Dr. Torsten Lodderstedt with yes.com provided an update on OpenID Connect for Identity Assurance at the OIDF Workshop at the 2019 European Identity Conference on Tuesday, May 14, 2019 in Munich.
Torsten Lodderstedt is the CTO of yes.com, an open banking ecosystem. He discusses open banking prior to PSD2, including challenges like screen scraping. PSD2 obliges financial institutions to provide access to account information and payment initiation to authorized third parties. Beyond PSD2, different parties have differing interests. Identity is important for digital society. Financial institutions can leverage verified identity data as an identity provider and authentication service. OpenID Connect can represent verified identity claims with metadata for legal compliance and international interoperability. This representation allows for privacy-preserving inquiries.
The document proposes extending OpenID Connect to support requesting and presenting W3C Verifiable Credentials in all OpenID Connect flows. It outlines the need for a standard way to do this given limitations of existing approaches. The proposal is to use existing OpenID Connect mechanisms like the "claims" parameter to request verifiable presentations, which could then be returned embedded in ID tokens or userinfo responses, or as a separate verifiable presentation token. Examples are provided and it discusses the relationship to other relevant work. The goal is to make OpenID Connect the preferred choice for obtaining and providing verifiable presentations.
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...FinTechLabs.io
The document discusses RAiDiAM and its Open Banking Identity product. It summarizes:
- RAiDiAM was created to help with identity challenges of Open Banking and PSD2 regulations. It provides consulting and modular/scalable identity architecture services.
- The Open Banking Directory was developed as a trust framework "hub" to enable secure transactions between authorized financial companies using standards like OAuth2 and OIDC.
- It describes the Directory's key components, onboarding process to issue credentials to companies, and role in later transactions to validate claims between financial entities.
Authlete FAPI Implementation Part 1 #fapisum - Japan/UK Open Banking and APIs...FinTechLabs.io
This document discusses Authlete's semi-hosted approach to OAuth and API security. Authlete provides an API that customers can call from their own OAuth-speaking services to handle OAuth processing and management. The API allows customers to add new features to their services over time, such as PKCE, and supports various client authentication methods including mutual TLS with certificates. For mutual TLS, the customer validates the TLS connection but Authlete verifies the certificate to act as a trust anchor.
Verifiable Credentials for Global Supply ChainsKaryl Fowler
Transmute hosted a discussion at the Internet Identity Workshop (IIW30, April 2020) about the use of verifiable credentials in global supply chains, emphasizing customer discovery and education approaches to emerging technology adoption.
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
What does a world without passwords and usernames look like? What would a truly secure single sign-on system mean for your customer and employee experiences? What if multi-factor authentication was consistent and interoperable across the Internet?
On our July 9th webinar, we were joined by our partners at Condatis to dive into these very questions around the future of authentication, covering:
◙ The four types of authentication supported by Evernym today
◙ The flaws in today’s password-based, security question, and social login models
◙ The benefits of using verifiable portable credentials for authentication
◙ Using self-sovereign identity for multi-factor authentication
◙ A showcase of live SSI-enabled authentication projects
Presenters:
◙ Andy Tobin, EMEA Managing Director, Evernym
◙ Chris Eckl, Chief Technology Officer, Condatis
◙ James Monaghan, VP Product, Evernym
Torsten Lodderstedt is the CTO of yes.com, an open banking ecosystem. He discusses open banking prior to PSD2, including challenges like screen scraping. PSD2 obliges financial institutions to provide access to account information and payment initiation to authorized third parties. Beyond PSD2, different parties have differing interests. Identity is important for digital society. Financial institutions can leverage verified identity data as an identity provider and authentication service. OpenID Connect can represent verified identity claims with metadata for legal compliance and international interoperability. This representation allows for privacy-preserving inquiries.
The document proposes extending OpenID Connect to support requesting and presenting W3C Verifiable Credentials in all OpenID Connect flows. It outlines the need for a standard way to do this given limitations of existing approaches. The proposal is to use existing OpenID Connect mechanisms like the "claims" parameter to request verifiable presentations, which could then be returned embedded in ID tokens or userinfo responses, or as a separate verifiable presentation token. Examples are provided and it discusses the relationship to other relevant work. The goal is to make OpenID Connect the preferred choice for obtaining and providing verifiable presentations.
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...FinTechLabs.io
The document discusses RAiDiAM and its Open Banking Identity product. It summarizes:
- RAiDiAM was created to help with identity challenges of Open Banking and PSD2 regulations. It provides consulting and modular/scalable identity architecture services.
- The Open Banking Directory was developed as a trust framework "hub" to enable secure transactions between authorized financial companies using standards like OAuth2 and OIDC.
- It describes the Directory's key components, onboarding process to issue credentials to companies, and role in later transactions to validate claims between financial entities.
Authlete FAPI Implementation Part 1 #fapisum - Japan/UK Open Banking and APIs...FinTechLabs.io
This document discusses Authlete's semi-hosted approach to OAuth and API security. Authlete provides an API that customers can call from their own OAuth-speaking services to handle OAuth processing and management. The API allows customers to add new features to their services over time, such as PKCE, and supports various client authentication methods including mutual TLS with certificates. For mutual TLS, the customer validates the TLS connection but Authlete verifies the certificate to act as a trust anchor.
Verifiable Credentials for Global Supply ChainsKaryl Fowler
Transmute hosted a discussion at the Internet Identity Workshop (IIW30, April 2020) about the use of verifiable credentials in global supply chains, emphasizing customer discovery and education approaches to emerging technology adoption.
The Future of Authentication - Verifiable Credentials / Self-Sovereign IdentityEvernym
What does a world without passwords and usernames look like? What would a truly secure single sign-on system mean for your customer and employee experiences? What if multi-factor authentication was consistent and interoperable across the Internet?
On our July 9th webinar, we were joined by our partners at Condatis to dive into these very questions around the future of authentication, covering:
◙ The four types of authentication supported by Evernym today
◙ The flaws in today’s password-based, security question, and social login models
◙ The benefits of using verifiable portable credentials for authentication
◙ Using self-sovereign identity for multi-factor authentication
◙ A showcase of live SSI-enabled authentication projects
Presenters:
◙ Andy Tobin, EMEA Managing Director, Evernym
◙ Chris Eckl, Chief Technology Officer, Condatis
◙ James Monaghan, VP Product, Evernym
FAPI / Open Banking Conformance #fapisum - Japan/UK Open Banking and APIs Sum...FinTechLabs.io
The document discusses FAPI/Open Banking conformance testing. It provides an overview of the conformance suite, including what it tests and its design goals. It then describes the test process for banks, demonstrates the conformance suite, and provides tips for successful FAPI deployment, including common problems banks faced in the UK and advice for running conformance testing early in development.
The webinar discussed how Legal Entity Identifiers (LEIs) can be used to establish digital identity for organizations through verifiable credentials. It explained that LEIs uniquely identify legal entities and are issued by accredited registrars. The webinar then showed how LEIs could be incorporated into verifiable credentials to prove an entity's identity on blockchain networks. It provided an example process where an entity receives an LEI and verifiable credential from a registrar, and can then issue credentials to employees to represent the entity digitally. Potential use cases for this approach include regulatory filings, supply chain management, and executing business contracts through verifiable credentials.
FIDO, PKI & beyond: Where Authentication Meets IdentificationFIDO Alliance
Explore new directions for authentication and identification. Learn the inner workings of FIDO and PKI, and how to integrate these two worlds into one token.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
This document summarizes a presentation on anchoring trust in self-sovereign identity systems aligned with the EU's eIDAS Regulation. The presentation discusses:
1) Self-sovereign identity (SSI) systems and their benefits over previous identity models.
2) Examples of existing SSI implementations like Alastria.
3) How the eIDAS Regulation establishes an electronic identification and trust services framework for the EU Digital Single Market, and how its principles could help integrate SSI systems and address issues like trust anchoring.
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowForgeRock
The document discusses OAuth 2.0 device flow, which allows restricted devices like IoT devices to obtain access tokens to access APIs on a user's behalf. It describes how device flow works, the issues it addresses for devices without browsers, and its history. It then demonstrates device flow in an example where an alarm system uses an access token obtained via device flow to call a web service and notify the user if an incident occurs. Security concerns with device flow like use of bearer tokens on non-TLS devices are also noted.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
The document discusses the EIDI Application, which provides electronic identity infrastructure and management across organizations. It is based on public key infrastructure (PKI) using asymmetric encryption and certificates. The application includes a certificate management system, certification authority, key management server, and OCSP server. It can be used for encryption, digital signatures, secure access, mobile access, and identity for devices in the Internet of Things. The document outlines several use cases for the EIDI Application.
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Stepsguestbd878c
1) The document discusses two Dutch initiatives for consumer identity - OpenIDplus.nl, which aims to provide basic trust for consumer-to-business identity, and cidSafe, which aims to enable high-trust consumer identity, particularly for the financial sector.
2) OpenIDplus.nl is establishing a trust framework based on OpenID with standardized validation methods for attributes to improve interoperability, security, and privacy. CidSafe is exploring how a high-trust consumer identity solution could be feasible in the Netherlands.
3) Both initiatives recognize the need to jointly work on trust frameworks that balance openness with privacy and establish the appropriate role for government oversight depending on the level
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
Authentication and MFA is no longer a one-mode-fits-all experience. Customer-centric companies need flexible intelligence models and simple, consistent login journeys across channels—web, call center, mobile—without being forced to bolt MFA on top of usernames and passwords. ForgeRock’s VP, Global Strategy and Innovation, Ben Goodman, and Trusona’s Chief Design Officer, Kevin Goldman, explain how ForgeRock combined with Trusona creates a broad range of multi-factor authentication modalities all with a consistent user experience, including primary MFA without usernames, passwords or typing whatsoever.
Bonus: Trusona will reveal findings from the first-ever passwordless MFA behavioral research.
Session 4 - Bringing the pieces together - Detailed review of a reference ex...FIWARE
This session will explain how everything comes together under i4Trust using a reference example and then explain that example in detail. It will bringing the pieces together: Detailed technical review of a reference example: the prerequisites, creating an offering, acquiring rights / activation , & consumption. And setup of components of the i4Trust experimentation framework. Technical session for Local Experts in Data Sharing (LEBDs)
Identiverse: PSD2, Open Banking, and Technical InteroperabilityTorsten Lodderstedt
The Payment Service Directive 2 (PSD2) is a huge leap forward for Open Banking as it obliges every financial institution operating in the European Union to provide APIs for Access to Account Information and Payment Initiation. The need for more then six thousand financial institutions to provide APIs caused a tremendous push forward for financial API design and accompanying authorization and authentication technologies. Based on the experiences gathered while supporting some of the PSD2 API initiatives in the context of OpenID Foundation’s FAPI working group, this talk will give an introduction to PSD2 and related technical standards, dig into some remarkable aspects of authorization for financial APIs and points out the potential impact on the future of OAuth.
CSPA Keynote: BLOCKCHAIN for EnterpriseDavid Haimes
My keynote presentation at California Software Professional Association (CSPA) Meetup:
BLOCKCHAIN for Enterprise and Social Impact.
Hosted @ ORACLE Santa Clara Campus
Digital Identity Wallets: What They Mean For BanksEvernym
This document discusses digital identity wallets and their potential benefits for banks. Digital identity wallets allow individuals to store credentials that can be securely and privately shared with organizations to verify attributes like identity, age, membership status. They minimize data collection and use privacy techniques. Banks could use them to streamline know-your-customer processes, replace passwords with secure authentication, and improve customer experiences through personalized services and messaging. The technology relies on cryptographic proofs and keeping data decentralized and off-chain for privacy and security according to global standards like GDPR.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Big Data lay at the core of the strong data economy that is emerging in Europe. Although both large enterprises and SMEs acknowledge the potential of Big Data in disrupting the market and business models, this is not reflected in the growth of the data economy. The lack of trusted, secure, ethical-driven personal data platforms and privacy-aware analytics, hinders the growth of the data economy and creates concerns. The main considerations are related to the secure sharing of personal and proprietary/industrial data, and the definition of a fair remuneration mechanism that will be able to capture, produce, release and cash out the value of data, always for the benefit of all the involved stakeholders.
This webinar will focus on how such concerns that pertain to privacy, ethics and intellectual property rights can be tackled, by allowing individuals to take ownership and control of their data and share them at will, through flexible data sharing and fair compensation schemes with other entities (companies or not), as researched by the DataVaults project.
The document discusses IBM's Trusted Identity solution for self-sovereign identity. It proposes establishing a decentralized identity network based on principles of user consent, privacy, and interoperability. This network would provide convenience and security for individuals, businesses, and governments by enabling trusted digital identity verification and management across domains. Technical components include decentralized identifiers (DIDs), verifiable credential schemas, and an open-source Sovrin identity framework using distributed ledger technology.
Big Data lay at the core of the strong data economy that is emerging in Europe. Although both large enterprises and SMEs acknowledge the potential of Big Data in disrupting the market and business models, this is not reflected in the growth of the data economy. The lack of trusted, secure, ethical-driven personal data platforms and privacy-aware analytics, hinders the growth of the data economy and creates concerns. The main considerations are related to the secure sharing of personal and proprietary/industrial data, and the definition of a fair remuneration mechanism that will be able to capture, produce, release and cash out the value of data, always for the benefit of all the involved stakeholders.
This webinar will focus on how such concerns that pertain to privacy, ethics and intellectual property rights can be tackled, by allowing individuals to take ownership and control of their data and share them at will, through flexible data sharing and fair compensation schemes with other entities (companies or not), as researched by the DataVaults project.
Significance of Blockchain Certification For a Business AnalystBlockchain Council
The platform like Blockchain Council works towards providing comprehensive knowledge about Blockchain and its implementation in various business operations. In case you are looking for certification in the same, you can enroll for Blockchain certification course for Business Analysts
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' PoikolaSSIMeetup
Antti 'Jogi' Poikola, Researcher at Aalto University and Sovrin Foundation Trustee, features in our third Webinar "SSI & MyData" by explaining how MyData is both an alternative vision and guiding technical principles for how we, as individuals, can have more control over the data trails we leave behind us in our everyday actions. The core idea of MyData is that we, you and I, should have an easy way to see where data about us goes, specify who can use it, and alter these decisions over time. Jogi explains how this pieces fit together and how data is merging into the SSI space.
The document discusses Azure Blockchain Service and how it can be used with Ethereum and Quorum. It provides an overview of blockchain concepts like consensus mechanisms and smart contracts. It also presents a sample smart contract for storing document hashes on the blockchain and demonstrates how to set up, deploy, and test the smart contract on Azure Blockchain Service.
Big Data lay at the core of the strong data economy that is emerging in Europe. Although both large enterprises and SMEs acknowledge the potential of Big Data in disrupting the market and business models, this is not reflected in the growth of the data economy. The lack of trusted, secure, ethical-driven personal data platforms and privacy-aware analytics, hinders the growth of the data economy and creates concerns. The main considerations are related to the secure sharing of personal and proprietary/industrial data, and the definition of a fair remuneration mechanism that will be able to capture, produce, release and cash out the value of data, always for the benefit of all the involved stakeholders.
This webinar will focus on how such concerns that pertain to privacy, ethics and intellectual property rights can be tackled, by allowing individuals to take ownership and control of their data and share them at will, through flexible data sharing and fair compensation schemes with other entities (companies or not), as researched by the DataVaults project.
Big Data PPP Industrial Data Platforms - Towards cross-sectorial optimization and traceability
To start identifying synergies and to learn how different projects will address key data collection, sharing, integration, and exploitation challenges, a series of webinars have been organized under the umbrella of this Big Data Value PPP. These webinars are also organized by BDVA, BDVe project, and other projects which are part of this PPP.
FAPI / Open Banking Conformance #fapisum - Japan/UK Open Banking and APIs Sum...FinTechLabs.io
The document discusses FAPI/Open Banking conformance testing. It provides an overview of the conformance suite, including what it tests and its design goals. It then describes the test process for banks, demonstrates the conformance suite, and provides tips for successful FAPI deployment, including common problems banks faced in the UK and advice for running conformance testing early in development.
The webinar discussed how Legal Entity Identifiers (LEIs) can be used to establish digital identity for organizations through verifiable credentials. It explained that LEIs uniquely identify legal entities and are issued by accredited registrars. The webinar then showed how LEIs could be incorporated into verifiable credentials to prove an entity's identity on blockchain networks. It provided an example process where an entity receives an LEI and verifiable credential from a registrar, and can then issue credentials to employees to represent the entity digitally. Potential use cases for this approach include regulatory filings, supply chain management, and executing business contracts through verifiable credentials.
FIDO, PKI & beyond: Where Authentication Meets IdentificationFIDO Alliance
Explore new directions for authentication and identification. Learn the inner workings of FIDO and PKI, and how to integrate these two worlds into one token.
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
This document summarizes a presentation on anchoring trust in self-sovereign identity systems aligned with the EU's eIDAS Regulation. The presentation discusses:
1) Self-sovereign identity (SSI) systems and their benefits over previous identity models.
2) Examples of existing SSI implementations like Alastria.
3) How the eIDAS Regulation establishes an electronic identification and trust services framework for the EU Digital Single Market, and how its principles could help integrate SSI systems and address issues like trust anchoring.
IoT Wonderland: Understanding the Magic of OAuth2 Device Registration FlowForgeRock
The document discusses OAuth 2.0 device flow, which allows restricted devices like IoT devices to obtain access tokens to access APIs on a user's behalf. It describes how device flow works, the issues it addresses for devices without browsers, and its history. It then demonstrates device flow in an example where an alarm system uses an access token obtained via device flow to call a web service and notify the user if an incident occurs. Security concerns with device flow like use of bearer tokens on non-TLS devices are also noted.
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
https://ssimeetup.org/introducing-ssi-eidas-legal-report-ignacio-alamillo-webinar-55/
The European Commission developed the SSI (Self-Sovereign Identity) eIDAS bridge, an ISA2 funded initiative, to promote eIDAS as a trust framework for the SSI ecosystem. It assists a VC (Verifiable Credential) issuer in the signing process, and helps the verifier to automate the identification of the organization behind the issuer’s DID (Decentralized Identifier). Simply by “crossing” the eIDAS Bridge, a Verifiable Credential can be proven trustworthy in the EU. Ignacio Alamillo will present at this SSI Meetup webinar the insights gained from this report.
In the context of the eIDAS bridge project, we performed an analysis on how eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market, and this is reflected in the SSI eIDAS legal report, available at this link. The objective of this report is to evaluate the potential legal issues that are important to an SSI solution and make some recommendations to be used as policy input for the eIDAS 2020 review. The report outlines short-term objectives, where changes in the Regulation would not be necessary, but also mid to long-term scenarios requiring major changes in the Regulation to comply with the SSI design principles.
The different scenarios described in the report are aligned with the proposed architectural and procedural considerations designed in the SSI eIDAS Bridge project and the European Self Sovereign Identity Framework.
The document discusses the EIDI Application, which provides electronic identity infrastructure and management across organizations. It is based on public key infrastructure (PKI) using asymmetric encryption and certificates. The application includes a certificate management system, certification authority, key management server, and OCSP server. It can be used for encryption, digital signatures, secure access, mobile access, and identity for devices in the Internet of Things. The document outlines several use cases for the EIDI Application.
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Stepsguestbd878c
1) The document discusses two Dutch initiatives for consumer identity - OpenIDplus.nl, which aims to provide basic trust for consumer-to-business identity, and cidSafe, which aims to enable high-trust consumer identity, particularly for the financial sector.
2) OpenIDplus.nl is establishing a trust framework based on OpenID with standardized validation methods for attributes to improve interoperability, security, and privacy. CidSafe is exploring how a high-trust consumer identity solution could be feasible in the Netherlands.
3) Both initiatives recognize the need to jointly work on trust frameworks that balance openness with privacy and establish the appropriate role for government oversight depending on the level
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
Authentication and MFA is no longer a one-mode-fits-all experience. Customer-centric companies need flexible intelligence models and simple, consistent login journeys across channels—web, call center, mobile—without being forced to bolt MFA on top of usernames and passwords. ForgeRock’s VP, Global Strategy and Innovation, Ben Goodman, and Trusona’s Chief Design Officer, Kevin Goldman, explain how ForgeRock combined with Trusona creates a broad range of multi-factor authentication modalities all with a consistent user experience, including primary MFA without usernames, passwords or typing whatsoever.
Bonus: Trusona will reveal findings from the first-ever passwordless MFA behavioral research.
Session 4 - Bringing the pieces together - Detailed review of a reference ex...FIWARE
This session will explain how everything comes together under i4Trust using a reference example and then explain that example in detail. It will bringing the pieces together: Detailed technical review of a reference example: the prerequisites, creating an offering, acquiring rights / activation , & consumption. And setup of components of the i4Trust experimentation framework. Technical session for Local Experts in Data Sharing (LEBDs)
Identiverse: PSD2, Open Banking, and Technical InteroperabilityTorsten Lodderstedt
The Payment Service Directive 2 (PSD2) is a huge leap forward for Open Banking as it obliges every financial institution operating in the European Union to provide APIs for Access to Account Information and Payment Initiation. The need for more then six thousand financial institutions to provide APIs caused a tremendous push forward for financial API design and accompanying authorization and authentication technologies. Based on the experiences gathered while supporting some of the PSD2 API initiatives in the context of OpenID Foundation’s FAPI working group, this talk will give an introduction to PSD2 and related technical standards, dig into some remarkable aspects of authorization for financial APIs and points out the potential impact on the future of OAuth.
CSPA Keynote: BLOCKCHAIN for EnterpriseDavid Haimes
My keynote presentation at California Software Professional Association (CSPA) Meetup:
BLOCKCHAIN for Enterprise and Social Impact.
Hosted @ ORACLE Santa Clara Campus
Digital Identity Wallets: What They Mean For BanksEvernym
This document discusses digital identity wallets and their potential benefits for banks. Digital identity wallets allow individuals to store credentials that can be securely and privately shared with organizations to verify attributes like identity, age, membership status. They minimize data collection and use privacy techniques. Banks could use them to streamline know-your-customer processes, replace passwords with secure authentication, and improve customer experiences through personalized services and messaging. The technology relies on cryptographic proofs and keeping data decentralized and off-chain for privacy and security according to global standards like GDPR.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Big Data lay at the core of the strong data economy that is emerging in Europe. Although both large enterprises and SMEs acknowledge the potential of Big Data in disrupting the market and business models, this is not reflected in the growth of the data economy. The lack of trusted, secure, ethical-driven personal data platforms and privacy-aware analytics, hinders the growth of the data economy and creates concerns. The main considerations are related to the secure sharing of personal and proprietary/industrial data, and the definition of a fair remuneration mechanism that will be able to capture, produce, release and cash out the value of data, always for the benefit of all the involved stakeholders.
This webinar will focus on how such concerns that pertain to privacy, ethics and intellectual property rights can be tackled, by allowing individuals to take ownership and control of their data and share them at will, through flexible data sharing and fair compensation schemes with other entities (companies or not), as researched by the DataVaults project.
The document discusses IBM's Trusted Identity solution for self-sovereign identity. It proposes establishing a decentralized identity network based on principles of user consent, privacy, and interoperability. This network would provide convenience and security for individuals, businesses, and governments by enabling trusted digital identity verification and management across domains. Technical components include decentralized identifiers (DIDs), verifiable credential schemas, and an open-source Sovrin identity framework using distributed ledger technology.
Big Data lay at the core of the strong data economy that is emerging in Europe. Although both large enterprises and SMEs acknowledge the potential of Big Data in disrupting the market and business models, this is not reflected in the growth of the data economy. The lack of trusted, secure, ethical-driven personal data platforms and privacy-aware analytics, hinders the growth of the data economy and creates concerns. The main considerations are related to the secure sharing of personal and proprietary/industrial data, and the definition of a fair remuneration mechanism that will be able to capture, produce, release and cash out the value of data, always for the benefit of all the involved stakeholders.
This webinar will focus on how such concerns that pertain to privacy, ethics and intellectual property rights can be tackled, by allowing individuals to take ownership and control of their data and share them at will, through flexible data sharing and fair compensation schemes with other entities (companies or not), as researched by the DataVaults project.
Significance of Blockchain Certification For a Business AnalystBlockchain Council
The platform like Blockchain Council works towards providing comprehensive knowledge about Blockchain and its implementation in various business operations. In case you are looking for certification in the same, you can enroll for Blockchain certification course for Business Analysts
Self-Sovereign Identity and the MyData model from Finland - Antti 'Jogi' PoikolaSSIMeetup
Antti 'Jogi' Poikola, Researcher at Aalto University and Sovrin Foundation Trustee, features in our third Webinar "SSI & MyData" by explaining how MyData is both an alternative vision and guiding technical principles for how we, as individuals, can have more control over the data trails we leave behind us in our everyday actions. The core idea of MyData is that we, you and I, should have an easy way to see where data about us goes, specify who can use it, and alter these decisions over time. Jogi explains how this pieces fit together and how data is merging into the SSI space.
The document discusses Azure Blockchain Service and how it can be used with Ethereum and Quorum. It provides an overview of blockchain concepts like consensus mechanisms and smart contracts. It also presents a sample smart contract for storing document hashes on the blockchain and demonstrates how to set up, deploy, and test the smart contract on Azure Blockchain Service.
Big Data lay at the core of the strong data economy that is emerging in Europe. Although both large enterprises and SMEs acknowledge the potential of Big Data in disrupting the market and business models, this is not reflected in the growth of the data economy. The lack of trusted, secure, ethical-driven personal data platforms and privacy-aware analytics, hinders the growth of the data economy and creates concerns. The main considerations are related to the secure sharing of personal and proprietary/industrial data, and the definition of a fair remuneration mechanism that will be able to capture, produce, release and cash out the value of data, always for the benefit of all the involved stakeholders.
This webinar will focus on how such concerns that pertain to privacy, ethics and intellectual property rights can be tackled, by allowing individuals to take ownership and control of their data and share them at will, through flexible data sharing and fair compensation schemes with other entities (companies or not), as researched by the DataVaults project.
Big Data PPP Industrial Data Platforms - Towards cross-sectorial optimization and traceability
To start identifying synergies and to learn how different projects will address key data collection, sharing, integration, and exploitation challenges, a series of webinars have been organized under the umbrella of this Big Data Value PPP. These webinars are also organized by BDVA, BDVe project, and other projects which are part of this PPP.
The document discusses the EU's plans to introduce a Digital Identity Wallet (DIW) under the eIDAS2 framework. The DIW aims to provide interoperable, multi-purpose digital identity services including personal ID data, authentication, signing, and e-attestations that are under the user's control. Progress includes ongoing discussions, and the start of large-scale pilots testing implementations. The EU also aims to introduce mobile driver's licenses (mDLs) through the DIW by 2027. Member states have roles to play in respecting EU guidelines and timelines, and offering basic DIW services, while the private sector can build additional services that integrate with government credentials. Belgium is in a solid starting
Financial Services: exchanges, settlements, payments and embedded financeEY
Blockchain technology has been a transformational technology in the world of finance, and financial institutions have been investing and experimenting heavily. Learn what has been effective, how to move from a technology-first approach to focusing on business solutions and what future products the technology enables that will change the shape of finance.
Open Identity Exchange - the Global Growth of Digital IdentityUbisecure
Keynote presentation slides from Ubisecure's IAMwithUBI Nordic IAM event May 2018. The Global Growth of Digital Identity - cases studies on Digital Identity in the UK, Open Banking and The Passenger Journey.
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
http://www.gemalto.com/govt/documents/national-identity-schemes
Firstly, the national identity scheme indicates the roles of the sovereign state with regard to digital identity:
Is the state a regulator?
An issuer of sovereign identities or the digital derivatives of these identities?
What are its responsibilities within the chosen ecosystem in terms of organization, data and applications, and infrastructure?
Next, the national identity scheme establishes the underlying principles and operating methods of the digital identity ecosystem. It describes the main systems and flows linked to the use of digital identities to access services, authenticate users, and exchange and verify data linked to the service requested.
Where necessary, it provides useful details on the approved identity types and trust levels supported by the ID ecosystem. For example, commercial or transactional uses for identity may have functionalities distinct from those associated with authentication in the public domain.
It is clear that the deployment of digital identities under different national frameworks represents a dual challenge for nations, which must manage their sovereignty in the digital space while improving services to companies and citizens, in other words the framework for market interactions, and ultimately the healthy operation of the economy.
Yet reconciling market demands and sovereignty is no simple task. It requires constructive negotiation between their respective objectives.
A good example is provided by the European Union. Here, national identity schemes must be viewed in terms of both the actions of individual states, and the implementation of the eIDAS regulation (which may indicate future convergence), as well as the objectives of the European Digital Single Market and European Digital Agenda 2020 strategies.
In the end, these actions surrounding digital identity demonstrate a desire to rekindle economic growth through the more effective use of digital services, and build a single digital space of trust, offering a high level of security, interoperability and data protection.
FinTech and InsuranceTech case studies digitally transforming Europe's future with BigData and AI
The new data-driven industrial revolution highlights the need for big data technologies to unlock the potential in various application domains. The insurance and finance services industry is rapidly transformed by data-intensive operations and applications. FinTech and InsuranceTech combine very large datasets from legacy banking systems with other data sources such as financial markets data, regulatory datasets, real-time retail transactions, and more, improving financial services and activities for customers.
The document discusses identity and trust in both public and private digital systems. It notes that Estonia has a national electronic identity card system that citizens can use to access government and commercial services online. In contrast, the UK uses private companies for identity verification, limiting users to a small number of government websites. The document argues that the UK would benefit from a more integrated national identity system to improve online access and services, as seen in other countries. It also discusses upcoming EU regulations on cross-border digital identity and the need for trust frameworks in identity management systems, especially regarding cloud services.
This document summarizes an insurance fraud problem known as "double-dipping", which is when a single insurance claim is filed with multiple insurers. It discusses how existing solutions involve centralized databases that require substantial resources. The document then introduces a new solution called ClaimShare that uses artificial intelligence, confidential computing, and distributed ledger technology. ClaimShare analyzes public claim data to detect fraud and then privately matches personal data of suspicious claims across insurers on separate secure environments to confirm fraud. It is presented as addressing industry concerns about IT resources, data quality, and privacy compliance while reducing insurance fraud losses.
The European Union’s regulation on Digital Identity, eIDAS, is currently being overhauled to adopt decentralized identity principles. The goal is to provide all citizens and residents across the EU with highly secure and privacy preserving digital wallets that can be used to manage various digital credentials, from eIDs to diplomas to payment instruments. Decentralized identity principles aim at giving freedom of choice and control to the end-user. Ensuring security and interoperability, however, will be challenging — especially in the enormous scale in terms of users and use cases the EU is aiming at. The choices made in eIDAS will have a huge impact on digital identity in the EU and beyond.
The so-called “Architecture and Reference Framework” (ARF) defines the technical underpinnings of eIDAS v2. Many experts from the member states and the Commission have been working on this framework over the last year, trying to select the best combination of technologies and standards out of the enormous number available in the market today. This talk will introduce the ARF and explain what architectural patterns and technical standards are adopted and how the challenges mentioned above are addressed in order to leverage on the vision of the eIDAS v2 regulation.
The EU is developing an EU Digital Identity Wallet that will standardize digital identity across Europe. The wallet will be mandated for acceptance by public and private sectors. It restricts third party digital identity services and data custodians. While aiming to harmonize digital identity, it may fragment the landscape due to different national implementations. Banks and other organizations should prepare for its impact on digital identity and data management in Europe.
Initio at World Blockchain & Cryptocurrency Summit 2018Initio
We at Initio, went to Moscow to present our vision about How Blockchain can support businesses to be compliant with these regulations? We provided leadership insights and global best market practices to answer to this major question by focusing on the 3 hot topics in EU: GDPR, MiFID and AML. Find out more about this subject in our WBC Summit Moscow slides.
Presentation given at the Service Design and Delivery in a Digital Age - Academies for EaP countries organised by the SIGMA Programme and the GiZ Eastern Partnership Regional Fund. Topic 2: Digital transformation.
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...e-SIDES.eu
The Safe-DEED project received Horizon 2020 funding to develop secure data marketplaces. The 36-month project involves 8 partners across Europe developing privacy-preserving technologies like secure multi-party computation. The project aims to address barriers to data sharing by enhancing trust and assessing data value to incentivize sharing. If successful, the project expects to see at least 30 companies using the software in new revenue streams within 3 years.
This project received funding from the European Union to develop testbeds and sandboxes using big data and AI technologies for the finance and insurance sectors. It involves 47 participants from industry, academia, and fintechs. The project will develop 15 pilots across personalized banking, risk assessment, fraud detection, and personalized insurance. It aims to provide platforms and tools leveraging fragmented data sources to enable innovative and disruptive financial services solutions through experimentation and validation of technologies.
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
Presentation held by Arthur van der Wees (Arthur's Legal) @ SLA-Ready workshop "Are you SLA-Ready? How to understand your cloud Service Level Agreement", on 15 December 2016 in Brussels, Belgium. http://bit.ly/2fVcCG7
GDPR is moving the private data ownership from Businesses to EU residents.
GDPR is pushing businesses to re-imagine their data management systems in order to take into account the new set of rights.
GDPR costs of non-compliance are high – 4% of the global turnover or up to EUR 20 million
Off-chain database combined with a Public Blockchain can automate data management & quality systems, decrease costs of compliance, increase data flow transparency and more …
idento.one is a blockchain-based platform that gives consumers control over their personal data and facilitates exchanges of data between consumers and companies. It stores all personal data in a private blockchain managed by TÜV to ensure security and GDPR compliance. Through idento.one's dashboard, consumers can manage their personal data bank, request data from companies, grant consent for data exchanges under smart contracts, and keep track of all data transactions. This enables consumers to regain control of their data and have their data privacy and security protected.
Similar to OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certification Update (20)
OIDF Virtual Workshop -- 5/21/2020 -- OpenID Certification Program UpdateOpenIDFoundation
Joseph Heenan provided an update on the OpenID Foundation's certification program. The new Java-based conformance suite has launched in pilot mode and offers additional testing compared to the previous Python suite. Features like mutual TLS, signed requests, and certificate-bound access tokens are now supported. FAPI-RW app-to-app certification remains free until the end of June 2020. Future plans include adding JARM and PAR profile testing along with certification for additional profiles like FAPI 2 and CIBA once specifications are stable. Feedback on the new conformance suite is welcomed.
OIDF Workshop at Verizon Media -- 9/30/2019 -- FastFed Working Group UpdateOpenIDFoundation
OpenID Foundation Fast Federation (FastFed) Working Group update presented by Darin McAdams (Amazon) at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...OpenIDFoundation
George Fletcher presented Browser Changes Impacting Identity Flows at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...OpenIDFoundation
Atul Tulshibagwale with Google provided an an overview of the Continuous Access Evaluation Protocol (CAEP) at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
OIDF Workshop at Verizon Media -- 9/30/2019 -- Research & Education Working G...OpenIDFoundation
Roland Hedberg with Catalogix provided an update on the Research & Education (R&E) Working Group at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Certification Program U...OpenIDFoundation
Michael Jones with Microsoft provided an update on the OpenID Certification Program at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Working Group U...OpenIDFoundation
Michael Jones with Microsoft provided an update on the OpenID Connect Working Group at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...OpenIDFoundation
Torsten Lodderstedt with yes.com provided an overview of a proposed OpenID Foundation working group focused on identity assurance at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation UpdateOpenIDFoundation
Roland Hedberg with Catalogix and the OpenID Foudation provided an update on OpenID Connect Federation at the OIDF Workshop at Verizon Media on Monday, September 30, 2019 in Sunnyvale, CA.
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- OpenID Cer...OpenIDFoundation
Michael Jones with Microsoft provided an update on the OpenID Certification Program at the OIDF Workshop at the 2019 European Identity Conference on Tuesday, May 14, 2019 in Munich.
OIDF Workshop 4/29/2019 -- OpenID Research & Education Working Group UpdateOpenIDFoundation
Davide Vaghetti with Consortium GARR provided an update on the OpenID Foundation Research & Education (R&E) Working Group at the OIDF Workshop at Verizon Media on Monday, April 29, 2019.
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certi...OpenIDFoundation
Joseph Heenan is part of the OpenID Certification Program team provided an update on the Financial-grade API (FAPI) at the OIDF Workshop at the 2019 European Identity Conference on Tuesday, May 14, 2019 in Munich.
OpenID Connect "101" Introduction -- October 23, 2018OpenIDFoundation
This document provides an introduction to OpenID Connect and summarizes its key aspects:
1) OpenID Connect is an identity layer built on top of OAuth 2.0 that allows clients to verify the identity of users and obtain basic profile information through RESTful APIs and JSON.
2) Many major companies have already implemented OpenID Connect in their applications and websites.
3) OpenID Connect specifications cover a wide range of use cases from non-sensitive to highly secure information as well as different levels of sophistication in claims usage. Implementations can build only the required pieces.
OpenID Foundation Research & Education Working Group Update - October 22, 2018OpenIDFoundation
OpenID Foundation Research & Education (R&E) Working Group update presented by Nick Roy (Internet2) at the OpenID Foundation Workshop at VMware on Monday, October 22, 2018.
OpenID Foundation iGov Working Group Update - October 22, 2018OpenIDFoundation
OpenID Foundation iGov Working Group update presented by Paul Grassi (Easy Dynamics) and Bjorn Hjelm (Verizon) at the OpenID Foundation Workshop at VMware on Monday, October 22, 2018.
OpenID Foundation Connect Working Group Update - October 22, 2018OpenIDFoundation
OpenID Foundation Connect Working Group update presented by Michael Jones (Microsoft) at the OpenID Foundation Workshop at VMware on Monday, October 22, 2018.
OpenID Foundation Certification Program Update - October 22, 2018OpenIDFoundation
OpenID Foundation Certification Program update presented by Michael Jones (Microsoft) at the OpenID Foundation Workshop at VMware on Monday, October 22, 2018.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
OIDF Workshop at European Identity Conference 2019 -- 5/14/2019 -- FAPI Certification Update
1. OpenID Connect for
Identity Assurance
Dr. Torsten Lodderstedt
@tlodderstedt
yes®
European Identity &
Cloud Conference 2019
2. Objective
● OpenID Connect extension to allow RPs to perform Identity Verification of a
natural person
● Use Cases
○ Opening a banking account (Anti-Money Laundering Law)
○ Signing up for a prepaid mobile phone plan (Telecommunications Act)
○ Identification for access to health data (Privacy Protection, e.g. Germany’s criminal code §203)
○ Contract signing using a Qualified Electronic Signature (EU Directive on electronic
IDentification, Authentication and trust Services/eIDAS)
3. Status
● Initial submission to AB/Connect Working Group based on implementation
experience at yes.com
● Document adopted as WG Draft
● Incrementally enhanced to support requirements of different jurisdictions
(work in progress)
○ different trust frameworks
○ multiple sources for identity evidences
● Current revision: -03
● https://openid.net/specs/openid-connect-4-identity-assurance.html
6. Requesting Verified Person Data (claims Parameter)
{
...
"userinfo":{
"verified_person_data":{
"claims":{
"given_name":null,
"family_name":null,
"birthdate":null,
"nationality":null
}
}
}
...
}
Verified person data shall be
delivered by user info response
Every user claim is listed individually,
facilitating data minimization
8. Next Steps
● Seeking for contributions from other jurisdictions
● Check the concept against local regulatory and legal requirements
● Add further
○ Trust frameworks
○ Identity documents
○ Verification methods
9. Q&A!
Latest Drafts & Publications
OAuth 2.0 Security BCP
https://tools.ietf.org/html/draft-ietf-oauth-security-topics
OpenID Connect 4 Identity Assurance
https://openid.net/specs/openid-connect-4-identity-assurance.html
Transaction Authorization or why we need to re-think OAuth scopes
https://cutt.ly/oauth-transaction-authorization
Financial-grade API: Pushed Request Object
https://cutt.ly/pushed_request_object
Cross-Browser Payment Initiation Attack
https://cutt.ly/cross-browser-payment-initation
JWT Secured Authorization Response Mode for OAuth 2.0 (JARM)
https://openid.net/specs/openid-financial-api-jarm-ID1.html
OAuth 2.0 Demonstration of Proof-of-Possession at the Application Layer
https://tools.ietf.org/html/draft-fett-oauth-dpop
Dr. Torsten Lodderstedt
CTO, yes.com
torsten@yes.com
@tlodderstedt
yes®
Talk to me about
- OpenID Connect 4 Identity Assurance
- Authorization for financial and other
security-sensitive APIs
- OAuth Security (BCP & OAuth Security
Workshop)
- Working at yes.com