Table of Contents
- The History of Digital Identity
- Identity Management Versus Access Management
- IAM Best Practices
- Trust Anchors/Sources of Truth and Their Importance
- Historical Source of Authority
- Relationships between Trust and Risk
- Informed Consent and Why It Matters
- IAM – the Security Perspective
- Self-Sovereign Identity
- Privacy by Design in the SSI Space
- Relationship between DIDs and SSI
- Protocols and Standards – DID Standards
- DID Authentication
- Identity Verification
- Biometrics Security in Distributed Identity Management

