Welcome to Golden Paths


If you’re interested in why the name Golden Paths, you might want to start by looking here.

Golden path posts..

  • Part 3 – Verifiable Creds, privacy and the death of content based Identity

    In the first post, we covered OAuth, OIDC and discussed how this technology was front channel (i.e. web browser) centric and some of the limitations that presented. The follow on post about GNAP, we looked at how this proposal aims to be less browser based and also mentioned some of the privacy concerns raised by…

  • Part 2 – G’day to GNAP

    This time, we follow up from the previous post where we looked at OAuth2 and OIDC flows. Effectively starting our interaction with the /authorize call and completing our journey at /token. These URLs (amongst others) are described at the bottom of this post. The OIDC journey took us from having a unauthenticated (aka AUTHN‘d) and…

  • Part 1 – to OIDC and BEYOND!

    As another blur of a weekend draws to a close, one of the highlights was taking the family out to dine at a new local eatery. The place in question had invited other local business owners to eat there before their formal opening. This is a common trail run approach, to test procedures with a…