Search This Blog

Monday, July 02, 2007

Identity management gear: Tried-and-true or roll your own?

Network World

Identity Management




Network World's Identity Management Newsletter, 07/02/07

Identity management gear: Tried-and-true or roll your own?

By Dave Kearns

Another Catalyst Conference is over and done with and, as usual, Mike Neuenschwander, Burton Group vice president and research director managed to raise my hackles (see “The seven flaws of identity”). Mike’s a very bright guy, and one of the most knowledgeable people in or out of the industry on identity topics, but he does tend to hyperbole to make his points. This year, it was his references to federation that raised a few eyebrows.

His bullet points?

* You won’t need most of the stuff in a federation product.

Get Everyone from the CEO to the MySpace Generation to Support Your Security Plans.

September 10-11, 2007 | The Fairmont Chicago
How do you get everyone from the boardroom to the mailroom to comply with your security initiatives? Come collaborate with peers on critical business topics like this at The Security Standard-the only business summit for senior security executives. For the latest in planning and management strategies. Click here for more details. Click here for more details

* Stick with browser POST architecture, ignore or disable everything else.

* Find some cheap, easy-to-deploy “spokes” or build your own.

* Or just build your own service.

Now I don’t know about your company’s policies, but most places I’ve worked would rather buy a tried-and-true solution than spend months – even years – trying to roll their own. Yes, in-house constructed software is needed, but generally only when what you need isn’t commercially available.

I understand, I think, what Mike was trying to say – federation projects do take on complexities that often aren’t necessary, so simplification should be the order of the day. But doing it yourself doesn’t promote simplification. Rather, it promotes sloppy thinking and insecure systems. You wouldn’t install alpha or beta software in a production system, would you? But that’s what your in-house constructed federation code would be.

Burton Chairman Jamie Lewis made a number of important points that we all need to ponder and incorporate into our own planning:

* Mobile phones and other devices already outnumber personal computers and will continue to expand the margin while identity management of those devices is still in its infancy.

* Computer science is not the only relevant field; social science has a lot to teach us about trust, and how to build it.

* The battle to protect identity information for our generation is over, and we lost. The only real question is whether we can save things for future generations.

The last point is, to me, the most profound – echoing as it does Scott McNealy’s famous line: “You have zero privacy anyway, get over it.” A lot of people are spending a lot of time these days trying to bake in absolute privacy to identity tools, and impeding progress while they do so. We have to make a “best effort,” of course, but we need to move the technology forward without waiting on perfection – which likely will never come.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Withdrawn Black Hat paper hints at security flaws
2. 3Com to spin out TippingPoint
3. Gartner to IT: Avoid Apple's iPhone
4. Lawyers show how to avoid hiring an American
5. The $2.3M home lab of Quadruple CCIE
6. The most-hyped tech products of all time
7. CIOs leery of iPhone
8. Giving an interview gets a guy fired
9. Parallel system 100X faster than PCs
10. Microsoft security group on 'worst jobs' list

MOST-DOWNLOADED PODCAST:
Network World 360: Operation Bot Roast, search engine roulette and more


Contact the author:

Dave Kearns is a writer and consultant in Silicon Valley. He's written a number of books including the (sadly) now out of print "Peter Norton's Complete Guide to Networks." His musings can be found at Virtual Quill.

Kearns is the author of two Network World Newsletters: Windows Networking Strategies, and Identity Management. Comments about these newsletters should be sent to him at these respective addresses: windows@vquill.com, identity@vquill.com .

Kearns provides content services to network vendors: books, manuals, white papers, lectures and seminars, marketing, technical marketing and support documents. Virtual Quill provides "words to sell by..." Find out more by e-mail.



ARCHIVE

Archive of the Identity Management Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: