Wednesday, February 25, 2009

Federated provisioning could exist

If reason prevails federated provisioning could become a reality
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Spotlight Story
Federated provisioning could exist

Dave Kearns By Dave Kearns
Today we'll wrap up our current discussion of federated provisioning. That's easy, because there really is no such thing today. But there might be if reason prevails. Let me tell you about it. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Network World on Twitter Get our tweets and stay plugged in to networking news.

An unhackable payment and ID managment system? Cisco Subnet blogger Jamey Heary has ventured into the land of science fiction to give you a glimpse if IT - and its security - in the year 2109 based on the science of today.

Enterprise Provisioning vs. Federated Provisioning When last we spoke I left you thinking about deprovisioning both your people from apps you don't control or your apps from people you don't control. It's a big issue with software-as-a-service (SaaS) and federated provisioning. It was the Burton Group's Ian Glazer who said: "...there should be no reason why deprovsioning from an application like Salesforce.com is any harder than deprovisioning from LDAP." And, in truth, maybe it isn't.

Provisioning and federation Federated provisioning is the topic, and the raging dispute about its pros and cons is today's subject. It started with the comment by Daniel Wakeman (CIO, Educational Testing Service), who said "It's a 'huge shortcoming' that SaaS [Software-as-a-Service] vendors do not embrace 'federated identity management' standards allowing centralized identification and validation of users via a single sign-on process..."

The promise of provisioning Way back in the dark ages, 10 whole years ago, I first wrote about provisioning as the "killer app" for Identity Management. Actually, I called it the killer app for directory services, since the identity management tag hadn't yet been promulgated. In a piece I wrote for Novell's Web site (now, sadly, no longer available), I touted Business Layer's eProvision Employee application and talked about what was to come. Sometimes prognosticators are wrong.

E-provisioning's dirty little secret It was just four years ago, that I was strolling through "Start-up City" at NetWorld+Interop Atlanta in 1999 and stumbled across a new company, Business Layers, touting a brand new application called "eProvision Employee." I was intrigued, and I had a few minutes to kill. I fell in love. Here was the application that could finally bring directory services and identity management into the mainstream.

Provisioning/de-provisioning in the education sector I'm at the Catalyst Conference in San Diego this week - say "Hi!" if you see me wondering the halls - but the news from the show will have to wait until next week's newsletters. Today I want to finish something I touched on recently - provisioning/de-provisioning in the education sector.

Provisioning/deprovisioning problematic for a third of organizations Every time we think we've finally gotten a handle on the user provisioning/deprovisioning issue something comes along to disabuse us of that notion. In this case it's the results of a survey of attendees at last spring's Directory Experts Conference (DEC) put on by NetPro.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

Three months, three breaches at Florida university For the second time in three months, the University of Florida in Gainesville has acknowledged a major data breach -- and a statement posted on the University's Web site indicates that there was a third, less public, breach discovered by the school during the same period.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Trend Micro
rule

Four Layers of Security Protection.
Web threats are coming at you from every angle. This whitepaper reveals how to protect your network at four different layers to successfully fight the latest web threats. The four layers of protection are deployed in the cloud, at the Internet gateway, across network servers and at the end points. Download this whitepaper now.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


The Power of LAN Test Tools.
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.

 

02/25/09

Today's most-read stories:

  1. 40% of geeks surveyed really work fewer than ... say what?
  2. Techies end-run feds on DNS security
  3. Just what has DARPA accomplished in recent decades?
  4. Five fantastic open source tools for Windows admins
  5. Nortel wants to speed up $17.65M Alteon sale
  6. 2009 Best of Tests winners
  7. Conflicker worm gets an evil twin
  8. Starbucks sued after laptop data breach
  9. Fave raves: six enterprise products readers love
  10. Citrix drops price of hypervisor to zero


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment