160 likes | 264 Views
Outline. GoalsSelected LawBarriersEmerging OpportunityNetwork IdentityAuthenticationAuthorizationWeb Servers and PortalsDirectory ServicesDigital Certificates and EncryptionUser Provisioning and Identity SynchronizationIdentity ServerOne Promising Architectural PossibilityConclusion
E N D