Q: What are some real-world authorization policies that would need to be supported by transitive identity? What higher level business goals are driving those policies (eg. specific compliance requirements like PCI?).
Q: How “transitive” does identity need to be to support these policies? How deep is the “call stack” of a message being passed between them? Does the identity of each distinct workload that the service passes through matter?
Q: What existing protocols are used for message transfer that this system would need to be compatible with?
Hey there,As you hopefully read from my earlier e-mail, the aim of this group is to explore real-world customer demands for transitive identity, in order to determine the requirements terse (if any) this might make of the SPIFFE project.
--
To unsubscribe from this group and stop receiving emails from it, send an email to transitive-identi...@spiffe.io.