Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

...

Reference_description_with_linked_URLs_______________________Notes______________________________________________________________















Trust Value Concepts


Key platform needs - trustless, secure, private, confidential, resilient, recoverable,  any-protocol, everytime messaging, decentralized, governed, riskless, finalized transactions, D.ODS for identity, data, docs is decentralized 

most user analytics normally run from a data warehouse or lake warehouse depending on complexity and speed required

...

Vitalik Buterin -- the-meaning-of-decentralization

Value Chain Model 


Community > Value Activities > Opportunities > Solution Strategies > Capabilities > Products and Services > 

m Consulting Process

VCE > Value Chain Economies: micro economies for value-chain communities ( VCC )


Articles on platform needs, challenges, opportunities, solutions

...

FEMA Issues Survival Guide Amid Fears Of Nuclear Attack - 241204

three crucial steps: Get Inside, Stay Inside, and Stay Tuned

https://www.fema.gov/emergency-managers/national-preparedness/plan


https://emptaskforce.us/




TrustGrid Concepts


TrustGrid and Heale partner on Logistics Supply Chain

...

SSO - Single Signon to multiple sites using same credentials ( Kerberos ticket granting server model )

Open ID Connect - 

How OpenID Connect SSO Works? OpenID Connect will redirect a user to an identity provider (IdP) to check the user's identity, either by looking for an active session i.e Single Sign-On (SSO) or by asking the user to authenticate.

OpenID Connect (OIDC) is an identity authentication protocol that is an extension of open authorization (OAuth) 2.0 to standardize the process for authenticating and authorizing users when they sign in to access digital services. OIDC provides authentication, which means verifying that users are who they say they are. OAuth 2.0 authorizes which systems those users are allowed to access. OAuth 2.0 is typically used to enable two unrelated applications to share information without compromising user data. For example, many people use their email or social media accounts to sign in to a third-party site rather than creating a new username and password. OIDC is also used to provide single sign-on. Organizations can use a secure identity and access management (IAM) system like Microsoft Entra ID (formerly Azure Active Directory) as the primary authenticator of identities and then use OIDC to pass that authentication to other apps. This way users only need to sign in once with one username and password to access multiple apps.


Key Tools


Scaffolding >. Feathers, Loopback, Openapi

...