Managing Identity Relationships

Managing Identity Relationships in a Graph to Address Complex Access Problems

Alex’s session provided real-life examples of identity relationships and their application by organizations implementing 360 views of their world-wide client base. Illustrations of how ensuring authentication and authorization challenges are addressed by IoT manufacturers trying to implement complex access rules.


Subscribe Icon

Keep updated

Don’t miss a beat from your favourite identity geeks 🤓

Trusted Onboarding and Verification

Proofing and Verification (KYC)

Integrate proofing and verification services with verified attributes, facial matching and biometrics, liveness checks and NFC id document scanning.

Trusted Authentication

Strong Authentication

Perform strong authentication with 3rd party authentication services (including biometric) services to enrich the user authentication journey and flow. 

Knowledge Based Access Control (KBAC)

Knowledge Based Access Control (KBAC)

Leverage the power of the knowledge graph to perform Dynamic Authorization - interrogating the continuously changing context, allowing for more advanced authorization use cases.