Monday, March 02, 2009

The other federation technology

A look at federated directories
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Migrating Servers to Windows Server 2008
Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge(TM) servers.

rule

Spotlight Story
The other federation technology

Dave Kearns By Dave Kearns
While we've seen, over the past few issues, that federated provisioning still has a long way to go there's another technology, an older technology, which might bear another look. Read full story

Dave Kearns is a consultant and editor of IdM, the Journal of Identity Management.

Related News:

Network World on Twitter Get our tweets and stay plugged in to networking news.

The promise of provisioning Way back in the dark ages, 10 whole years ago, I first wrote about provisioning as the "killer app" for Identity Management. Actually, I called it the killer app for directory services, since the identity management tag hadn't yet been promulgated. In a piece I wrote for Novell's Web site (now, sadly, no longer available), I touted Business Layer's eProvision Employee application and talked about what was to come. Sometimes prognosticators are wrong.

Enterprise Provisioning vs. Federated Provisioning When last we spoke I left you thinking about deprovisioning both your people from apps you don't control or your apps from people you don't control. It's a big issue with software-as-a-service (SaaS) and federated provisioning. It was the Burton Group's Ian Glazer who said: "...there should be no reason why deprovsioning from an application like Salesforce.com is any harder than deprovisioning from LDAP." And, in truth, maybe it isn't.

Provisioning and federation Federated provisioning is the topic, and the raging dispute about its pros and cons is today's subject. It started with the comment by Daniel Wakeman (CIO, Educational Testing Service), who said "It's a 'huge shortcoming' that SaaS [Software-as-a-Service] vendors do not embrace 'federated identity management' standards allowing centralized identification and validation of users via a single sign-on process..."

Identity Governance Framework sprints to the finish line Setting a pace that the IETF and other slow-moving standards bodies could envy, the Liberty Alliance announced last week the completion of market requirements document (MRD) for the Identity Governance Framework (IGF). ...

Novell includes Windows CardSpace in Novell Access Manager I haven't chatted with the folks from Novell in a while, so I was glad of the opportunity to talk with Lee Howarth, product manager for Novell's Access Manager last week about the new release - Version 3.1 - of the ...

The 2 billion entry directory tree It's deja vu. I got a note from Oracle's Technology media marvel (and soon to be media mother) Rebecca Hahn touting a new study, commissioned by Oracle, from the Performance Engineering Group at Persistent Systems. It's ...

Identity theft morphs, but maintains lead as FTC's top consumer complaint For the ninth year in a row identity theft - particularly in Arizona and California - was the number one consumer complaint filed with the Federal Trade Commission in 2008. Of 1,223,370 complaints received in 2008, 313,982 - or 26% - were related to identity theft.

Network management vendors land hefty venture funding Network management vendor Apparent Networks and identity management vendor Aveksa separately bring in venture capital cash.

Visa: New payment-processor data breach not so new after all Days after Visa Inc. seemingly confirmed that a data breach had taken place at a third payment processor, following on the recent breach disclosures by Heartland Payment Systems Inc. and RBS WorldPay Inc., the credit card company now is saying that there was no new security incident after all.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Dell
rule

Migrating Servers to Windows Server 2008
Upgrading to the Windows Server 2008 OS can offer myriad advantages, including enhanced performance, security, and stability. By following best practices for in-place upgrades and taking advantage of tools such as the Dell Windows Server 2008 Readiness Advisor, administrators can help ensure a smooth migration on their Dell PowerEdge(TM) servers.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

03/02/09

Today's most-read stories:

  1. Verizon Wireless takes aim at pesky 'Rabbit'
  2. Best Mac mod ever
  3. Cisco unleashes a dozen security updates
  4. Commerce chief faces five Internet emergencies
  5. $100 PS3 price drop coming by June 'at the latest'
  6. Turning 5,000 discarded cell phones into art
  7. Economic downturn not taking the fight out of Microsoft
  8. The 25 most dangerous cities for offshore outsourcing
  9. 40% of geeks surveyed really work fewer than ... say what?
  10. Obama's broadband stimulus: Will wireless fit the bill?
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment