NETWORK WORLD NEWSLETTER: DAVE KEARNS ON IDENTITY MANAGEMENT
07/18/05
Today's focus: Issues that will shape ID mgmt. over the next
year
Dear security.world@gmail.com,
In this issue:
* Thoughts from the Burton Group's Catalyst conference
* Links related to Identity Management
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Hewlett Packard
Special Report-Regulatory Compliance and the Role of Today's CIO
With a growing body of legislation dictating how enterprises may
create, use, share, and retain electronic records, CIOs must
develop data storage and management strategies that meet
regulatory compliance and support their organizations' overall
business goals. Fortunately, these objectives are not mutually
exclusive. Download this Special Report from Kahn Consulting,
click here
http://www.fattail.com/redir/redirect.asp?CID=108654
_______________________________________________________________
FREE NETWORK WORLD PRINT SUBSCRIPTIONS - SIGN UP NOW!
Security is one of the most pressing issues in all of IT, and
you need to stay on top of it. Network World delivers the
hottest security news. Network IT Executives depend upon Network
World for the information they need to keep their networks
secure! SUBSCRIBE TODAT AT:
http://www.fattail.com/redir/redirect.asp?CID=108470
_______________________________________________________________
Today's focus: Issues that will shape ID mgmt. over the next
year
By Dave Kearns
The Burton Group's Catalyst conference has always provided
interesting and thought provoking topics for this newsletter and
last week's 11th annual meeting in San Diego was no different.
Jamie Lewis, Burton CEO, once again did a great job of framing
the conversations that will probably dominate the identity
management space over the next year.
The issues he thought would be dominant between now and the next
Catalyst conference in Orlando next July are: polycentric
identity, identity management suites and federation.
Polycentric identity management combines the traditional
enterprise view of identity management - hierarchical, top-down
and centered around administrators - with the emerging world of
"usercentric" identity management.
According to Lewis, usercentric identity management refers to a
group of systems and technologies such as Microsoft's InfoCard
(especially as interpreted by Kim Cameron for his "Seven Laws of
Identity"), Lightweight digital Identity (LID), the Sxip network
and more. In these systems, the user - not the enterprise or the
government - is in control of the digital identity information.
It's only by accommodating these two, seemingly disparate, views
of identity that we can move forward, said Lewis. Ignoring one
or the other will never accomplish the goal of embedding
identity management into the fabric of computing.
Lewis also mentioned the progress of identity management tools,
utilities and services into well-organized suites offered by the
major vendors in the identity space (Sun, IBM, Novell, BMC,
Oracle, etc.). He and Mike Neuenschwander, associate research
director at Burton, emphasized that no one vendor had yet fully
integrated all identity management functions into a single suite
of products. They both stated that the era of the suite was now
passing by and that the future lay with modular services within
a Web services/service oriented architecture framework from one
or more vendors was the wave of the future.
The third area Lewis emphasized was federation. As part of the
conference, Senior Burton Analyst Gerry Gebel organized an
interoperability event in which a dozen vendors showed
federation scenarios using multiple sets of protocols (SAML,
Liberty Alliance, WS-federation, Shibboleth, etc.) to connect
one to another. Lewis' take was that convergence of standards
was still a hope rather than a possibility and that those
vendors who moved to enable interoperability would be the
winners as federation finally takes off over the next 12 to 24
months.
None of these points should come as a surprise to most of you.
We've been talking about them among ourselves for the past year.
Now, Lewis is saying, the conversation will grow to include not
only those of us in the identity management community but also
those outside of it who influence the directions in which we
need to go - our managers, partners and the general business
community.
RELATED EDITORIAL LINKS
Demo shows ID specs can coexist
Network World, 07/18/05
http://www.networkworld.com/news/2005/071805-identity.html?rl
_______________________________________________________________
To contact: Dave Kearns
Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.
Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these
respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.
Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by Hewlett Packard
Special Report-Regulatory Compliance and the Role of Today's CIO
With a growing body of legislation dictating how enterprises may
create, use, share, and retain electronic records, CIOs must
develop data storage and management strategies that meet
regulatory compliance and support their organizations' overall
business goals. Fortunately, these objectives are not mutually
exclusive. Download this Special Report from Kahn Consulting,
click here
http://www.fattail.com/redir/redirect.asp?CID=108653
_______________________________________________________________
ARCHIVE LINKS
Archive of the Identity Management newsletter:
http://www.networkworld.com/newsletters/dir/index.html
_______________________________________________________________
WEBCAST: Winning with Endpoint Security
Protecting an enterprise from worms and other attacks is a
struggle. Learn proactive strategies for making sure that no
matter who your users are, or how they access your network, you
are protected.
http://www.fattail.com/redir/redirect.asp?CID=108483
_______________________________________________________________
FEATURED READER RESOURCE
THE ROI OF VOIP
When it comes to VoIP, most network managers are satisfied that
the technology works. But there are questions: What will the new
technology cost to roll out and support, and what benefits can
companies expect to reap? Check out NW's step-by-step guide on
how to determine the true cost and benefits of VoIP. Click here:
<http://www.networkworld.com/research/2005/071105-voip.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2
International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>
To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>
Subscription questions? Contact Customer Service by replying to
this message.
This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________
Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>
Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772
For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>
Copyright Network World, Inc., 2005
No comments:
Post a Comment