Preparing some paper

Here is a couple of questions I’d love to put out – if you have the time, please let me know since I am genuinely curious:

  • Who has implemented a successfully chained service, with some propagation of identity?
  • If you have, what architectural approach/technology stack have you used?
  • How are you propagating identity – “sender vouches”, “holder of key”, “just trust me”?
  • How complex is the chain? Single step, multiple steps, complex orchestration?

There are really very few actual success stories I can find on this subject … I have a sense why this could be, but I’d love to verify my suspicion.

2 thoughts

  1. Hi Eve – excellent pointer. I will take this in for sure. In fact, this is more of an answer than a requirement… to some extent even better!

Leave a Reply

Your email address will not be published. Required fields are marked *