It’s Burton Group Catalyst time again, and I will be pushing forward in my quest to advance access provisioning to the next level. I will be giving a talk on “Beyond SPML: Access Provisioning in a Services World” tomorrow (Wednesday, July 28 2010) at 11:20 am, part of the “provisioning needs to change” block (it
Jackson Shaw just wrote about a website called goodsecurityquestions.com. As the name indicates, it’s a site that purports to distinguish between good and bad questions to employ when setting up for your identity re-verification challenges (for when you forget your password or need to execute a high-value transaction, for instance). The same site also (correctly)
In my last post, I discussed the basic architectural model of Just-In-Time Provisioning, and some challenges it has in addressing enterprise needs related to cloud computing. In this post, I will propose some possible enhancements to the basic architecture that could address those challenges. Each of these solutions could be viable, though each seems to
In my last post, I talked about Advance Provisioning, and how it was problematic in the cloud world because of the integration work and pre-defined business relationships (at an IT level) it requires. A lot of the appeal in using and delivering cloud-based services is the ability to enable short-lived and limited-use business relationships (case
It’s pretty gratifying that some really smart people are doing a deep-dive on the ideas I threw out there in my “Federated Provisioning and the Cloud” deck and challenging some of the ideas in there. Means that I get to tap into the brain power out there in the identity community to flesh out the
Last week I attended GlueCon, a 2-day developer-oriented conference focusing on the technologies that make/will make the cloud go. As usual, Eric Norlin and team did an excellent job curating a conference with lots of interesting content, some of which was quite new to me. And the energy levels were extremely high (I can’t remember
Just a quick reminder that if you are at the European Identity Conference taking place in Munich right now (from May 4-7), then I will be on 3 (count that, 3) back-to-back panels tomorrow (today) – Wednesday May 5th. I already told you about the first two in a previous post, but I am now
As part of Oracle’s Identity Management Think Tank Podcast Series, I recorded a podcast on “Identity Management for Cloud Computing” with our Chief Identity Architect Vadim Lander. You can listen to it by clicking here. In the podcast, we cover What are the key security concerns about cloud computing How security requirements vary between Private
This is probably an anomaly, but May is shaping up to be a pretty jam-packed month for me in the identity-related conference circuit, with some great events going on where I will be speaking/hoping to speak. My participation is still subject to some approvals coming through, but I’m fairly confident on that front. So there
(Updated to reflect provisional status of OIX approval per this – thanks to Brett for telling me) I just got back home from the RSA Conference in San Francisco this week, where the topic of Trust was second only to all things Cloud. While sessions on Identity Management were few and far between, there was