Building a Rich Workload Identity Stack with SPIFFE and OPA
Facebook X LinkedIn

Building a Rich Workload Identity Stack with SPIFFE and OPA

Combined Session
Thursday, May 11, 2023 12:00—13:00
Location: A 05-06

Building a Rich Workload Identity Stack with SPIFFE and OPA

What’s the highest value platform feature you can offer your Kubernetes tenants? It might be standardizing workload identity and policy controls. In this session, we will discuss desirable properties for a workload identity and present a modern architecture built on SPIFFE and cert-manager which uses Open Policy Agent (OPA) for policy decisions. This should leave you with actionable ideas to help you re-evaluate your workload identity functionality and security posture.

Building a Rich Workload Identity Stack with SPIFFE and OPA
Event Recording
Building a Rich Workload Identity Stack with SPIFFE and OPA
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Building a Rich Workload Identity Stack with SPIFFE and OPA
Presentation deck
Building a Rich Workload Identity Stack with SPIFFE and OPA
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Charlie Egan
Charlie Egan
Styra
Charlie has been working with in the Cloud Native space since 2018. He currently works as a Developer Advocate at Styra and on the OPA project. Charlie is interested in authentication and...

Cloud Signatures for the New eIDAS Wallet Ecosystem

To enhance interoperability between digital identity schemes and digital trust services across borders, the eIDAS regulation provides a legal framework for electronic signatures in the EU, defining how to use them to ensure their validity across Europe. eIDAS2 now includes plans for the creation of a European Digital Identity Wallet (EUDIW). Cloud signatures are expected to play a vital role across this new ecosystem by enabling natural and legal persons to electronically sign and seal documents and transactions with high-assurance remote digital signing certificates. Cloud signatures based on the Cloud Signature Consortium (CSC) Standard can help achieve cross-border interoperability via specifications and certification for the usage of Remote Electronic Signatures and Seals in this new pan-European digital identity ecosystem.

Join us to learn about the new CSC Standard general architectural framework in specific eIDAS context (Kim Nguyen, CSC Board Member, D-Trust) and for a technical deep-dive into the recently launched CSC Standard version 2.0 (Luigi Rizzo, Chair of the CSC Technical Committee, InfoCert).

Cloud Signatures for the New eIDAS Wallet Ecosystem
Event Recording
Cloud Signatures for the New eIDAS Wallet Ecosystem
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Cloud Signatures for the New eIDAS Wallet Ecosystem
Presentation deck
Cloud Signatures for the New eIDAS Wallet Ecosystem
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Kim Nguyen
Dr. Kim Nguyen
D-Trust GmbH
Dr. Kim Nguyen studied mathematics and physics at the universities of Göttingen (Germany) and Cambridge (UK) and received a Ph.D. in mathematics for his work on the relation between...
Luigi Rizzo
Luigi Rizzo
Cloud Signature Consortium
Luigi Rizzo studied Electronic Engineering at the University of Padua, Italy, where he received his master’s degree in 1988. Later he focused on the fields of security, cryptography, PKI,...

Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control

Graph is having its moment and rightfully so. Regulatory challenges, overly complex authorization scenarios and retrofitting legacy programs to meet new business needs are squeezing businesses. Implementing a graph-based approach can remove these obstacles and reduce risk. 

But for many businesses, this is where graph-based implementations start and stop. 

In this session, we will discuss how to turnidentity data into identity knowledge and what that can deliver. We will dive into data models that drive contextual and real-time decisions - data models which are foundational for enabling complex authorization use cases and beyond. 

Finally, we will explore the benefits of graph-based deployments in your existing environments, including the value of a holistic and visually simplified data model and avoiding the accidental architecture challenge

Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control
Event Recording
Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control
Presentation deck
Avoiding Accidental Architecture - Implementing Graph-Based IAM & CIAM goes Beyond Better Access Control
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Måns Håkansson
Måns Håkansson
Indykite
Måns is a long-time veteran in the IAM space. In the last few years, he has been focused on authorization management working for companies such as PlainID and Axiomatics. Before that, he held...
Subscribe for updates
Please provide your email address