Here is a couple of questions I’d love to put out – if you have the time, please let me know since I am genuinely curious:
- Who has implemented a successfully chained service, with some propagation of identity?
- If you have, what architectural approach/technology stack have you used?
- How are you propagating identity – “sender vouches”, “holder of key”, “just trust me”?
- How complex is the chain? Single step, multiple steps, complex orchestration?
There are really very few actual success stories I can find on this subject … I have a sense why this could be, but I’d love to verify my suspicion.