Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

The problem space was around how to model non-persons in the Person Registry. The short answer is, you shouldn't. This is usually done as a way to cheat authorization into an authentication model. When a "departmental" computing account is created where a shared password is used as a form of authorization. The "correct" way to do this is to create a departmental email account and provide a mechanism for sharing access. In short, it isn't a person registry problem. It is an authorization problem.

  • No labels