Ah, I see. Highlighting opportunities for lower costs and complexity, and leveraging a company to build a financial case, those don't seem directly relevant to the demo process itself.
The Trusted Subsystem pattern combined with Data Origin Authentication looks like a good way to establish a secure utility service to handle the security processing. That way, the sensitive credential information never has to go directly to Service A, reducing the attack surface.
Fallon
4 months agoCandida
4 months agoJean
4 months agoMatthew
4 months agoMarlon
5 months agoRima
5 months agoNatalie
5 months agoNobuko
5 months ago