Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

...

  1. who are our markets? prospects? clients?
  2. what have we done? for who? 
  3. where have we added value? for who? how?  VSP
  4. what are our current capabilities, solutions, services, products?
  5. what are their priority use cases they are focused on now?
  6. where is the  net value add in our offerings?
  7. what is the feedback from clients on our strengths, weakneeses?
  8. who should we partner with and why?
  9. our integration score - how easy to add our services via interfaces, call other services with interfaces, extend our services wo coding? related standards support?
  10. what other solution providers can we add value for? ( ERP, SC, FIN, HC, GOV, etc )
  11. who can add value as components, services, solutions for our offerings?
  12. what's the easiest path to sell solutions now?  >> VCRST
  13. what are strategic opportunities for our projects? 

...

FEMA Issues Survival Guide Amid Fears Of Nuclear Attack - 241204

three crucial steps: Get Inside, Stay Inside, and Stay Tuned

https://www.fema.gov/emergency-managers/national-preparedness/plan


https://emptaskforce.us/




TrustGrid Concepts


TrustGrid and Heale partner on Logistics Supply Chain

...

SSO - Single Signon to multiple sites using same credentials ( Kerberos ticket granting server model )

Open ID Connect - 

How OpenID Connect SSO Works? OpenID Connect will redirect a user to an identity provider (IdP) to check the user's identity, either by looking for an active session i.e Single Sign-On (SSO) or by asking the user to authenticate.

OpenID Connect (OIDC) is an identity authentication protocol that is an extension of open authorization (OAuth) 2.0 to standardize the process for authenticating and authorizing users when they sign in to access digital services. OIDC provides authentication, which means verifying that users are who they say they are. OAuth 2.0 authorizes which systems those users are allowed to access. OAuth 2.0 is typically used to enable two unrelated applications to share information without compromising user data. For example, many people use their email or social media accounts to sign in to a third-party site rather than creating a new username and password. OIDC is also used to provide single sign-on. Organizations can use a secure identity and access management (IAM) system like Microsoft Entra ID (formerly Azure Active Directory) as the primary authenticator of identities and then use OIDC to pass that authentication to other apps. This way users only need to sign in once with one username and password to access multiple apps.


Key Tools


Scaffolding >. Feathers, Loopback, Openapi

...