Converge Leveraging Identity With Professional Open Source Final
- 2. GoalsIntroduce a 4-step Identity Implementation RoadmapExamine the most common Identity Management Project mistakes; and how to avoid themCompare commercial and open source Identity Management Solutions head-to-head Drill down on the JOSSO Open Source Product, Adopters and Case StudiesQ&A
- 4. Bird’s eye view of an IdentityInside-Out Implementation Roadmap Deliver an Authoritative Source
- 7. Push Identity beyond organizational boundariesUnify – Deliver an Authoritative SourceWHYBuild value from your identity dataRealize the data backbone of the identity spinal cordHOWAdopt and Extend a user schemaChoose your persistence mechanism and protocol for storing and exposing your organization identities respectivelySet up an Authoritative Source for user and entitlement informationAPPROACHESBatch data synchronization and Reconciliation Directory Virtualization
- 8. Leverage – End the password nightmareWHYIncrease operational efficiencyIncrease securityHOWAuthentication and Authorization still handled within the application tierPoint business applications to the authoritative source for looking up user and entitlement recordsFederate local identity store against authoritative sourceAPPROACHESConnecting authoritative source to identity consumersBusiness application retrofitting of the identity data layer
- 9. Service – Build services around identityWHYEnhance user experienceIncrease operational efficiencyIncrease securityHOWSet up an Asserting Authority capable of emitting security tokensAdopt standards for security token emission, formatting and underlying trust system Shift Authentication and Authorization Processes to the Asserting AuthorityLeverage Asserting Authority services from business applications and application platformsAPPROACHESImplement a Standard-based Access Management Solution
- 10. Externalize – Push Identity beyond organizational boundariesWHYAchieve interoperation with external organizations/domainsExtend the reach of organization’s identity services to the CloudBring Public Cloud services on boardHOWIntroduce support for producing and consuming standard-based assertions (e.g. using the SAML2 protocol)Set up Inbound & Outbound Federated Connections with Partner sitesAPPROACHESDeliver the Federated Identity capabilities into the Access Management Solution – with little to no impact in the application baseDeliver the Federated Identity Capabilities into the Business Application tier – requires retrofitting business applications that need to be externalized; or need to leverage externalized services
- 19. Invest in defining your Identity Architecture up front; scaffolding it in a proof-of-concept (POC)
- 24. Rely on proven solutions while focusing on your business Two sides of the same coin
- 26. Force you to take a “suite” instead of a best-of-breed approach
- 30. No access to source code for diagnosing and eventually solving IAM-specific issues Highlights of Sponsored Open Source Solutions No associated user-licensing cost. You are free to implement in a do-it-yourself fashion.
- 34. Source code is available and you are free to create your own version of the product
- 35. Source code is available for inspectionHead-to-Head Comparison of Commercial and Open Source IAM
- 39. The State of Florida Case StudyThe Need: Enable interoperation among heterogeneous homeland security systems in terms of identity
- 46. The Solution: Deliver a timely, cost-effective Standard-based Federated Identity Solution without disrupting Communities Ecosystem
- 51. 50,000 users approximatelyEuropean Union Case StudyThe Need: Enable identity services into the Planets Product - Preservation and Long-term Access through Networked Services - coordinated by the British Library
- 56. Contact InformationAtricore Inc. : www.atricore.comParceiroCertificado no Brasil:GoNow: www.gonow.com.br R. Tenerife, 31 – 10º andar Vila Olímpia – São Paulo/SP (11) 3046 2525
- 57. Perspector Data Slide - DO NOT EDITThis slide holds any pictures that are used by 3D images created with Perspector.The slide will not be displayed when the presentation is viewed as a slide show.If you want to send the presentation to someone else for them to watch, you can delete this slide in the copy that you send (but keep your original presentation for future editing).
Editor's Notes
- I need to know how to pronounce “Atricore” – is it “at-ricor” or “ate-ricor”?
- If you don’t like the “Subject: explanation” format here, we can try beginning each bullet point with the active verb, as in : explore, examine, define, fit, answer.
- IAM= identity access management?
- “Reconciliation” is misspelled – please add “i” after “l”.