B2B Identity Management
Securing Pipes This is the easy part of B2B identity
Managing Identity is Getting Harder <ul><li>Increasing automation demand </li></ul><ul><li>Partner On-boarding requirement...
<company>Big Corporation</company> mutually defined Duns number ZZ 01 07 ISA GS una unb https://sub.domain.com IP Address
Identity, Access and Security <ul><li>Companies </li></ul><ul><ul><li>Divisions </li></ul></ul><ul><ul><li>Geographies </l...
Questions to Ask <ul><li>Who can represent a company? </li></ul><ul><li>Who represents the buyer and seller? </li></ul><ul...
e-Invoicing in Europe is about identity and security <ul><li>EU Council Directive on e-Invoicing (2006/112/EC, November 20...
opportunity is beyond the network
Access and Controls The right systems, the right platforms, the people and the right partners
Data is everywhere Identity is embedded in the data
Identity is part of EVERY B2B Layer <ul><li>Digital certificates </li></ul><ul><li>SSH (secure shell) </li></ul><ul><li>PG...
What is the cure? Collaborative Standards Development
B2B Identity Management
Upcoming SlideShare
Loading in …5
×

B2B Identity Management

1,323 views

Published on

Enhancing data exchange through standards development centered around B2B identity management.

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,323
On SlideShare
0
From Embeds
0
Number of Embeds
23
Actions
Shares
0
Downloads
0
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide
  • B2B Identity Management

    1. 1. B2B Identity Management
    2. 2. Securing Pipes This is the easy part of B2B identity
    3. 3. Managing Identity is Getting Harder <ul><li>Increasing automation demand </li></ul><ul><li>Partner On-boarding requirements increasing </li></ul><ul><li>Increasing demands for compliance reporting </li></ul><ul><li>Protocol complexity growing </li></ul><ul><li>Increasing focus on security and governance </li></ul>
    4. 4. <company>Big Corporation</company> mutually defined Duns number ZZ 01 07 ISA GS una unb https://sub.domain.com IP Address
    5. 5. Identity, Access and Security <ul><li>Companies </li></ul><ul><ul><li>Divisions </li></ul></ul><ul><ul><li>Geographies </li></ul></ul><ul><ul><li>Locations </li></ul></ul><ul><li>People </li></ul><ul><ul><li>Admins </li></ul></ul><ul><ul><li>Users </li></ul></ul><ul><ul><li>Management </li></ul></ul><ul><li>Products </li></ul><ul><ul><li>Genealogy </li></ul></ul><ul><ul><li>Chain of Custody </li></ul></ul>
    6. 6. Questions to Ask <ul><li>Who can represent a company? </li></ul><ul><li>Who represents the buyer and seller? </li></ul><ul><li>How to manage in transit and customs identity needs? </li></ul><ul><li>Who validates that any given document is valid? </li></ul><ul><li>Who can change routing information? </li></ul><ul><li>How to manage a singe ID on multiple networks? </li></ul><ul><li>Who defines ID’s? </li></ul>
    7. 7. e-Invoicing in Europe is about identity and security <ul><li>EU Council Directive on e-Invoicing (2006/112/EC, November 2006) </li></ul><ul><ul><li>Ratified by all EU countries </li></ul></ul><ul><ul><li>Paper and electronic invoices are possible </li></ul></ul><ul><ul><li>Third Parties can act for sender and receiver </li></ul></ul><ul><ul><li>Electronic Invoices can be sent by: </li></ul></ul><ul><ul><ul><li>EDI (1994/820/EU) </li></ul></ul></ul><ul><ul><ul><li>Digitally signed document (1999/93/EU) </li></ul></ul></ul><ul><ul><ul><li>Other means (to be defined by the EU-member state) </li></ul></ul></ul><ul><ul><li>Country-specific requirements: </li></ul></ul><ul><ul><ul><li>Archiving </li></ul></ul></ul><ul><ul><ul><li>Electronic Signature </li></ul></ul></ul><ul><ul><ul><li>Service Provider </li></ul></ul></ul><ul><ul><ul><li>First Mile Connection </li></ul></ul></ul>The EU broadened e-Invoicing support by implementing EU Council Directive on e-Invoicing (since 2004)
    8. 8. opportunity is beyond the network
    9. 9. Access and Controls The right systems, the right platforms, the people and the right partners
    10. 10. Data is everywhere Identity is embedded in the data
    11. 11. Identity is part of EVERY B2B Layer <ul><li>Digital certificates </li></ul><ul><li>SSH (secure shell) </li></ul><ul><li>PGP </li></ul><ul><li>SMTP </li></ul><ul><li>HTTP/s </li></ul><ul><li>FTP/s </li></ul><ul><li>NAESB </li></ul><ul><li>Event-driven </li></ul><ul><li>Scheduled </li></ul><ul><li>Leased line </li></ul><ul><li>VPN </li></ul><ul><li>Binary </li></ul><ul><li>User-defined </li></ul><ul><li>SSL, TLS/SLL </li></ul><ul><li>S/MIME </li></ul><ul><li>IPSEC </li></ul><ul><li>Proxy Servers (HTTP, FTP) </li></ul>Security Flexible Communication Capabilities <ul><li>AS1, AS2, AS3 </li></ul><ul><li>ebXML </li></ul><ul><li>JMS/MQ </li></ul><ul><li>Web Services </li></ul><ul><li>EBMX </li></ul>Transport <ul><li>Real-time </li></ul><ul><li>Store-and-forward mailbox </li></ul>Delivery <ul><li>Internet </li></ul><ul><li>Frame relay </li></ul>Connectivity <ul><li>EDI </li></ul><ul><li>XML </li></ul><ul><li>Text </li></ul>Data Formats
    12. 12. What is the cure? Collaborative Standards Development

    ×