Tag: digital identities

  • CSA: How to Manage Non-Human Identities Effectively

    Source URL: https://www.oasis.security/resources/blog/non-human-identity-management-program-guide-step-by-step Source: CSA Title: How to Manage Non-Human Identities Effectively Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the implementation of Non-Human Identity Management (NHIM) programs, highlighting practical steps organizations can take to secure digital identities—ranging from defining goals to automating lifecycle management. This is particularly relevant for professionals in…

  • Hacker News: Show HN: Open-Source Alternative to Google Sign-In That Respects Your Privacy

    Source URL: https://github.com/earthodev/eartho Source: Hacker News Title: Show HN: Open-Source Alternative to Google Sign-In That Respects Your Privacy Feedly Summary: Comments AI Summary and Description: Yes **Summary**: Eartho is an open-source, privacy-focused alternative to conventional login systems like Google Sign-In. It emphasizes user privacy by preventing data tracking and offering a range of authentication options.…

  • Hacker News: Eartho: Open-Source, Privacy-Focused Alternative to Google Sign-In

    Source URL: https://github.com/eartho-group/eartho Source: Hacker News Title: Eartho: Open-Source, Privacy-Focused Alternative to Google Sign-In Feedly Summary: Comments AI Summary and Description: Yes Summary: Eartho is an open-source authentication solution that emphasizes user privacy by acting as a layer between users and major authentication providers like Google and Facebook. This unique setup not only protects user…

  • CSA: Challenges with Managing Permissions and API Keys

    Source URL: https://cloudsecurityalliance.org/blog/2024/09/18/current-challenges-with-managing-permissions-and-api-keys Source: CSA Title: Challenges with Managing Permissions and API Keys Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a recent survey revealing significant security challenges organizations face in managing permissions and API keys as non-human identities. Notably, only a fraction employ formal processes for offboarding and rotating API keys,…