Search This Blog

Wednesday, February 18, 2009

Provisioning and federation

The raging dispute about federated provisioning's pros and cons
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

IDC: Preventing Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies. Review this research today.

rule

Spotlight Story
Provisioning and federation

Dave Kearns By Dave Kearns
Federated provisioning is the topic, and the raging dispute about its pros and cons is today's subject. It started with the comment by Daniel Wakeman (CIO, Educational Testing Service), who said "It's a 'huge shortcoming' that SaaS [Software-as-a-Service] vendors do not embrace 'federated identity management' standards allowing centralized identification and validation of users via a single sign-on process..." Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

The promise of provisioning Way back in the dark ages, 10 whole years ago, I first wrote about provisioning as the "killer app" for Identity Management. Actually, I called it the killer app for directory services, since the identity management tag hadn't yet been promulgated. In a piece I wrote for Novell's Web site (now, sadly, no longer available), I touted Business Layer's eProvision Employee application and talked about what was to come. Sometimes prognosticators are wrong.

E-provisioning's dirty little secret It was just four years ago, that I was strolling through "Start-up City" at NetWorld+Interop Atlanta in 1999 and stumbled across a new company, Business Layers, touting a brand new application called "eProvision Employee." I was intrigued, and I had a few minutes to kill. I fell in love. Here was the application that could finally bring directory services and identity management into the mainstream.

Provisioning/de-provisioning in the education sector I'm at the Catalyst Conference in San Diego this week - say "Hi!" if you see me wondering the halls - but the news from the show will have to wait until next week's newsletters. Today I want to finish something I touched on recently - provisioning/de-provisioning in the education sector.

School system taps Novell to control network identity The Fairfax County School District in Virginia, with more than 200 schools and 164,000 students, this week announced it will begin upgrading its legacy network provisioning and password management system with Novell's ...

Provisioning/deprovisioning problematic for a third of organizations Every time we think we've finally gotten a handle on the user provisioning/deprovisioning issue something comes along to disabuse us of that notion. In this case it's the results of a survey of attendees at last spring's Directory Experts Conference (DEC) put on by NetPro.

Provisioning for non-employees in healthcare organizations Speaking of identity and healthcare, as we were in the last issue, I sat in on a panel discussion last week on provisioning non-employees in a healthcare environment. This was just one of the many fascinating sessions at this year’s (the fifth annual) Converge conference, the user conference put on by Courion and its partners Citrix, Cyber-Ark, Encentuate, RSA, Diaphonics, HealthCast, Imprivata and Radiant Logic – fairly familiar names to readers of this newsletter.

Courion and Sun ease deployment of provisioning systems We've come a very long way in the identity provisioning field over the past eight years, a journey highlighted by two recent announcements. I'll get to those in a second.

Fischer's take on provisioning systems When I told you about Gartner's Magic Quadrant report on provisioning systems a couple of weeks ago, there were a few companies listed that haven't been discussed in this newsletter in the past. I hope to change that over the next few weeks by drawing attention to them. Today, we'll look at Fischer International.

Survey: IT pros admit to peeking inside confidential data files As long as it's just the two of us talking, you can tell me - don't you sometimes go snooping inside the storage servers? Not to be nosy, of course. But, perhaps, to see just what those disk hogs (you know, the ones who ...

The messiest part of identity management The messiest part of any job is usually the cleanup. Think about what your kitchen looks like after a festive holiday meal. Or Main Street after the horse brigade marches in the annual parade. But in the field of ...

Fischer targets identity services at service providers At the end of the last century, I touted a new technology niche: e-provisionware. That name didn't stick, but the concept of electronic provisioning did, creating the revolution in enterprise identity management that ...

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Oracle
rule

IDC: Preventing Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies. Review this research today.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/18/09

Today's most-read stories:

  1. Vodafone to sell second HTC Google phone
  2. 9 dirty tricks: Social engineers' favorite pick-up lines
  3. Microsoft announces $250,000 Conflicker worm bounty
  4. Huawei unveils first Android smartphone
  5. How to build your own supercomputer
  6. Largest coordinated ATM rip-off ever nets $9+ million
  7. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  8. Alcatel-Lucent founds 4G industry group
  9. Tweet to compete
  10. Managing network change in a down economy


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: