Virtual identities in authentication and authorization scenarios | Publicación