Authentication, Authorization, Non Human Identity, and more!

In this video we cover:

  • Authentication and Authorization: What's the difference?

  • Introduction to Ockam's Authentication and Authorization protocols

  • The developer experience of Ockam is 3 commands

  • How to create secure connections to customer data

  • Routing protocols in Ockam

  • Secure Channels in Ockam

  • Attribute-Based Access Control (ABAC) in Ockam

  • Revocation and rotation of credentials in Ockam

  • Identifiers, Identity, Keys, and Credentials are foundational roots of Trust in Ockam

  • Cryptography of change events in Ockam

  • Scaling Trust to Enterprise scale

Last updated

Was this helpful?