摘要 |
Aspects of the subject matter described herein relate to identity technology. In aspects, a user device sends a request for access to a service. In response, the service directs the user device to a user agent that may be downloaded or that may already exist on the user device. The user agent includes code that executes on the user device to create a security boundary. The security boundary controls transmission of identity information that may be used to identify a user of the device. |