Authentication or Authorization? Can we move to verification Now?

Conference IIW8 Room/Time: 2/A

Convener:

Notes-taker:

Attendees:

Technology Discussed/Considered:

Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps: