<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IGA Archives - IDPro</title>
	<atom:link href="https://idpro.org/tag/iga/feed/" rel="self" type="application/rss+xml" />
	<link>https://idpro.org/tag/iga/</link>
	<description>The Professional Organization for Digital Identity Management</description>
	<lastBuildDate>Tue, 28 Oct 2025 19:20:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://idpro.org/wp-content/uploads/2023/07/cropped-idpro_stickerA-circle-100-32x32.jpg</url>
	<title>IGA Archives - IDPro</title>
	<link>https://idpro.org/tag/iga/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>IGA Connectors: The Bridge Between Policy and Execution</title>
		<link>https://idpro.org/iga-connectors/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Tue, 28 Oct 2025 19:07:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[IGA]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2883</guid>

					<description><![CDATA[<p>An Identity Governance and Administration (IGA) platform serves as the central authority for defining and enforcing access policies. However, its [&#8230;]</p>
<p>The post <a href="https://idpro.org/iga-connectors/">IGA Connectors: The Bridge Between Policy and Execution</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>An Identity Governance and Administration (IGA) platform serves as the central authority for defining and enforcing access policies. However, its effectiveness is entirely dependent on its ability to communicate with the diverse landscape of target systems—applications, databases, and infrastructure—where digital identities and permissions are managed. This bridge is established and maintained by connectors.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="521" src="https://idpro.org/wp-content/uploads/2025/10/image-1024x521.jpeg" alt="" class="wp-image-2884" srcset="https://idpro.org/wp-content/uploads/2025/10/image-1024x521.jpeg 1024w, https://idpro.org/wp-content/uploads/2025/10/image-300x153.jpeg 300w, https://idpro.org/wp-content/uploads/2025/10/image-768x391.jpeg 768w, https://idpro.org/wp-content/uploads/2025/10/image-1536x781.jpeg 1536w, https://idpro.org/wp-content/uploads/2025/10/image.jpeg 1600w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>A connector functions as a specialized software component that translates the IGA platform&#8217;s generalized commands (e.g., &#8220;assign role&#8221;) into the specific protocol and data format required by a target system (e.g., a specific API call or LDAP modification). It bridges the gap between abstract policy and technical implementation, enabling automated, auditable, and consistent governance. Without connectors, an IGA platform would be unable to perform its core functions of visibility and control over the enterprise IT environment.</p>



<h2 class="wp-block-heading"><strong>The Core Functions of a Connector</strong></h2>



<p>Connectors facilitate a continuous cycle of governance through three primary functions: aggregation, provisioning, and verification.</p>



<p>1. Aggregation (The &#8220;Read&#8221; Function)&nbsp;</p>



<p>Aggregation, also known as reconciliation, is the process of pulling identity, account, and entitlement data from a target system into the IGA platform. This foundational function builds and maintains a centralized, unified view of access rights across the organization. This data is essential for:</p>



<ul class="wp-block-list">
<li>&nbsp;Visibility and Reporting: Providing a single source of truth for who has access to what.</li>



<li>&nbsp;Access Certifications: Supplying managers and asset owners with the data needed to conduct periodic access reviews.</li>



<li>&nbsp;Policy Evaluation: Detecting access that violates established policies, such as Separation of Duties (SoD).</li>
</ul>



<p>2. Provisioning (The &#8220;Write&#8221; Function)&nbsp;</p>



<p>Provisioning is the process of executing commands from the IGA platform onto the target system to grant, modify, or revoke access. Triggered by identity lifecycle events (e.g., joiner, mover, leaver), provisioning automates access changes. The connector translates a logical request from the IGA platform into the precise technical operations required by the target system, such as:</p>



<ul class="wp-block-list">
<li>&nbsp;Create: Creating a new user account.</li>



<li>&nbsp;Update: Modifying user attributes or adding/removing entitlements (e.g., roles, group memberships).</li>



<li>&nbsp;Delete/Disable: Deactivating or deleting an account upon user departure to remove access promptly.</li>
</ul>



<p>3. Near-real-time Verification (The &#8220;Check&#8221; Function)&nbsp;</p>



<p>After a provisioning action is sent, a robust connector performs verification. It queries the target system to confirm that the requested change was successfully applied. This closed-loop reconciliation is critical for maintaining data integrity and providing a reliable audit trail, ensuring that the state recorded in the IGA platform accurately reflects the permissions in the target system.</p>



<h2 class="wp-block-heading"><strong>Connector Implementation Models</strong></h2>



<p>Because no two enterprise environments are alike, connectors are available in two primary models:</p>



<ul class="wp-block-list">
<li>&nbsp;Out-of-the-Box (OOTB): These are pre-built, vendor-supported connectors designed for common commercial and enterprise systems (e.g., Microsoft Entra ID, Salesforce, SAP). They are generally preferred for their rapid deployment, reliability, and ongoing maintenance by the vendor.</li>



<li>&nbsp;Custom: For homegrown applications, legacy systems, or niche platforms without OOTB support, custom connectors must be developed. They extend governance to all critical assets but require an initial development investment and ongoing maintenance by the organization.</li>
</ul>



<h2 class="wp-block-heading"><strong>The Connector Framework: Enabling Scalable and Customized Integration</strong></h2>



<p>Modern IGA platforms include a Common Connector Framework (CCF) to standardize and accelerate the development of custom connectors. Rather than building from scratch, developers use the framework to apply business-specific logic to pre-built templates that handle common protocols (e.g., REST/SOAP, SCIM, SQL).</p>



<ul class="wp-block-list">
<li>&nbsp;Aggregation Rules: Custom logic can be used to transform inbound data into a consistent format for the IGA platform. This includes normalizing data (e.g., mapping location codes to full names) or correlating low-level permissions into a single, business-friendly entitlement.</li>



<li>&nbsp;Provisioning Rules: Custom logic can translate a single IGA directive into a complex series of operations required by the target system. For example, a &#8220;Create User&#8221; event can trigger a rule that executes multiple, sequential API calls to build an account, assign a profile, and set initial security parameters.</li>
</ul>



<h2 class="wp-block-heading"><strong>The Evolution to Intelligent Connectors</strong></h2>



<p>The integration of Artificial Intelligence (AI) and Machine Learning (ML) is transforming connectors from procedural intermediaries into intelligent agents that enhance governance.</p>



<p>Key AI-Driven Capabilities:</p>



<ul class="wp-block-list">
<li>&nbsp;Intelligent Aggregation and Role Mining: AI algorithms can analyze aggregated entitlement data to discover hidden access patterns, identify orphaned accounts, and recommend optimized business roles based on usage and clustering.</li>



<li>&nbsp;Predictive and Risk-Based Provisioning: ML models can predict the access a new user will likely require based on peer analysis, accelerating onboarding. They can also assess the real-time risk of an access request and trigger step-up authentication or additional approvals before the connector executes the change.</li>



<li>&nbsp;Self-Healing and Adaptive Operations: An intelligent connector can autonomously handle transient failures (e.g., by retrying a command if a target system is temporarily unavailable) and detect API changes in SaaS applications to flag potential integration failures before they occur.</li>



<li>Behavioral Analytics (UBA): By analyzing logs and usage data, AI can establish a baseline of normal user activity. Deviations from this baseline can trigger an alert, an automated access review, or a temporary suspension of access via the connector, enabling a shift from periodic to continuous, risk-based access verification.</li>
</ul>



<p>Key Considerations for Advanced Connectors: The efficacy of AI-driven IGA depends on high-quality data. Organizations must also address challenges related to model explainability for auditors, the potential for perpetuating historical bias, and the added complexity of implementation.</p>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>Connectors are a foundational component of any IGA architecture. They are the essential infrastructure that translates policy into practice. The evolution of connectors—from standard OOTB integrations to customizable frameworks and, ultimately, to AI-enhanced intelligent agents—is critical for enabling organizations to build a proactive, secure, and efficient identity governance program capable of addressing the challenges of the modern digital enterprise.</p>



<p><em>Disclaimer: The views expressed in the content are solely those of the author and do not necessarily reflect the views of the IDPro organization.</em></p>



<h2 class="wp-block-heading">About the author</h2>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<figure class="wp-block-image size-large is-resized"><img decoding="async" width="683" height="1024" src="https://idpro.org/wp-content/uploads/2025/10/WM2_0942-683x1024.jpg" alt="" class="wp-image-2885" style="width:250px" srcset="https://idpro.org/wp-content/uploads/2025/10/WM2_0942-683x1024.jpg 683w, https://idpro.org/wp-content/uploads/2025/10/WM2_0942-200x300.jpg 200w, https://idpro.org/wp-content/uploads/2025/10/WM2_0942-768x1152.jpg 768w, https://idpro.org/wp-content/uploads/2025/10/WM2_0942-1024x1536.jpg 1024w, https://idpro.org/wp-content/uploads/2025/10/WM2_0942-1365x2048.jpg 1365w, https://idpro.org/wp-content/uploads/2025/10/WM2_0942.jpg 1600w" sizes="(max-width: 683px) 100vw, 683px" /></figure>



<p>Mr. Anant Wairagade is an internationally recognized Senior Cybersecurity Engineer and independent researcher with a Bachelor of Engineering in Computer Science. His expertise lies in a niche and highly visible field within the software industry: enterprise-scale identity and access management, with a particular emphasis on cloud security, zero-trust architectures, and the application of artificial intelligence. His significant contributions to this field, demonstrated through his publications, technical program committee work, and impactful achievements at American Express and other major corporations, have earned him a reputation as an expert in a specialized area.</p>
</div>



<figure class="wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img decoding="async" width="600" height="600" data-id="2436" src="https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member.png" alt="" class="wp-image-2436" srcset="https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member.png 600w, https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/11/IDPro_BoK_Badges_R5__Member-320x320.png 320w" sizes="(max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="2390" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-2390" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</figure>
<p>The post <a href="https://idpro.org/iga-connectors/">IGA Connectors: The Bridge Between Policy and Execution</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identity and Human Rights</title>
		<link>https://idpro.org/identity-and-human-rights/</link>
		
		<dc:creator><![CDATA[Heather Flanagan]]></dc:creator>
		<pubDate>Thu, 28 Dec 2023 14:14:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[idpro]]></category>
		<category><![CDATA[IGA]]></category>
		<category><![CDATA[newsletter]]></category>
		<category><![CDATA[UNDP]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=2465</guid>

					<description><![CDATA[<p>Digital identity systems have been a core component of organizations in every sector and around the world. Here at IDPro, [&#8230;]</p>
<p>The post <a href="https://idpro.org/identity-and-human-rights/">Identity and Human Rights</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Digital identity systems have been a core component of organizations in every sector and around the world. Here at IDPro, we often focus on the enterprise and consumer end of things. Workforce identity and CIAM are the bread and butter of most IDPro members. But we’ve always known that digital identity is more than just a department or a role at a company. It’s truly the foundation of our digital lives.</p>



<h2 class="wp-block-heading">Identity and Human Rights</h2>



<p>The Universal Declaration of Human Rights enshrines the concept of recognition as a person before the law as a fundamental human right. Digital identity is a new aspect of that fundamental right, a topic covered by Elizabeth Garber and Mark Haine in the white paper “<a href="https://openid.net/human-centric-digital-identity-whitepaper/">Human-Centric Digital Identity: for Government Officials.</a>” This right has also inspired the United Nations Development Programme (UNDP) <a href="https://www.governance4id.org/">Model Governance Framework for Digital Legal Identity System</a>.&nbsp;</p>



<p>Source: UNDP Digital Legal ID Governance website &#8211; <a href="https://www.governance4id.org/">https://www.governance4id.org/</a>&nbsp;</p>



<h2 class="wp-block-heading">Digital Identity and the United Nations</h2>



<p>It might seem like a big stretch to go from our day-to-day worries about our IAM systems to a governance framework designed for governments worldwide to adapt as they build their digital identity programs, but it’s happening. The UNDP argues that there is a significant social and economic benefit for governments to digitize their identity programs and close the identity gap. Just in financial services alone, a strong digital public infrastructure is expected to <a href="https://www.undp.org/digital/blog/human-and-economic-impact-digital-public-infrastructure">speed up growth by 20-33%</a>.&nbsp;</p>



<p>Think about it. Our little corner of the world, which focuses on a specialty so young you almost certainly don’t have a degree in it, is now a core aspect of global economic growth!</p>



<h2 class="wp-block-heading">Eight Core Themes</h2>



<p>So, what does the UNDP’s framework look like? As expected of the UN, they are taking a broad approach that considers all elements of society. Specifically, they offer guidance on:</p>



<ul class="wp-block-list">
<li>Equality and Non-Discrimination</li>



<li>Accountability and the Rule of Law</li>



<li>Legal and Regulatory Framework</li>



<li>Capable Institutions</li>



<li>Data Protection and Privacy</li>



<li>User Value</li>



<li>Procurement and Anti-Corruption</li>



<li>Participation and Access to Information</li>
</ul>



<p>The UNDP model comes from their legal identity AND digital public infrastructure efforts, which is the right combination of organizations to bring together. Digital transformation is a bit of a buzzword, and yet, that’s what is happening. The UNDP is trying to help provide some guidance so countries are at least somewhat going in the same direction. They’ve already noted that there are at least as many failed identity programs as successful ones, usually because of inadequate governance.&nbsp;</p>



<p>Digital identity always comes down to governance.</p>



<h2 class="wp-block-heading">Applying the Framework</h2>



<p>We can always learn from others, and we have an opportunity, regardless of what sector we work in, to learn from the UNDP framework. While targeted towards governments and civil society, there is quite a bit here that the public sector can apply to their IGA programs. The need to take into account as a foundational principle the need to support equity and diversity is one example. Another is ensuring the systems and programs are adequately funded and clear of undue influence.&nbsp;</p>



<h2 class="wp-block-heading">Wrap Up</h2>



<p>So why is this a Letter from Leadership post (which we&#8217;re also posting to the blog)? Because identity governance is our space and everyone in this organization has an opportunity to be a leader in ensuring the identity programs they are part of are well-designed and developed. So, as one leader to the next (that’s you), I hope you take a few moments to think about this bigger picture and how you can make the governance of the identity systems around you better.</p>



<p></p>



<h2 class="wp-block-heading">Author</h2>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="244" height="246" src="https://idpro.org/wp-content/uploads/2022/07/Heather-Flanagan.png" alt="" class="wp-image-1781" srcset="https://idpro.org/wp-content/uploads/2022/07/Heather-Flanagan.png 244w, https://idpro.org/wp-content/uploads/2022/07/Heather-Flanagan-150x150.png 150w" sizes="auto, (max-width: 244px) 100vw, 244px" /></figure>



<p><small>Heather Flanagan, Acting Executive Director and Principal Editor for IDPro (and Principal at Spherical Cow Consulting) comes from a position that the Internet is led by people, powered by words, and inspired by technology. She has been involved in leadership roles with some of the most technical, volunteer-driven organizations on the Internet, including the IETF, IAB, and IRTF as RFC Series Editor, ICANN as a Technical Writer, and REFEDS as Coordinator, just to name a few. If there is work going on to develop new Internet standards, or discussions around the future of digital identity, she is interested in engaging in that work.</small></p>



<figure class="wp-block-gallery has-nested-images columns-6 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1984" src="https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge.png" alt="" class="wp-image-1984" srcset="https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge.png 600w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-300x300.png 300w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-150x150.png 150w, https://idpro.org/wp-content/uploads/2022/10/BoK-Committee-Badge-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="1862" src="https://idpro.org/wp-content/uploads/2022/08/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-1862" srcset="https://idpro.org/wp-content/uploads/2022/08/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2022/08/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2022/08/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2022/08/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="2272" src="https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Founding_Member.png" alt="" class="wp-image-2272" srcset="https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Founding_Member.png 600w, https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Founding_Member-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Founding_Member-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Founding_Member-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="2273" src="https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Certification_Committee_Member.png" alt="" class="wp-image-2273" srcset="https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Certification_Committee_Member.png 600w, https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Certification_Committee_Member-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Certification_Committee_Member-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/06/IDPro_BoK_Badges_R5__Certification_Committee_Member-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="2389" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Editorial_Committee_Member.png" alt="" class="wp-image-2389" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Editorial_Committee_Member.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Editorial_Committee_Member-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Editorial_Committee_Member-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Editorial_Committee_Member-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="600" height="600" data-id="2390" src="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png" alt="" class="wp-image-2390" srcset="https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author.png 600w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-300x300.png 300w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-150x150.png 150w, https://idpro.org/wp-content/uploads/2023/10/IDPro_BoK_Badges_R5__Newsletter_Author-320x320.png 320w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>
</figure>
<p>The post <a href="https://idpro.org/identity-and-human-rights/">Identity and Human Rights</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Identiverse® 2022</title>
		<link>https://idpro.org/identiverse-2022/</link>
		
		<dc:creator><![CDATA[VTM Web Services]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 19:22:15 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[auth&#039;n]]></category>
		<category><![CDATA[auth&#039;z]]></category>
		<category><![CDATA[call for presentations]]></category>
		<category><![CDATA[ciam]]></category>
		<category><![CDATA[conferences]]></category>
		<category><![CDATA[devops]]></category>
		<category><![CDATA[digital identity]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[engineering]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[iam]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[identiverse]]></category>
		<category><![CDATA[identiverse expo]]></category>
		<category><![CDATA[idpro]]></category>
		<category><![CDATA[IGA]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[OED]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[self-sovereign]]></category>
		<category><![CDATA[trust]]></category>
		<guid isPermaLink="false">https://idpro.org/?p=1383</guid>

					<description><![CDATA[<p>Identiverse 2022 is slated for June 21-24 in Denver, Colorado, and is anticipated to operate as a mainly in-person event.&#160; [&#8230;]</p>
<p>The post <a href="https://idpro.org/identiverse-2022/">Identiverse® 2022</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><a href="https://identiverse.com/">Identiverse 2022</a> is slated for June 21-24 in Denver, Colorado, and is anticipated to operate as a mainly in-person event.&nbsp; As with every year, the bulk of the agenda will be put together from proposals received through the open and public Call for Presentations (CFP), which will open for submissions in early December, and run until early January.&nbsp; The content committee will then review submissions, and proposers will be notified of decisions in February 2022.</p>



<p>The conference this year will have a particular focus on Trust, which the Oxford English Dictionary primarily defines as a “Firm belief in the reliability, truth, or ability of someone or something; confidence or faith in a person or thing, or in an attribute of a person or thing.”</p>



<p>Questions of trust lie at the very foundation of our identity systems.&nbsp; We trust standards bodies to develop protocols that will be useful, practical and secure.&nbsp; We trust developers and vendors to build products, solutions and services that will implement those standards in performant, scalable and extensible ways.&nbsp; We trust providers to deliver robust services that we and our customers can rely on. &nbsp; We trust executives to listen and to support and fund the crucial work that we do.&nbsp; And, of course, we develop and implement mitigations in case our trust is misplaced.</p>



<p>But trust is broader than this; and trust goes both ways.&nbsp; As consumers and as citizens, we would like to trust that organisations won’t collect information they don’t need; that they will handle that data safely and properly; that they will keep pace with rapidly evolving best-practices in identity, security and privacy.&nbsp; A world in which that trust is not assured is an uncomfortable world at best; and many people today live, work or interact in circumstances which are not inherently trustworthy.&nbsp;</p>



<p>The OED has a secondary definition of Trust.&nbsp; “To take on (also upon) trust (formerly also †to take up in (also upon) trust&nbsp; †to receive in trust and variants): to believe or accept a statement, story, etc., <strong>without seeking verification or evidence for it.</strong>” (Emphasis added).&nbsp;&nbsp;</p>



<p>Over the past 24 months, we’ve seen an explosion in digital identity assurance and verification programs.&nbsp; Mobile drivers’ licenses, COVID and other healthcare passes and certificates, digital boarding cards, facial recognition for age verification and in-store check-out… the list is long, and it is growing.&nbsp; As a result, we’re also seeing an explosion of interest in governance and interoperability within and between use-cases and sectors: trust frameworks, attribute mapping and matching, account linking and more besides.</p>



<p>These advances hold great promise to make our lives more efficient and connected; to reduce friction, and fraud, and risk.&nbsp; But a balance is needed, too.&nbsp; Trust is a fragile thing—hard to gain, easy to lose, difficult to rebuild.&nbsp; Organisations and institutions must take care not to overstep the bounds of our trust, lest they lose our engagement and, in the end, our support.</p>



<p>Trust is an important topic, but it’s certainly not the only issue of note in the industry!&nbsp; The topic focus each year for Identiverse infuses but does not dictate the agenda and the event.&nbsp; New and emerging standards and architectures; deployment stories and leading practices; identity for connected devices; new approaches to privacy, security, devops, engineering; sector-specific identity practices in healthcare, manufacturing, government, education, financial services and more; and specific identity-related disciplines like CIAM, auth’n, auth’z, self-sovereign, IGA…. That list barely scratches the surface: and your proposals on these and many other topics will inform and contribute to the agenda.</p>



<p>This year’s content committee and I look forward to seeing your proposals; and I trust that we’ll be able to get together in person in Denver in June.</p>



<div class="wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile is-vertically-aligned-top" style="grid-template-columns:auto 19%"><figure class="wp-block-media-text__media"><img decoding="async" src="https://lh5.googleusercontent.com/TH3k9JPXg2pOhoYOOhcFtcLL3G7ilYWtW2JV2RjdMyFnXNbBOXIpSsr79LUJm0xnuOuRuEgZtc-O_j5CoeBOL2NKlhVeKFvv3CE56e-Hxwd2jZabM2gFvJU-rK8M6wvhJE2Vk2ow" alt=""/></figure><div class="wp-block-media-text__content">
<h3 class="has-text-align-right wp-block-heading"><strong><em>Andrew Hindle</em></strong></h3>



<h4 class="has-text-align-right wp-block-heading"><strong><em>Independent Consultant, Board Member IDPro</em></strong></h4>
</div></div>



<p>Andrew is an independent consultant specialising in digital identity, cyber security and privacy. He is a founding member, and Chair of the Board, of IDPro; he participates as a voting member of the User Managed Access Working Group at Kantara; and he is an active member of the Open Identity Foundation (OIDF).  Since 2015, he has been Content Chair for Identiverse®. Andrew has over 20 years experience in the software industry in a range of technical sales, pre-sales, product marketing and business development roles. He maintains CIPP/E, CIPM and CIPT privacy certifications with the IAPP; a CIDPRO certification from IDPro; and holds a BA in Oriental Studies (Japanese) from Oxford University and an advanced professional diploma in corporate governance. Outside of the world of identity, Andrew is Chair of Trustees for his local scouting group, rides regularly with a local road cycling group, and plays keyboard, guitar and bassoon (not at the same time) with more enthusiasm than skill, and for an audience of one. Andrew is based in the UK.</p>



<figure class="wp-block-gallery columns-3 wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-5.png" alt="" data-id="1389" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-5.png" data-link="https://idpro.org/?attachment_id=1389" class="wp-image-1389"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-6.png" alt="" data-id="1390" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-6.png" data-link="https://idpro.org/?attachment_id=1390" class="wp-image-1390"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-4.png" alt="" data-id="1388" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-4.png" data-link="https://idpro.org/?attachment_id=1388" class="wp-image-1388"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-3.png" alt="" data-id="1387" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-3.png" data-link="https://idpro.org/?attachment_id=1387" class="wp-image-1387"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-2.png" alt="" data-id="1386" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-2.png" data-link="https://idpro.org/?attachment_id=1386" class="wp-image-1386"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image-1.png" alt="" data-id="1385" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image-1.png" data-link="https://idpro.org/?attachment_id=1385" class="wp-image-1385"/></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="110" height="110" src="https://idpro.org/wp-content/uploads/2021/11/image.png" alt="" data-id="1384" data-full-url="https://idpro.org/wp-content/uploads/2021/11/image.png" data-link="https://idpro.org/?attachment_id=1384" class="wp-image-1384"/></figure></li></ul></figure>
<p>The post <a href="https://idpro.org/identiverse-2022/">Identiverse® 2022</a> appeared first on <a href="https://idpro.org">IDPro</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: idpro.org @ 2026-04-02 16:28:21 by W3 Total Cache
-->