-
### User Story:
As a CDC project, I should align with the CDC on the standardization and authorization approach of my applications.
### Description/Use Case
**Turn RS Auth Code into Building Bl…
-
Currently in the federated identity landscape of today end-user identities are mostly scoped/tied to the IDP that creates and manages them. This can be a problematic relationship because end-users can…
-
### User Story
As a sender onboarded to ReportStream, I want to be authorized to hit the submissions endpoint
### Description/Use Case
We want to only allow authorized senders to hit the submissi…
-
As I've been working on the Rust implementation of Multihash, it came up that the identity hash currently doesn't specify any limits. From an optimization perspective (this is why it came up in Rust),…
-
Quantum computers have the potential to break many of the cryptographic algorithms that are currently used to secure communications and protect data. This is because quantum computers can perform cert…
-
### User Story:
As ReportStream, I should have a documented long-term strategy for authorization and authentication for both user->RS and machine->RS interfaces.
### Description/Use Case
Presen…
-
_Medium note: To my knowledge, the Azimuth network has no equivalent of the pre-Azimuth public fora, so I'm posting this here._
_Formatting note: If it does, at any rate I can't find it, and in par…
-
**Is your feature request related to a problem? Please describe.**
No
**Describe the solution you'd like**
Support for [AWS CUR 2.0](https://aws.amazon.com/blogs/aws-cloud-financial-management/in…
-
Please find attached a decision proposal on authentication uplift. This decision proposal will cover the first tranche of authentication uplift (Phase 1) and is seeking preliminary feedback that will …
-
The current SimpleSidetreeAnchor.sol does not store the anchoring elements in the smart contract such that they could be verified by a 3rd party. Suggest to amend the contract the following way:
`p…