This document discusses practical identity in the Internet of Things (IoT) era. It addresses several key issues including trustworthiness, device identity and context, provisioning and life cycles, authorization and access when connecting modern and legacy systems. The document also discusses challenges of bridging legacy and modern systems given differences in devices, life expectancies, information technology vs operational technology, and access issues related to remote locations, unreliable connectivity, and bandwidth constraints. It argues that current identity approaches are too static, fragile and vulnerable, and that improved approaches are needed such as dynamic, continuous identity tied to risk-based policies and standardized identity life cycles.