Episode 13 - Digital identities and identity access management Titelbild

Episode 13 - Digital identities and identity access management

Episode 13 - Digital identities and identity access management

Jetzt kostenlos hören, ohne Abo

Details anzeigen

Nur 0,99 € pro Monat für die ersten 3 Monate

Danach 9.95 € pro Monat. Bedingungen gelten.

Über diesen Titel

👁 At a time when our interactions and transactions are increasingly shifting to the 📲 digital realm, understanding the invisible architectures that support our 🌐 online world is more important than ever. Digital identities and how they are managed form the backbone of our connected society, enabling us to navigate the digital space securely and efficiently. In this podcast episode, we start with the basics: ❇️ What exactly is a digital identity and why does it play such a crucial role in our online lives? ❇️ What does identity and access management mean and how does it contribute to the security and smooth functioning of digital services? We will also explore the differences between authentication and authorization and why these concepts are essential for protecting our digital identities. Join us on this journey to understand how digital identities affect our online lives and how IAM systems help secure and shape our digital existence. Support us: If you enjoyed our episode, please leave us a rating.💕 🙋‍♂️I'm Sascha Block, IT architect and your guide and moderator, and I'll give you an insight into what you can expect in the coming episodes. 👉**Subscribe to the Rock the Prototype podcast now**👈 so you don't miss a single episode. So, let's rock software development and prototyping together!🚀 Visit our **website** 👉 [https://rock-the-prototype.com](https://rock-the-prototype.com) to learn more about the podcast and find more exciting topics in our **blog** 👀[https://rock-the-prototype.com/blog/](https://rock-the-prototype.com/blog/) or in our **wiki**📌[https://rock-the-prototype.com/wiki/](https://rock-the-prototype.com/wiki/). 💕 We have lots more valuable content for you.🖖 We also welcome your feedback 💌 and suggestions 💬. Look forward to your next Rock the Prototype podcast episode! **RTP#13 – Digital Identities & Identity and Access Management (IAM): Security and Trust at the Heart of Digital Identity** Digital identities are the invisible backbone of our digital lives — from logging into email to using modern wallets for payments. In this episode of the Rock the Prototype Podcast, we explore what a *digital identity* is, why *Identity and Access Management (IAM)* is critical for secure digital services, and how authentication and authorization work together to protect users, organizations, and sensitive data. You’ll learn which building blocks shape digital identity systems today — including passwords, biometrics, multi-factor authentication, digital certificates, and online profiles — and why topics like data sovereignty and the “right to be forgotten” have become essential principles in identity management. We also widen the lens: secure digital identities don’t stop at national borders. Cross-border interoperability depends on shared trust models and international standards. That’s why Europe’s *EUDI Wallet* and the *Architecture Reference Framework* are so important right now, alongside regulations like *eIDAS* and cybersecurity requirements such as *NIS2*. We discuss how institutions like Germany’s *Federal Office for Information Security (BSI)* translate these supranational requirements into technical and operational security expectations. From there, we connect modern identity assurance to real-world examples: device-bound security and tokenization in wallet-based payments, and the much higher assurance levels required for government services, health data, and legally binding digital credentials. Privacy-preserving digital identity is another key part of the episode. We compare anonymity approaches like the *TOR network* with *Zero-Knowledge Proofs (ZKPs)* — explaining how ZKPs can prove identity validity without disclosing sensitive data. This ties directly to *Kerckhoffs’ principle*: security must hold even if everything about the system is public — except the secret key. Finally, we walk through core standards and protocols that power identity infrastructures...
Noch keine Rezensionen vorhanden