Tag: IGF

Fed-Prov and the Cloud: JIT Provisioning.Next

In my last post, I discussed the basic architectural model of Just-In-Time Provisioning, and some challenges it has in addressing enterprise needs related to cloud computing. In this post, I will propose some possible enhancements to the basic architecture that could address those challenges. Each of these solutions could be viable, though each seems to

International Data Privacy Day: Real Problems, Real Solutions

Wednesday, January 28 is International Data Privacy Day, honoring the anniversary of the Council of Europe Convention on Data Protection (No. 108), the most important international law for privacy. The purpose of this convention is to secure in the territory of each Party for every individual, whatever his nationality or residence, respect for his rights

The Real World: Catalyst Conference Edition

Another Catalyst conference has come and gone, leaving us with a lot of material to chew on and ponder. Burton always forces us to think about what we are doing, especially those of us that have products to deliver. And it’s always interesting to see all the new companies that are popping up in the

Talking about the Identity Bus/Hub/Provider

There has been a lot of discussion recently on the topic of an Identity Bus (see the recent newsletters by Dave Kearns from May 5, May 7, May 12 and May 14, and some blog posts by Kim Cameron and our own Clayton Donley). The use of the word “Bus” creates some confusion, since what

Virtual Directories + Provisioning = No more Metadirectory

There has been an interesting discussion going on regarding the fate of metadirectory technology. Dave Kearns talked about it in his newsletter recently (see: Is the metadirectory dead). In it, he quoted Jackson Shaw, who brought it up as context to HP’s recent retrenchment: “Let’s be honest. The meta-directory is dead. Approaches that look like

Looking Forward to 2008

This is the time of year when everyone rolls out their start-of-the-year predictions. You can see a couple of those here and here. I especially loved Anshu Sharma’s take on this popular beginning-of-the-year routine. Predictions are risky business, especially in the slightly schizophrenic world of IdM. On the one hand, things tend to move way

User-Centricity is a Philosophy, not a Solution

It has been a while since I posted, but not because there isn’t anything to talk about. In fact, there may be too much to talk about, especially since all the discussion about user-centricity in the enterprise generated so much food for thought. No, I have been deeply engaged in discussions on the future of

User-Centricity in the Enterprise

Recently, a few things have reminded me that we still don’t have a clear understanding of how the concept of user-centric identity will fit into the enterprise environments we are so familiar with. But the question keeps coming up, in different forms. Pamela Dingle recently commented on her blog about Patrick Harding’s observations on this

We need a strong Internet Identity Framework, NOW!

This is a little bit of a rant, but read this article in the New York Times and you may understand why. It is difficult to get past the feelings of disbelief, outrage and anger that the tragic story of Megan Meier will stir inside you. But if you somehow manage to move past it

The Personal Identity Management Discussion Goes Mainstream

Yesterday I read an article in the New York Times entitled ‘Securing Very Important Data: Your Own‘. One of the rare mainstream discussions about personal identity management (as opposed to the common identity theft related articles that you see constantly), the article touched upon some of the more interesting discussions that are going on in