Moving Towards A Tokenized World For Trusted Access Rights
Like it or not, we are moving to a tokenized world, and where we pass tokens which are trusted to provide further information. This might relate to a login token for a corporate infrastructure, and where an access token can be passed to give rights to applications and files. The tokens themselves — if designed properly — will not actually reveal sensitive information (such as passwords and login IDs). If a token is signed with the private key of a trusted entity, we know that we can trust the token.