The Three Cyber-Bogatyrs: Identification, Authentication, and Authorisation

  • 40 min

What do a medieval Russian hero, a hacker attack, and your banking app have in common? They all obey the ancient (and not-so-ancient) laws of identification, authentication, and authorisation.

In this talk, we’ll:

Explore why OAuth 2.0 is the “magic sword” of the Internet, while SAML is the “sealed scroll” of corporations.

Discover how Kerberos (not Cerberus’ dog, the protocol) guards data better than the walls of Kyiv.

Learn why LDAP is the “battle ledger” containing every warrior’s name in cyberspace.


Are you ready for the battle to secure your digital realm?

Comments ({{Comments.length}})
  • {{comment.AuthorFullName}}
    {{comment.AuthorInfo}}
    {{ comment.DateCreated | date: 'dd.MM.yyyy' }}

To leave a feedback you need to

or
Chat with us, we are online!