Consent Enforcement
Access Security Principle 3
Empower your users to exercise their right to privacy
Quid pro quo. People who want to get access to protected resources, first need to provide information about themselves. But they want to be sure that their personal information will not be misused.
This third video in our access security principles series explains how you can improve trustworthy use of identity and personal data.
Main Takeaways
- How to process someone’s data based on their consent. What are you asking them to agree to?
- Learn about the Consent Receipt Specification of the Kantara Initiative
- Ecosystem sharing covers 3 dimensions of consent: user-to-organization, user-to-user, user-to-application
Other Videos
Healthcare is Everyone’s Business
View the recorded webinar we organized together with Auht0 on June 10 on advanced identity and access management for digital healthcare ecosystems;
Videos
OAuth 2.0 Authorization framework
Learn how to scale access to multiple resources superfast, streamline the access process and reduce administrative burden.