Network World on Twitter Get our tweets and stay plugged in to networking news. The promise of provisioning Way back in the dark ages, 10 whole years ago, I first wrote about provisioning as the "killer app" for Identity Management. Actually, I called it the killer app for directory services, since the identity management tag hadn't yet been promulgated. In a piece I wrote for Novell's Web site (now, sadly, no longer available), I touted Business Layer's eProvision Employee application and talked about what was to come. Sometimes prognosticators are wrong. Enterprise Provisioning vs. Federated Provisioning When last we spoke I left you thinking about deprovisioning both your people from apps you don't control or your apps from people you don't control. It's a big issue with software-as-a-service (SaaS) and federated provisioning. It was the Burton Group's Ian Glazer who said: "...there should be no reason why deprovsioning from an application like Salesforce.com is any harder than deprovisioning from LDAP." And, in truth, maybe it isn't. Provisioning and federation Federated provisioning is the topic, and the raging dispute about its pros and cons is today's subject. It started with the comment by Daniel Wakeman (CIO, Educational Testing Service), who said "It's a 'huge shortcoming' that SaaS [Software-as-a-Service] vendors do not embrace 'federated identity management' standards allowing centralized identification and validation of users via a single sign-on process..." Identity Governance Framework sprints to the finish line Setting a pace that the IETF and other slow-moving standards bodies could envy, the Liberty Alliance announced last week the completion of market requirements document (MRD) for the Identity Governance Framework (IGF). ... Novell includes Windows CardSpace in Novell Access Manager I haven't chatted with the folks from Novell in a while, so I was glad of the opportunity to talk with Lee Howarth, product manager for Novell's Access Manager last week about the new release - Version 3.1 - of the ... The 2 billion entry directory tree It's deja vu. I got a note from Oracle's Technology media marvel (and soon to be media mother) Rebecca Hahn touting a new study, commissioned by Oracle, from the Performance Engineering Group at Persistent Systems. It's ... Identity theft morphs, but maintains lead as FTC's top consumer complaint For the ninth year in a row identity theft - particularly in Arizona and California - was the number one consumer complaint filed with the Federal Trade Commission in 2008. Of 1,223,370 complaints received in 2008, 313,982 - or 26% - were related to identity theft. Network management vendors land hefty venture funding Network management vendor Apparent Networks and identity management vendor Aveksa separately bring in venture capital cash. Visa: New payment-processor data breach not so new after all Days after Visa Inc. seemingly confirmed that a data breach had taken place at a third payment processor, following on the recent breach disclosures by Heartland Payment Systems Inc. and RBS WorldPay Inc., the credit card company now is saying that there was no new security incident after all. Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. |
No comments:
Post a Comment