Wso2con identity patterns

624 views
572 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
624
On SlideShare
0
From Embeds
0
Number of Embeds
95
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wso2con identity patterns

  1. 1. Enterprise  Iden,ty  Management  &  Security   Pa7erns  and  Prac,ces                                      Prabath  Siriwardena    
  2. 2. Email
  3. 3. JIRA
  4. 4. SVN
  5. 5. Forrester  Iden2ty  Management  Maturity  Model  
  6. 6. Iden2ty  as  a  Service  
  7. 7. Single  Sign  On  
  8. 8. Provisioning  
  9. 9. Delega2on  
  10. 10. Federa2on  
  11. 11. Access  Control  
  12. 12. Audi2ng  
  13. 13. Principles  of  Iden2ty  Data  Do  NOT  replicate  iden22es  
  14. 14. Principles  of  Iden2ty  Data  Business  requirements  should     drive  iden2ty  replica2on  
  15. 15. Principles  of  Iden2ty  Data  Replicated  iden22es  should  be  read-­‐only  
  16. 16. Principles  of  Iden2ty  Data  Iden2ty  data  should  be  loca2on  transparent  
  17. 17. Principles  of  Iden2ty  Data   Enforce  the  consistency  &  integrity    of  iden2ty  data  with  policies,  processes  &  tools    
  18. 18. Principles  of  Iden2ty  Data  Use  open  standards  rather  than  proprietary  standards  
  19. 19. Principles  of  Iden2ty  Data  Use  encryp2on  to  protect  sensi2ve  iden2ty  elements  
  20. 20. WSO2  Iden2ty  Server  •  User  stores  with  LDAP/AD/JDBC  •  Mul2ple  user  store  support  •  OpenID  •  SAML2  •  Kerberos  •  Informa2on  Cards    •  XACML  2.0  /  3.0  •  OAuth  1.0  /  2.0  •  Security  Token  Service  with  WS-­‐Trust  •  SCIM  1.1  •  WS-­‐XACML  
  21. 21. Thank  you  

×