Identity Engineering: Chapter 3