“Information security is a fundamentally cooperative endeavor, one in which responsibility and authority are distributed across a wide array of actors.”
—Ashwin J. Mathew1
© Michael Schwartz, Maciej Machulak 2018Michael Schwartz and Maciej MachulakSecuring the Perimeterhttps://doi.org/10.1007/978-1-4842-2601-8_10
10. Multiparty Federation
Federated identity protocols like SAML and OpenID Connect enable us to authenticate people in other domains, but trust issues quickly surface. For example, if your organization operates a website with valuable content and someone you authenticated at another domain steals the content, what recourse do you have? If your organization operates ...