Access Security Principle 3
Empower your users to exercise their right to privacy
Quid pro quo. People who want to get access to protected resources, first need to provide information about themselves. But they want to be sure that their personal information will not be misused.
This third video in our access security principles series explains how you can improve trustworthy use of identity and personal data.
- How to process someone’s data based on their consent. What are you asking them to agree to?
- Learn about the Consent Receipt Specification of the Kantara Initiative
- Ecosystem sharing covers 3 dimensions of consent: user-to-organization, user-to-user, user-to-application
Healthcare is Everyone’s Business
View the recorded webinar we organized together with Auht0 on June 10 on advanced identity and access management for digital healthcare ecosystems;
OAuth 2.0 Authorization framework
Learn how to scale access to multiple resources superfast, streamline the access process and reduce administrative burden.
Relationship-based Access Control
Learn how you can empower your teams or customers to share access without sharing passwords. Watch the second video of our access security principle series.