental concept in both computing and human interactions. It is used as the basis for security policy enforcement in support of authentication, authorization, provisioning, and related access control technologies. For example, identities are used to identify human users or devices as part of end-to-end encryption applications, or used to authenticate entities that publish signed software artifacts. Identitifiers may also be used for provisioning or managing devices or workloads in machine-to-machine systems. | |
Identity is a fundamental concept in both computing and human interactions. It is used as the basis for security policy enforcement in support of authentication, authorization, provisioning, and related access control technologies. For example, identities are used to identify human users or devices as part of end-to-end encryption applications, or used to authenticate entities that publish signed software artifacts. Identifiers may also be used for provisioning or managing devices or workloads in machine-to-machine systems. |
Ok. I finished an incomplete sentence and added space between paragraphs.
added bullet points.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
I added a little bit more context about the history of identity standards along with adding in "identifiers" to the language about identity at the beginning.