Digital identity and authentication technologies are currently undergoing some major changes. Once the realm of centralized authorities like large enterprises and governments, new technologies are putting more power in the hands of end users in ways never before possible. Today’s technology stack is built on the lessons of the past, with an understanding of what works and what does not in the real world with real users.