 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
|
 |
 |
|
O(N)
|
|
authentication servers
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
|
Authentication
is typically
|
|
 |
|
|
|
|
|
bundled into application
|
|
|
servers
|
|
|
|
Every
application acts as an
|
 |
|
|
|
authentication
server
|
|
|
|
n |
Expensive
|
|
|
|
n |
Hard to secure
|
|
|
|
n |
Leads to a
fractured user
|
|
|
identity
|
|
|
|
|
|
|
|
|
|
 |
 |
 |
 |
|
O(N)
|
|
authentications &
|
|
identities
|
|
|
|
|
|
|
|
|
|
|
|
|
|
 |
 |
|
O(N)
|
|
secrets
|
|
|
|
|
|
|
 |
|
 |
|
|