Make sure it's turned on so that pingidentity.com can work properly.
O’Reilly’s Learning Digital Identity | Ping Identity
O’Reilly’s Learning Digital Identity: Design, Deploy, and Manage Identity Architectures
As the industry leader in Identity Access Management, Ping is delighted to provide exclusive access to Learning Digital Identity: Design, Deploy, and Manage Identity Architectures by Philip J. Windley.
With Learning Digital Identity, you’ll learn how to design, deploy, and manage identity architectures for your organization. Sign up now for your complimentary copy of this insightful introduction to the world of digital identity.
These chapters of “Learning Digital Identity” will cover key topics on digital identity including:
The definition of digital identity
How the introduction of decentralized identity plays a role in the continued evolution of digital identity
The challenges with digital identity from a variety of sources—autonomy, consent, privacy, and lack of anonymity
The digital relationship lifecycle and how understanding every stage informs how an organization designs and deploys digital identity systems
The definition of privacy and the Privacy-by-Design principles that organizations should adhere to when designing identity systems
The role authentication, access controls, and federated identity play in protecting digital identities