Ah, I see. Highlighting opportunities for lower costs and complexity, and leveraging a company to build a financial case, those don't seem directly relevant to the demo process itself.
The Trusted Subsystem pattern combined with Data Origin Authentication looks like a good way to establish a secure utility service to handle the security processing. That way, the sensitive credential information never has to go directly to Service A, reducing the attack surface.
Fallon
6 months agoCandida
6 months agoJean
6 months agoMatthew
6 months agoMarlon
6 months agoRima
7 months agoNatalie
7 months agoNobuko
7 months ago