It seems obvious now, that the next generation authentication/authorization scheme is going to be based on DID. It is interoperable, self-sovereign, cryptography-based, with rich functionality around (see Verifiable Credentials, Verifiable Presentations). The simplest thing to do with DID is login flow. Just like the notorious “Sign in with Google button”…