🌱Aadam's Garden

Search

Search IconIcon to open search

The Keys to Decentralized Identity - Okta

Last updated Feb 9, 2023

Metadata

Description

Identity is key to everything we do in a digital world: from online banking to your favorite streaming services to your workplace apps, it serves as the core of your interactions with digital systems. Decentralized identity puts control of that digital ID in the hands of the individual, replacing traditional identifiers like usernames with IDs that are self-owned and independent – but delivering on this promise is easier said than done. In this session, we’ll break down what decentralized identity is, the potential technologies that can help deliver on it, and the challenges that must be overcome to achieve it.



# Timestamped Notes

1
 https://www.youtube.com/watch?v=gWfAIYXcyH4
1
 00:00

Intro

1
 00:29

Agenda

1
 03:19

Evolution of Identity

Identity has evolved through three distinct phases:

  1. Centralized identity
  2. Federated identity
  3. Decentralized identity
    evolution_of_identity.png

Centralized identity is characterized by using a username and password to sign in to a website.

1
 05:21

Federated Identity

1
 07:32

Decentralized Identity

1
 08:04

Digital Passport

Let’s explore how Alice will obtain and use a digital passport:

  1. Alice installs an identity wallet.
  2. Alice requests a digital passport, which is stored in her wallet.
  3. Alice presents her digital passport to an airline.
  4. The airline validates the passport and confirms it belongs to Alice.
1
 09:05

Install Wallet

1
 09:55

Create Identity

1
 10:25

Obtaining a Passport

1
 11:42

Verifying a Passport

1
 12:23

Passport Presentation

1
 12:52

Verifying Alice

1
 13:23

Self-Signed Credentials

1
 13:46

Self-Sovereign Identity

1
 14:11

Trust Triangle

1
 14:20

Terminology

1
 15:37

Roles

1
 17:29

Keys to Decentralized Identity

1
 18:49

Decentralized Identity Ecosystem

1
 19:11

Wallets

1
 19:54

Decentralized Identifiers

1
 21:38

Ledgers

1
 23:17

Credentials

1
 23:44

Verifiable Credentials

1
 24:43

Credential Exchange

1
 26:05

Verifying Credentials

1
 26:19

DID Resolution

1
 27:22

Current State & Adoption

1
 27:36

Why Now?

1
 29:03

Bootstrapping a Network

1
 29:31

Company Mode

1
 30:05

Industry Mode

1
 30:38

Global Mode

1
 30:54

Technical Convergence

1
 31:26

Governance

1
 31:56

What Now?