Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. Before we get to that, let’s review how authentication works on a private ...