• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this presentation? Why not share!

Identity Management: A New Key Strategic Infrastructure

on

  • 1,140 views

Introductory presentation by David Harrison (Cardiff University)

Introductory presentation by David Harrison (Cardiff University)

Statistics

Views

Total Views
1,140
Views on SlideShare
1,140
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Identity Management: A New Key Strategic Infrastructure Identity Management: A New Key Strategic Infrastructure Presentation Transcript

    • Identity Management
      A New Key Strategic Infrastructure
    • Themes
      How we got to where we are today … and where might we want to get to
      Where identity providers clash
      Architecture for the perfect IdM solution
      A look at Entitlement and Risk
      IdM is Strategic Infrasructure
    • The issues so far
      IdM systems are becoming more complex as they become more essential in making connectivity more transparent for the user
      Federated access goes along way to solve the problem but it doesn’t cope well with the individual and their own identity
      Solutions are based on pushing credentials to systems … just in case they’re needed; so the information has to be there … just in case
    • Some new issues
      Multitude of identity providers from non-traditional sources – Google, Facebook, Salesforce – all extending into the enterprise through cloud computing as well as in-the-cloud IdPs such as Symplified
      Emergence of self-assertion – OpenId; users holding their own identities
      The future can never be the same
    • Phew! That’s challenging!
      Yes it is; but it’s the way things are heading because
      Increasingly users will put more value on their personally provisioned identities than the ones provided for them by the enterprise
      The move to the cloud and SaaS makes the inter-working with other IdPs more certain
      A model based upon pushing identity will ultimately fail because of its complexity and administrative challenge
      Let’s look at risk to finish off with then …
    • References
      The Emerging Architecture of Identity Management (Burton Group, Apr. 2010)
      Building an Entitlement Catalog: A critical success factor of Identity Management (Burton Group, Aug. 2010)
      So … in conclusion (and addressing the present, not the future)
    • “Who owns identity management?”
      Role, context & personalisation: something you can only do in PARTNERSHIP
      It’s an institutional issue; can only be resolved (owned) at an institutional level
      Identity management is strategic and cannot be aligned to any one application … however important it might be perceived to be!
      An entitlement catalogue is as essential for granular identity management as identifying those authorised to access entitlements
    • The case for federation
      Collaborating and co-operating institutions –research, joint projects
      Open Educational Resources – but how open do you want it?
      Shared Services – enabling distributed services
      Mergers – federating directories
    • Some Final thoughts
      Is it time for some joined-up thinking in this space?
      Content-centric - aggregated data/mashups look to be the future – Access & Identity Management has to be able to enable this
      How integrated is our thinking between physical (network) security, identity management and information security?
      Governance, Regulation … and Charging – are we ready?
    • … and Some Really Final Thoughts!
      Mobile “me”, eduRoam – are we focused on PERSONAL computing?
      What is the place of the organisation in an identity space which crosses Federation boundaries?
      Federated Identity & Personal Identity – who are the IdP of the future?
      My conclusion: We need to bring ID/Access/Information Security Management much closer together