SlideShare a Scribd company logo
1 of 10
IDENTITY MANAGEMENT
A New Key Strategic Infrastructure
THEMES
 How we got to where we are today … and
where might we want to get to
 Where identity providers clash
 Architecture for the perfect IdM solution
 A look at Entitlement and Risk
 IdM is Strategic Infrasructure
THE ISSUES SO FAR
 IdM systems are becoming more complex as
they become more essential in making
connectivity more transparent for the user
 Federated access goes along way to solve
the problem but it doesn’t cope well with the
individual and their own identity
 Solutions are based on pushing credentials
to systems … just in case they’re needed; so
the information has to be there … just in
case
SOME NEW ISSUES
 Multitude of identity providers from non-
traditional sources – Google, Facebook,
Salesforce – all extending into the enterprise
through cloud computing as well as in-the-
cloud IdPs such as Symplified
 Emergence of self-assertion – OpenId; users
holding their own identities
 The future can never be the same
PHEW! THAT’S CHALLENGING!
 Yes it is; but it’s the way things are heading
because
 Increasingly users will put more value on their
personally provisioned identities than the ones
provided for them by the enterprise
 The move to the cloud and SaaS makes the inter-
working with other IdPs more certain
 A model based upon pushing identity will ultimately
fail because of its complexity and administrative
challenge
 Let’s look at risk to finish off with then …
REFERENCES
 The Emerging Architecture of Identity
Management (Burton Group, Apr. 2010)
 Building an Entitlement Catalog: A critical
success factor of Identity Management
(Burton Group, Aug. 2010)
 So … in conclusion (and addressing the
present, not the future)
“WHO OWNS IDENTITY MANAGEMENT?”
 Role, context & personalisation: something
you can only do in PARTNERSHIP
 It’s an institutional issue; can only be
resolved (owned) at an institutional level
 Identity management is strategic and cannot
be aligned to any one application … however
important it might be perceived to be!
 An entitlement catalogue is as essential for
granular identity management as identifying
those authorised to access entitlements
THE CASE FOR FEDERATION
 Collaborating and co-operating institutions –
research, joint projects
 Open Educational Resources – but how
open do you want it?
 Shared Services – enabling distributed
services
 Mergers – federating directories
SOME FINAL THOUGHTS
 Is it time for some joined-up thinking in this
space?
Content-centric - aggregated
data/mashups look to be the future –
Access & Identity Management has to be
able to enable this
 How integrated is our thinking between
physical (network) security, identity
management and information security?
 Governance, Regulation … and Charging –
are we ready?
… AND SOME REALLY FINAL THOUGHTS!
 Mobile “me”, eduRoam – are we focused on
PERSONAL computing?
 What is the place of the organisation in an
identity space which crosses Federation
boundaries?
 Federated Identity & Personal Identity – who
are the IdP of the future?
 My conclusion: We need to bring
ID/Access/Information Security Management
much closer together

More Related Content

What's hot

knowledge management tools
knowledge management toolsknowledge management tools
knowledge management tools
Abin Biju
 
Emerging Trends in Knowledge Management
Emerging Trends in Knowledge ManagementEmerging Trends in Knowledge Management
Emerging Trends in Knowledge Management
Nikesh Narayanan
 
Knowledge Management in Organizations: Case Study
Knowledge Management in Organizations: Case StudyKnowledge Management in Organizations: Case Study
Knowledge Management in Organizations: Case Study
Manal Rayess
 
Justice institute v1 short 2
Justice institute v1 short 2Justice institute v1 short 2
Justice institute v1 short 2
LeslieDickout
 
Seth Earley Presentation on Knowledge Management Through Search-Based Applica...
Seth Earley Presentation on Knowledge Management Through Search-Based Applica...Seth Earley Presentation on Knowledge Management Through Search-Based Applica...
Seth Earley Presentation on Knowledge Management Through Search-Based Applica...
Earley Information Science
 
Knowledge Management Models
Knowledge Management ModelsKnowledge Management Models
Knowledge Management Models
Tilahun Teffera
 

What's hot (19)

knowledge management tools
knowledge management toolsknowledge management tools
knowledge management tools
 
Introduction to Information Architecture
Introduction to Information ArchitectureIntroduction to Information Architecture
Introduction to Information Architecture
 
Knowledge Management, Business Intelligence & Business Analytics - Managemen...
Knowledge Management,  Business Intelligence & Business Analytics - Managemen...Knowledge Management,  Business Intelligence & Business Analytics - Managemen...
Knowledge Management, Business Intelligence & Business Analytics - Managemen...
 
Knowledge management and sharepoint
Knowledge management and sharepointKnowledge management and sharepoint
Knowledge management and sharepoint
 
Knowledge Management framework in ITES/BPO Industry
Knowledge Management framework in ITES/BPO IndustryKnowledge Management framework in ITES/BPO Industry
Knowledge Management framework in ITES/BPO Industry
 
Emerging Trends in Knowledge Management
Emerging Trends in Knowledge ManagementEmerging Trends in Knowledge Management
Emerging Trends in Knowledge Management
 
Knowledge Management and Social Networking
Knowledge Management and Social NetworkingKnowledge Management and Social Networking
Knowledge Management and Social Networking
 
Knowledge_sample
Knowledge_sampleKnowledge_sample
Knowledge_sample
 
Knowledge_sample
Knowledge_sampleKnowledge_sample
Knowledge_sample
 
Knowledge Management Tools & Techniques
Knowledge Management Tools & TechniquesKnowledge Management Tools & Techniques
Knowledge Management Tools & Techniques
 
Knowledge management ppt @ bec doms mba genral
Knowledge management ppt @ bec doms mba genralKnowledge management ppt @ bec doms mba genral
Knowledge management ppt @ bec doms mba genral
 
Knowledge Management in Organizations: Case Study
Knowledge Management in Organizations: Case StudyKnowledge Management in Organizations: Case Study
Knowledge Management in Organizations: Case Study
 
Knowledge Management System & Technology
Knowledge Management System & TechnologyKnowledge Management System & Technology
Knowledge Management System & Technology
 
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 UpdateTricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
 
Justice institute v1 short 2
Justice institute v1 short 2Justice institute v1 short 2
Justice institute v1 short 2
 
Seth Earley Presentation on Knowledge Management Through Search-Based Applica...
Seth Earley Presentation on Knowledge Management Through Search-Based Applica...Seth Earley Presentation on Knowledge Management Through Search-Based Applica...
Seth Earley Presentation on Knowledge Management Through Search-Based Applica...
 
Knowledge Management Models
Knowledge Management ModelsKnowledge Management Models
Knowledge Management Models
 
A brief introduction to Knowledge Management
A brief introduction to Knowledge ManagementA brief introduction to Knowledge Management
A brief introduction to Knowledge Management
 
Web 2.0 Tools for Knowledge Management
Web 2.0 Tools for Knowledge ManagementWeb 2.0 Tools for Knowledge Management
Web 2.0 Tools for Knowledge Management
 

Similar to Identity Management: A New Key Strategic Infrastructure

Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Zia Consulting
 
Scl Group Collaboration Beyond Web 20
Scl Group   Collaboration Beyond Web 20Scl Group   Collaboration Beyond Web 20
Scl Group Collaboration Beyond Web 20
Richard Zbinden
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity Teams
Joyce Brocaglia
 
SharePoint & Social Computing Presentation
SharePoint & Social Computing PresentationSharePoint & Social Computing Presentation
SharePoint & Social Computing Presentation
Brendon Ford
 
Justice Institute V1 Short 2
Justice Institute V1 Short 2Justice Institute V1 Short 2
Justice Institute V1 Short 2
LeslieDickout
 

Similar to Identity Management: A New Key Strategic Infrastructure (20)

50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
Scl Group Collaboration Beyond Web 20
Scl Group   Collaboration Beyond Web 20Scl Group   Collaboration Beyond Web 20
Scl Group Collaboration Beyond Web 20
 
So that's it for it services, or is it?
So that's it for it services, or is it?So that's it for it services, or is it?
So that's it for it services, or is it?
 
Five Ways to Make Identity Management Work Best Across Hybrid Computing Envir...
Five Ways to Make Identity Management Work Best Across Hybrid Computing Envir...Five Ways to Make Identity Management Work Best Across Hybrid Computing Envir...
Five Ways to Make Identity Management Work Best Across Hybrid Computing Envir...
 
District Office of Info and KM - Proposed - by Joel Magnussen - 2004
District Office of Info and KM - Proposed - by Joel Magnussen - 2004District Office of Info and KM - Proposed - by Joel Magnussen - 2004
District Office of Info and KM - Proposed - by Joel Magnussen - 2004
 
Knowledge Management Webinar
Knowledge Management WebinarKnowledge Management Webinar
Knowledge Management Webinar
 
Building World Class Cybersecurity Teams
Building World Class Cybersecurity TeamsBuilding World Class Cybersecurity Teams
Building World Class Cybersecurity Teams
 
Km ver 1.0 student
Km   ver 1.0 studentKm   ver 1.0 student
Km ver 1.0 student
 
Bring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked IndividualBring your own... Everything! The Rise of the Networked Individual
Bring your own... Everything! The Rise of the Networked Individual
 
SharePoint & Social Computing Presentation
SharePoint & Social Computing PresentationSharePoint & Social Computing Presentation
SharePoint & Social Computing Presentation
 
Knowledge Sample
Knowledge SampleKnowledge Sample
Knowledge Sample
 
Conversational Intelligence and Better Customer Conversations
Conversational Intelligence and Better Customer ConversationsConversational Intelligence and Better Customer Conversations
Conversational Intelligence and Better Customer Conversations
 
Economicsof socialcomputing richblankv2_2008
Economicsof socialcomputing richblankv2_2008Economicsof socialcomputing richblankv2_2008
Economicsof socialcomputing richblankv2_2008
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Justice Institute V1 Short 2
Justice Institute V1 Short 2Justice Institute V1 Short 2
Justice Institute V1 Short 2
 
Information Management White Paper
Information Management White PaperInformation Management White Paper
Information Management White Paper
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Joining It All Up - KIM Legal
Joining It All Up - KIM LegalJoining It All Up - KIM Legal
Joining It All Up - KIM Legal
 
A Primer for a layman about Big Data, Business Analytics and Cloud
A Primer for a layman  about Big Data, Business Analytics and CloudA Primer for a layman  about Big Data, Business Analytics and Cloud
A Primer for a layman about Big Data, Business Analytics and Cloud
 

More from JISC Netskills

Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagement
JISC Netskills
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the real
JISC Netskills
 

More from JISC Netskills (20)

Engage 2014 going dragon hunting
Engage 2014   going dragon huntingEngage 2014   going dragon hunting
Engage 2014 going dragon hunting
 
Digital storytelling for public engagement
Digital storytelling for public engagementDigital storytelling for public engagement
Digital storytelling for public engagement
 
A quick guide to taking awesome photos
A quick guide to taking awesome photosA quick guide to taking awesome photos
A quick guide to taking awesome photos
 
Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)Digital Storytelling (Changing the Learner Landscape event)
Digital Storytelling (Changing the Learner Landscape event)
 
Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012Lisa Gray (JISC) ePortfolios - October 2012
Lisa Gray (JISC) ePortfolios - October 2012
 
Digital maps & data mash ups
Digital maps & data mash upsDigital maps & data mash ups
Digital maps & data mash ups
 
Introducing digital storytelling
Introducing digital storytellingIntroducing digital storytelling
Introducing digital storytelling
 
Web tools for administrators
Web tools for administratorsWeb tools for administrators
Web tools for administrators
 
A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)A Tale of Two Cities (Neil Currant)
A Tale of Two Cities (Neil Currant)
 
Embedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City UniversityEmbedding Mahara at Birmingham City University
Embedding Mahara at Birmingham City University
 
Digital storytelling for the flipped classroom
Digital storytelling for the flipped classroomDigital storytelling for the flipped classroom
Digital storytelling for the flipped classroom
 
Using free web based tools for collaborative e learning
Using free web based tools for collaborative e learningUsing free web based tools for collaborative e learning
Using free web based tools for collaborative e learning
 
QR codes - the virtual poking into the real
QR codes - the virtual poking into the realQR codes - the virtual poking into the real
QR codes - the virtual poking into the real
 
Greenevents2
Greenevents2Greenevents2
Greenevents2
 
Greeningthedatacentre
GreeningthedatacentreGreeningthedatacentre
Greeningthedatacentre
 
Suste tech
Suste techSuste tech
Suste tech
 
Proco2
Proco2Proco2
Proco2
 
Kit catalogue
Kit catalogueKit catalogue
Kit catalogue
 
Virtually sustainable
Virtually sustainableVirtually sustainable
Virtually sustainable
 
Ucare
UcareUcare
Ucare
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Identity Management: A New Key Strategic Infrastructure

  • 1. IDENTITY MANAGEMENT A New Key Strategic Infrastructure
  • 2. THEMES  How we got to where we are today … and where might we want to get to  Where identity providers clash  Architecture for the perfect IdM solution  A look at Entitlement and Risk  IdM is Strategic Infrasructure
  • 3. THE ISSUES SO FAR  IdM systems are becoming more complex as they become more essential in making connectivity more transparent for the user  Federated access goes along way to solve the problem but it doesn’t cope well with the individual and their own identity  Solutions are based on pushing credentials to systems … just in case they’re needed; so the information has to be there … just in case
  • 4. SOME NEW ISSUES  Multitude of identity providers from non- traditional sources – Google, Facebook, Salesforce – all extending into the enterprise through cloud computing as well as in-the- cloud IdPs such as Symplified  Emergence of self-assertion – OpenId; users holding their own identities  The future can never be the same
  • 5. PHEW! THAT’S CHALLENGING!  Yes it is; but it’s the way things are heading because  Increasingly users will put more value on their personally provisioned identities than the ones provided for them by the enterprise  The move to the cloud and SaaS makes the inter- working with other IdPs more certain  A model based upon pushing identity will ultimately fail because of its complexity and administrative challenge  Let’s look at risk to finish off with then …
  • 6. REFERENCES  The Emerging Architecture of Identity Management (Burton Group, Apr. 2010)  Building an Entitlement Catalog: A critical success factor of Identity Management (Burton Group, Aug. 2010)  So … in conclusion (and addressing the present, not the future)
  • 7. “WHO OWNS IDENTITY MANAGEMENT?”  Role, context & personalisation: something you can only do in PARTNERSHIP  It’s an institutional issue; can only be resolved (owned) at an institutional level  Identity management is strategic and cannot be aligned to any one application … however important it might be perceived to be!  An entitlement catalogue is as essential for granular identity management as identifying those authorised to access entitlements
  • 8. THE CASE FOR FEDERATION  Collaborating and co-operating institutions – research, joint projects  Open Educational Resources – but how open do you want it?  Shared Services – enabling distributed services  Mergers – federating directories
  • 9. SOME FINAL THOUGHTS  Is it time for some joined-up thinking in this space? Content-centric - aggregated data/mashups look to be the future – Access & Identity Management has to be able to enable this  How integrated is our thinking between physical (network) security, identity management and information security?  Governance, Regulation … and Charging – are we ready?
  • 10. … AND SOME REALLY FINAL THOUGHTS!  Mobile “me”, eduRoam – are we focused on PERSONAL computing?  What is the place of the organisation in an identity space which crosses Federation boundaries?  Federated Identity & Personal Identity – who are the IdP of the future?  My conclusion: We need to bring ID/Access/Information Security Management much closer together