Application development Implementing a robust digital identity How can you robustly assert and identify a user’s identity?