From e731984d79a9fa2b412ef11dac32479277b022a5 Mon Sep 17 00:00:00 2001
From: Manu Sporny Use Cases
-Lemmy runs an enterprise portal that manages large amounts of sensitive data -submitted by people working for a variety of organizations. He would like to use -identifiers for entities in the database where control over the identifier can -be cryptographically proven in order to increase security related to who is -allowed to access and update each organization's data. +Lemmy runs multiple enterprise portals that manage large amounts of sensitive +data submitted by people working for a variety of organizations. He would like +to use identifiers for entities in the databases that are provided by +his customers and do not depend on easily phishable information such as +email addresses and passwords. +
++Lemmy would like to ensure that his customers prove control over their +identifiers — for example, by using public/private key cryptography +— in order to increase security related to who is allowed to access and +update each organization's data.