Search This Blog

Wednesday, March 04, 2009

How a universal directory might work

A worldwide, distributed, replicated virtualized directory system would be useful for provisioning across boundaries
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies.

rule

Spotlight Story
How a universal directory might work

Dave Kearns By Dave Kearns
Provisioning across organizational boundaries using either traditional technologies or those associated with federation has been our subject the past few issues. In the last newsletter, the subject of a universal directory was mentioned. Today let's see how that might work. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Network World on Twitter Get our tweets and stay plugged in to networking news.

The other federation technology While we've seen, over the past few issues, that federated provisioning still has a long way to go there's another technology, an older technology, which might bear another look.

The promise of provisioning Way back in the dark ages, 10 whole years ago, I first wrote about provisioning as the "killer app" for Identity Management. Actually, I called it the killer app for directory services, since the identity management tag hadn't yet been promulgated. In a piece I wrote for Novell's Web site (now, sadly, no longer available), I touted Business Layer's eProvision Employee application and talked about what was to come. Sometimes prognosticators are wrong.

Enterprise Provisioning vs. Federated Provisioning When last we spoke I left you thinking about deprovisioning both your people from apps you don't control or your apps from people you don't control. It's a big issue with software-as-a-service (SaaS) and federated provisioning. It was the Burton Group's Ian Glazer who said: "...there should be no reason why deprovsioning from an application like Salesforce.com is any harder than deprovisioning from LDAP." And, in truth, maybe it isn't.

Provisioning and federation Federated provisioning is the topic, and the raging dispute about its pros and cons is today's subject. It started with the comment by Daniel Wakeman (CIO, Educational Testing Service), who said "It's a 'huge shortcoming' that SaaS [Software-as-a-Service] vendors do not embrace 'federated identity management' standards allowing centralized identification and validation of users via a single sign-on process..."

Identity Governance Framework sprints to the finish line Setting a pace that the IETF and other slow-moving standards bodies could envy, the Liberty Alliance announced last week the completion of market requirements document (MRD) for the Identity Governance Framework (IGF). ...

Radiant Logic, SailPoint give their products an 'identity change' Before completely leaving the events of the recent Digital ID World show there were a couple of announcements that I wanted to point out since they concerned identity and identity products on multiple levels. Two old friends of this newsletter, Radiant Logic and SailPoint, announced upgrades to their flagship products. They also announced what could be called an "identity change" for the products.

Buzzblog: Here's how to keep the government from spying on you The Electronic Frontier Foundation yesterday launched its "Surveillance Self-Defense" site, which is designed to provide Americans with practical advice on how to keep their government from snooping into their private communications and stored computer data.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

03/04/09

Today's most-read stories:

  1. Back when Google was just a gleam
  2. Microsoft details contents of enterprise bundle for Windows 7
  3. iPod ... do you? A playful list of iPods
  4. DEMO 09: Recession weeds out uninspiring start-ups
  5. Touch-screen laptop, iPhone service highlight DEMO 09
  6. Computer security handbook fifth edition is ready
  7. Nortel curtailing carrier Ethernet switch/router investment
  8. Five Facebook scams: Protect your profile
  9. Not all SOHO routers are created equal
  10. Embarrassing U.S. launch of Nokia smartphone
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: