Secure APIs with FastAPI and the Microsoft Identity Platform Transcripts
Chapter: Introduction to Identity
Lecture: What is identity?
0:00 Before we move forward we need to understand what identity is. Identity is
0:06 A set of characteristics or properties that can be used to uniquely identify a person.
0:12 We all have multiple identities that are highly dependent on context at work. I'm a developer at home, I'm a dad and a husband and when I travel
0:22 I'm a US citizen and so on. In the real world, proving your identity is usually pretty straightforward.
0:29 You use official documents that are unique to you and can be used to prove that you are who you say you are.
0:35 For example when I have to prove my age to buy alcohol at the store, I can use my driver's license or passport.
0:42 The passport will be less common since we tend not to walk around or go shopping with our passports in our possession.
0:49 But if I am traveling then I have to use a passport. The official documents have something in common and widely accepted authority that we all trust.
0:58 A driver's license is a totally valid and acceptable form of identity within my own country
1:03 And possibly when I visit other countries if I need to rent a car but it is not a valid identity document if I need to travel abroad or that when
1:13 it's something that is accepted globally and carries more authority. a passport. So far so good.
1:20 Now let's talk about digital identities in the digital world. We also have multiple identities and the process of proving who we say we are is
1:29 far more complex. Think of all the user names and passwords. Two factor authentication apps and requirements,
1:36 biometrics that you used to access your phone or other services, your Alexa, your google digital assistants and so on.
1:44 Every single side out there needs to know who you are so that you can decide what you can do and it's hard to get all this right.
1:53 So what makes up our digital identities? There are two distinct pieces of information that can be used to form a digital identity
2:00 our digital attributes and our digital activities.
2:05 Think of our digital attributes as our personally identifiable information that various organizations and companies need
2:12 to store. For example when you open a new bank account or paying taxes,
2:17 you need to provide different types of information that can be used to uniquely identify you
2:21 Your digital activities are your online behavioral patterns, your social media interactions, your location, your browser, search history and so on.
2:32 Now there is something to be said about privacy but that's for a totally different module Your digital identity is your currency on the web,
2:41 everything or almost everything we do on the internet today relies on digital identities and that's why it's also a viable target for hackers.
2:50 And the worst part is that we don't own our digital identities.
2:54 It's the companies that we interact with that are the custodians of these identities and this is where most of the companies fall short. Every week.
3:03 Another company makes the news as they fall victim to attackers that gain access to user
3:08 data bases But afraid not because through this course we will learn how to build robust
3:13 and secure solutions that can protect your users digital identities.