In my last post, I discussed the basic architectural model of Just-In-Time Provisioning, and some challenges it has in addressing enterprise needs related to cloud computing. In this post, I will propose some possible enhancements to the basic architecture that could address those challenges. Each of these solutions could be viable, though each seems to
Wednesday, January 28 is International Data Privacy Day, honoring the anniversary of the Council of Europe Convention on Data Protection (No. 108), the most important international law for privacy. The purpose of this convention is to secure in the territory of each Party for every individual, whatever his nationality or residence, respect for his rights
Another Catalyst conference has come and gone, leaving us with a lot of material to chew on and ponder. Burton always forces us to think about what we are doing, especially those of us that have products to deliver. And it’s always interesting to see all the new companies that are popping up in the
There has been a lot of discussion recently on the topic of an Identity Bus (see the recent newsletters by Dave Kearns from May 5, May 7, May 12 and May 14, and some blog posts by Kim Cameron and our own Clayton Donley). The use of the word “Bus” creates some confusion, since what
There has been an interesting discussion going on regarding the fate of metadirectory technology. Dave Kearns talked about it in his newsletter recently (see: Is the metadirectory dead). In it, he quoted Jackson Shaw, who brought it up as context to HP’s recent retrenchment: “Let’s be honest. The meta-directory is dead. Approaches that look like
This is the time of year when everyone rolls out their start-of-the-year predictions. You can see a couple of those here and here. I especially loved Anshu Sharma’s take on this popular beginning-of-the-year routine. Predictions are risky business, especially in the slightly schizophrenic world of IdM. On the one hand, things tend to move way
It has been a while since I posted, but not because there isn’t anything to talk about. In fact, there may be too much to talk about, especially since all the discussion about user-centricity in the enterprise generated so much food for thought. No, I have been deeply engaged in discussions on the future of
Recently, a few things have reminded me that we still don’t have a clear understanding of how the concept of user-centric identity will fit into the enterprise environments we are so familiar with. But the question keeps coming up, in different forms. Pamela Dingle recently commented on her blog about Patrick Harding’s observations on this
This is a little bit of a rant, but read this article in the New York Times and you may understand why. It is difficult to get past the feelings of disbelief, outrage and anger that the tragic story of Megan Meier will stir inside you. But if you somehow manage to move past it
Yesterday I read an article in the New York Times entitled ‘Securing Very Important Data: Your Own‘. One of the rare mainstream discussions about personal identity management (as opposed to the common identity theft related articles that you see constantly), the article touched upon some of the more interesting discussions that are going on in