Here is a couple of questions I’d love to put out – if you have the time, please let me know since I am genuinely curious:
- Who has implemented a successfully chained service, with some propagation of identity?
- If you have, what architectural approach/technology stack have you used?
- How are you propagating identity – “sender vouches”, “holder of key”, “just trust me”?
- How complex is the chain? Single step, multiple steps, complex orchestration?
There are really very few actual success stories I can find on this subject … I have a sense why this could be, but I’d love to verify my suspicion.
Hi Gerry– I happened to just see this post from Travis Spencer: A Federation Swiss Army Knife. Does that meet your criteria?
Hi Eve – excellent pointer. I will take this in for sure. In fact, this is more of an answer than a requirement… to some extent even better!