Skip to main content
DI

Topic Hubs

Explore curated collections of books, terms, and resources organized by digital identity topic area.

Zero Trust

Explore the zero trust security model based on the principle of 'never trust, always verify.' Learn about zero trust architecture, identity-centric security, continuous verification, microsegmentation, and practical migration strategies from perimeter-based security.

6 terms4 books

Authentication

Master the methods and protocols used to verify user identity. From passwords and multi-factor authentication to OAuth 2.0, OpenID Connect, SAML, and modern passwordless approaches including passkeys and biometrics.

18 terms12 books

Authorization

Understand how access decisions are made after authentication. Covers role-based access control (RBAC), attribute-based access control (ABAC), OAuth scopes, policy engines, and the principle of least privilege.

10 terms8 books

Identity Governance

Learn about the policies, processes, and technologies that govern digital identities throughout their lifecycle. Covers identity governance and administration (IGA), access reviews, provisioning, compliance, and separation of duties.

12 terms6 books

Privacy & Compliance

Navigate the intersection of identity management and regulatory compliance. Covers GDPR, SOC 2, ISO 27001, NIST 800-63, privacy by design, consent management, and data protection impact assessments.

8 terms5 books

Cloud Identity

Manage identity and access in cloud and multi-cloud environments. Covers cloud IAM for AWS, Azure, and GCP, federation, CIAM, identity brokering, and modern identity architectures including identity mesh and identity fabric.

10 terms6 books

Decentralized Identity

Explore the emerging paradigm of self-sovereign and decentralized identity. Covers decentralized identifiers (DIDs), verifiable credentials, self-sovereign identity (SSI), and the Trust over IP stack.

3 terms2 books

Passwordless Authentication

Discover the future of authentication beyond passwords. Covers FIDO2, WebAuthn, passkeys, biometric authentication, and practical strategies for migrating from password-based to passwordless authentication.

5 terms3 books

API Security

Secure your APIs with modern authentication and authorization patterns. Covers OAuth 2.0 for APIs, token management, rate limiting, API gateways, and securing microservices architectures.

6 terms4 books

Privileged Access Management

Protect your most sensitive accounts and systems. Covers privileged access management (PAM), credential vaulting, just-in-time access, session recording, and defending against privileged attack vectors.

4 terms3 books