Authentication, Authorization, Non Human Identity, and more!
In this video we cover:
Authentication and Authorization: What's the difference?
Introduction to Ockam's Authentication and Authorization protocols
The developer experience of Ockam is 3 commands
How to create secure connections to customer data
Routing protocols in Ockam
Secure Channels in Ockam
Attribute-Based Access Control (ABAC) in Ockam
Revocation and rotation of credentials in Ockam
Identifiers, Identity, Keys, and Credentials are foundational roots of Trust in Ockam
Cryptography of change events in Ockam
Scaling Trust to Enterprise scale
Last updated
Was this helpful?