Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Exploring/developing deployment models for using external identities in a variety of risk profiles,
  • Identifying and examining the components which are needed to make external identities useful across a broad array of services,
  • Moving towards the goal of making external identities as useful and trusted as those managed internally.
  • Exploring account linking
  • Understanding differences between external identities and locally assigned identities
  • Exploring approaches to raising the trust associated with external identities (references to other work on trust elevation, e.g. OASIS Trust Elevation Subcommittee)

...