Enterprise organizations can now create and control their own data-sharing networks, reusing verified identity data while preserving compliance and end-user consent Today, fragmented identity ...