SlideShare a Scribd company logo
POSTCARD FROM IDENTITYNEXT 2013
IdentityNext is a unique conference that pulls aspects from several of the identity
events I’ve attended over the years. As only a handful of Americans attend, it
reminded me of Kuppinger’s EIC (European Identity Conference). There were
delegates from many Western European counties, for example Sweden, Denmark,
France, Germany, Austria, Spain, Belgium, the Netherlands (of course), England
and probably a few more. The focus on privacy reminded me of the PII (Privacy,
Identity, Innovation) which is held several times around the US. And finally, it was
the second conference I attended this year that had an “un-conference” portion,
inspired by IIW (Internet Identity Workshop).
It was a great honor for me to deliver the opening keynote. I wanted to give a
general interest talk about federations, an introduction to OAuth2, and describe
how these two technologies could be combined to the net benefit of society. I was
a little tense, especially as I’d never attended this conference. My slides are here. I
was amused that Martin Wegdam quoted me on Twitter as apologizing for
previous XML identity standards. I was not really serious… As Andre Durand says,
“Identity” is a big and complex domain of knowledge. If we (as in the global
community of identity architects) had figured “it” out on the first try, it would have
been a miracle. Defining standards for identity has been an iterative process. And
13 years later, I think the work done on OpenID Connect puts us on the verge of a
good technical standard for one aspect of Identity–authentication. “Connect” has
achieved something even more elusive: consensus.
One of the best talks was given by author, journalist and teacher Pernilla Tranberg. She
presented an up-to-date view of the current state of online privacy, and some pragmatic
strategies we can consider to achieve more control of our personal data. For example,
don’t use Google search… use “Start Page”, which strips out all the tracking cookies that
sell to advertisers the interested implied by your Internet searches. Also, advise your kids
to sign up for Facebook using a different name so they can start their adult life with a
clean slate.
One of the most amusing talks was given by Mike Chung from KPMG on the topic of
predications. He recommended a number of books: Nate Silver’s The Signal and the
Noise, two books by Nassim Nicholas Taleb: The Black Swan and Fooled by Randomness.
Dan Ariely’s book Predictably Irrational. Robert Kaplan’s Revenge of Geography and
Daron Acemoglu’s Why Nations Fail. Robert McNamaras In Retrospect and Jim Paul’s
What I Learned Losing a Million Dollars. Apparently none of which helped him very much
given his self-proclaimed abysmal record making accurate forecasts in identity and access
management. For example, he forecast in the mid 2000’s that WS-* would be the
predominant federation protocol among other equally inaccurate claims. He totally
missed the rise of mobile computing. And even more amazingly, companies paid him his
inaccurate advice. Hearing stuff like this makes me nervous about the big bets Gluu has
placed on OAuth2, and reminded me that if Gluu is able to invest our scarce resources
properly in one of the most dynamic technical markets, we’re probably more lucky than
smart.
Most Americans are unaware of the identity card programs that have been
undertaken by almost all European governments. The conference featured talks on
the efforts of Sweden, Germany, and Belgium. All of these cards can be used to
access government services. But many are expanding to B2B and B2C purposes.
For example, in Belgium there are beer vending machines that read the birthday off
of your national id cards to figure out if you’re old enough to be served. In Japan I
video-taped a machine that automatically poured a glass of beer. Its clear… our
country is just so far behind, it’s ridiculous.

Given my keen interest for federation, the talk I got the most out of was Rainer
Horbe’s ’s talk on federation. Austrians clearly understand the value of federations,
and also that these federations are hard to form. So the Austrian Chamber of
Commerce formed the Wirtschaftsportalverbund (which believe it or not is an
abbreviation for something like the Austrian Identity Federation Authority) which
aims to establish B2B and B2C federations the cost of identity management and
SSO. This group is creating a framework to help businesses jumpstart federations,
including the required technical and governance components.
One of the most interesting conversations I had at the conference was with Haydar
Cimen from KPN and Steve Pannifer from Hyperion Consulting regarding Snowden.
While a majority of Americans now regard him as a heroic whistle blower, his
support in Europe is even higher. In fact, I seem to be the only one in my industry
who thinks he needs to answer for his actions.
My problem is that if more people follow his precedent, our government and
businesses couldn’t operate. If he thinks the moral imperative to uncover this wrong
was sufficient to justify his actions, he shouldn’t be hiding in Russia. If he had stayed
in the US, I’d support him for standing up for his beliefs. Many people don’t think he
would have gotten a fair trial if he had stayed. Or that maybe the government would
have water-boarded him, or left him in solitary for years like they did to Manning.
Whatever you think of Snowden, it’s clear that our allies view the US as little better
than China, are hesitant to travel to the US for fear of being the victim of a big-data
analysis snafu, and are resentful that their systems are being hacked in the pursuit of
America’s enemies in a covert cyber war for which we apparently have a great talent
(and an insane amount of budget).
I was happy to see many old friends, especially from Surfnet and Kinnesnet. I also
got a chance to chat with Hans Zandbelt from Ping Identity. Apparently after working
all day on helping companies implement federation, he can’t get enough, so he has
been moonlighting to write his own OpenID Connect plugin for Apache. It’s much
simpler than the one Gluu has undertaken in our crowd-sourcing project. The nice
thing about it is that it is standalone. Gluu uses a local process, “oxd”, to handle the
OAuth2 messaging. Some people don’t want this additional complexity.
We used this approach because it enabled us to leverage our Java libraries for
OpenID Connect and UMA, and it would have taken us too long to do all the
messaging in C (as we already have Java libraries written). Hans’ plugin supports
less features, but its a great example of how you can use a subset of the features if
it suits your purpose. More options for developers is great, so I hope Hans has the
energy to keep working on it, and to make it available to other developers. If you
want to look at the code, its currently here.
Finally, one of the best uses of technology on display in a video from the UK by
hipster the “Urban Wizard.” To express his identity he likes to dress up like a wizard
when he walks around London. He melted his Oyster card (subway debit card), and
attached the chip to his staff. As he walks into the subway, he touches his staff to
the turnstiles, and magically, the doors swing open. Apparently the police were not
amused, and won’t let him do this anymore. But it’s a reminder that technology is
not a one-size fits all affair. People will use things in ways the developers never
intended. Who knows what OX will be used for one day… open source and open
standards are more embracing of this phenomenon than the metro police
Article Resource:-http://thegluuserver.tumblr.com/post/68143784696/postcardfrom-identitynext-2013

More Related Content

Viewers also liked

Non Collection Notice Example
Non Collection Notice ExampleNon Collection Notice Example
Non Collection Notice Example
Katherine Cheso
 
Interview with ING DIRECT Canada's Sustainability Manager
Interview with ING DIRECT Canada's Sustainability ManagerInterview with ING DIRECT Canada's Sustainability Manager
Interview with ING DIRECT Canada's Sustainability Manager
Bmeaningful
 
Piu ramaicuna fores-la navidad
Piu ramaicuna fores-la navidadPiu ramaicuna fores-la navidad
Piu ramaicuna fores-la navidad
Zeila-Ramaicunaf
 
Larry_Williams_Resume
Larry_Williams_ResumeLarry_Williams_Resume
Larry_Williams_Resume
Larry Williams
 
Sosyal Medya'da İçerik Nasıl Olmalı
Sosyal Medya'da İçerik Nasıl OlmalıSosyal Medya'da İçerik Nasıl Olmalı
Sosyal Medya'da İçerik Nasıl OlmalıBERKAY TUGAY
 
introduction to nuclear chemistry for advanced students by igori wallace
introduction to nuclear chemistry for advanced students by igori wallaceintroduction to nuclear chemistry for advanced students by igori wallace
introduction to nuclear chemistry for advanced students by igori wallace
Igori Wallace
 
óptica
óptica óptica
óptica
Mayito Pdg
 

Viewers also liked (7)

Non Collection Notice Example
Non Collection Notice ExampleNon Collection Notice Example
Non Collection Notice Example
 
Interview with ING DIRECT Canada's Sustainability Manager
Interview with ING DIRECT Canada's Sustainability ManagerInterview with ING DIRECT Canada's Sustainability Manager
Interview with ING DIRECT Canada's Sustainability Manager
 
Piu ramaicuna fores-la navidad
Piu ramaicuna fores-la navidadPiu ramaicuna fores-la navidad
Piu ramaicuna fores-la navidad
 
Larry_Williams_Resume
Larry_Williams_ResumeLarry_Williams_Resume
Larry_Williams_Resume
 
Sosyal Medya'da İçerik Nasıl Olmalı
Sosyal Medya'da İçerik Nasıl OlmalıSosyal Medya'da İçerik Nasıl Olmalı
Sosyal Medya'da İçerik Nasıl Olmalı
 
introduction to nuclear chemistry for advanced students by igori wallace
introduction to nuclear chemistry for advanced students by igori wallaceintroduction to nuclear chemistry for advanced students by igori wallace
introduction to nuclear chemistry for advanced students by igori wallace
 
óptica
óptica óptica
óptica
 

Similar to Postcard from identity next 2013

Calligraphy Writing Stationery Calligraphy Pra
Calligraphy Writing Stationery Calligraphy PraCalligraphy Writing Stationery Calligraphy Pra
Calligraphy Writing Stationery Calligraphy Pra
Crystal Carter
 
Step-By-Step Guide To Essay Writing Ensay
Step-By-Step Guide To Essay Writing EnsayStep-By-Step Guide To Essay Writing Ensay
Step-By-Step Guide To Essay Writing Ensay
Tiffany Rose
 
Tips On How To Write A Better Narrative Essay Essays
Tips On How To Write A Better Narrative Essay  EssaysTips On How To Write A Better Narrative Essay  Essays
Tips On How To Write A Better Narrative Essay Essays
Rebecca Buono
 
Same time, different channel
Same time, different channelSame time, different channel
Same time, different channel
JoannaTMcLeod
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectives
Karlos Svoboda
 
2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)
Felipe Prado
 
Thesis Statement For American Dream Essay
Thesis Statement For American Dream EssayThesis Statement For American Dream Essay
Thesis Statement For American Dream Essay
Amanda Cote
 
Research Paper Format Tips For Ultimate Writing Success
Research Paper Format Tips For Ultimate Writing SuccessResearch Paper Format Tips For Ultimate Writing Success
Research Paper Format Tips For Ultimate Writing Success
Maritza Peterson
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
Felipe Prado
 
Essay On Eid Milad Un Nabi. Online assignment writing service.
Essay On Eid Milad Un Nabi. Online assignment writing service.Essay On Eid Milad Un Nabi. Online assignment writing service.
Essay On Eid Milad Un Nabi. Online assignment writing service.
Kris Hallengren
 
ATAS Amsterdam Social Media & Tourism Support
ATAS Amsterdam Social Media & Tourism SupportATAS Amsterdam Social Media & Tourism Support
ATAS Amsterdam Social Media & Tourism Support
Jens Best
 
Great Essay Writers
Great Essay WritersGreat Essay Writers
Great Essay Writers
Amy Williams
 
Narrative Essay Writing Worksh
Narrative Essay Writing WorkshNarrative Essay Writing Worksh
Narrative Essay Writing Worksh
Donna Kuhns
 
Interactive Essay Writing Telegraph
Interactive Essay Writing TelegraphInteractive Essay Writing Telegraph
Interactive Essay Writing Telegraph
Jamie Akers
 
Write A For And Against Essay About Learning English As A Foreign Language
Write A For And Against Essay About Learning English As A Foreign LanguageWrite A For And Against Essay About Learning English As A Foreign Language
Write A For And Against Essay About Learning English As A Foreign Language
Stephanie Weber
 
Essay Writing On Facebook And Whatsapp Spoiling Relationships
Essay Writing On Facebook And Whatsapp Spoiling RelationshipsEssay Writing On Facebook And Whatsapp Spoiling Relationships
Essay Writing On Facebook And Whatsapp Spoiling Relationships
Alicia Galindo
 
Sportsmanship Essay Conclusion
Sportsmanship Essay ConclusionSportsmanship Essay Conclusion
Sportsmanship Essay Conclusion
Laura Jones
 
P2P Essay. Online assignment writing service.
P2P Essay. Online assignment writing service.P2P Essay. Online assignment writing service.
P2P Essay. Online assignment writing service.
Yolanda Allrich
 
Critical Analysis Paper Format. Critical Response
Critical Analysis Paper Format. Critical ResponseCritical Analysis Paper Format. Critical Response
Critical Analysis Paper Format. Critical Response
Sandra Gubner
 
Essay Introduction About Climate Change
Essay Introduction About Climate ChangeEssay Introduction About Climate Change
Essay Introduction About Climate Change
Elizabeth Hernandez
 

Similar to Postcard from identity next 2013 (20)

Calligraphy Writing Stationery Calligraphy Pra
Calligraphy Writing Stationery Calligraphy PraCalligraphy Writing Stationery Calligraphy Pra
Calligraphy Writing Stationery Calligraphy Pra
 
Step-By-Step Guide To Essay Writing Ensay
Step-By-Step Guide To Essay Writing EnsayStep-By-Step Guide To Essay Writing Ensay
Step-By-Step Guide To Essay Writing Ensay
 
Tips On How To Write A Better Narrative Essay Essays
Tips On How To Write A Better Narrative Essay  EssaysTips On How To Write A Better Narrative Essay  Essays
Tips On How To Write A Better Narrative Essay Essays
 
Same time, different channel
Same time, different channelSame time, different channel
Same time, different channel
 
Identity REvolution multi disciplinary perspectives
Identity REvolution   multi disciplinary perspectivesIdentity REvolution   multi disciplinary perspectives
Identity REvolution multi disciplinary perspectives
 
2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)
 
Thesis Statement For American Dream Essay
Thesis Statement For American Dream EssayThesis Statement For American Dream Essay
Thesis Statement For American Dream Essay
 
Research Paper Format Tips For Ultimate Writing Success
Research Paper Format Tips For Ultimate Writing SuccessResearch Paper Format Tips For Ultimate Writing Success
Research Paper Format Tips For Ultimate Writing Success
 
2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)2600 v19 n4 (winter 2002)
2600 v19 n4 (winter 2002)
 
Essay On Eid Milad Un Nabi. Online assignment writing service.
Essay On Eid Milad Un Nabi. Online assignment writing service.Essay On Eid Milad Un Nabi. Online assignment writing service.
Essay On Eid Milad Un Nabi. Online assignment writing service.
 
ATAS Amsterdam Social Media & Tourism Support
ATAS Amsterdam Social Media & Tourism SupportATAS Amsterdam Social Media & Tourism Support
ATAS Amsterdam Social Media & Tourism Support
 
Great Essay Writers
Great Essay WritersGreat Essay Writers
Great Essay Writers
 
Narrative Essay Writing Worksh
Narrative Essay Writing WorkshNarrative Essay Writing Worksh
Narrative Essay Writing Worksh
 
Interactive Essay Writing Telegraph
Interactive Essay Writing TelegraphInteractive Essay Writing Telegraph
Interactive Essay Writing Telegraph
 
Write A For And Against Essay About Learning English As A Foreign Language
Write A For And Against Essay About Learning English As A Foreign LanguageWrite A For And Against Essay About Learning English As A Foreign Language
Write A For And Against Essay About Learning English As A Foreign Language
 
Essay Writing On Facebook And Whatsapp Spoiling Relationships
Essay Writing On Facebook And Whatsapp Spoiling RelationshipsEssay Writing On Facebook And Whatsapp Spoiling Relationships
Essay Writing On Facebook And Whatsapp Spoiling Relationships
 
Sportsmanship Essay Conclusion
Sportsmanship Essay ConclusionSportsmanship Essay Conclusion
Sportsmanship Essay Conclusion
 
P2P Essay. Online assignment writing service.
P2P Essay. Online assignment writing service.P2P Essay. Online assignment writing service.
P2P Essay. Online assignment writing service.
 
Critical Analysis Paper Format. Critical Response
Critical Analysis Paper Format. Critical ResponseCritical Analysis Paper Format. Critical Response
Critical Analysis Paper Format. Critical Response
 
Essay Introduction About Climate Change
Essay Introduction About Climate ChangeEssay Introduction About Climate Change
Essay Introduction About Climate Change
 

More from Gluu

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
Gluu
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
Gluu
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
Gluu
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
Gluu
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
Gluu
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
Gluu
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
Gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
Gluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
Gluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
Gluu
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Gluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
Gluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
Gluu
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
Gluu
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
Gluu
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
Gluu
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
Gluu
 

More from Gluu (20)

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 

Postcard from identity next 2013

  • 1. POSTCARD FROM IDENTITYNEXT 2013 IdentityNext is a unique conference that pulls aspects from several of the identity events I’ve attended over the years. As only a handful of Americans attend, it reminded me of Kuppinger’s EIC (European Identity Conference). There were delegates from many Western European counties, for example Sweden, Denmark, France, Germany, Austria, Spain, Belgium, the Netherlands (of course), England and probably a few more. The focus on privacy reminded me of the PII (Privacy, Identity, Innovation) which is held several times around the US. And finally, it was the second conference I attended this year that had an “un-conference” portion, inspired by IIW (Internet Identity Workshop). It was a great honor for me to deliver the opening keynote. I wanted to give a general interest talk about federations, an introduction to OAuth2, and describe how these two technologies could be combined to the net benefit of society. I was a little tense, especially as I’d never attended this conference. My slides are here. I was amused that Martin Wegdam quoted me on Twitter as apologizing for previous XML identity standards. I was not really serious… As Andre Durand says, “Identity” is a big and complex domain of knowledge. If we (as in the global community of identity architects) had figured “it” out on the first try, it would have been a miracle. Defining standards for identity has been an iterative process. And 13 years later, I think the work done on OpenID Connect puts us on the verge of a good technical standard for one aspect of Identity–authentication. “Connect” has achieved something even more elusive: consensus.
  • 2. One of the best talks was given by author, journalist and teacher Pernilla Tranberg. She presented an up-to-date view of the current state of online privacy, and some pragmatic strategies we can consider to achieve more control of our personal data. For example, don’t use Google search… use “Start Page”, which strips out all the tracking cookies that sell to advertisers the interested implied by your Internet searches. Also, advise your kids to sign up for Facebook using a different name so they can start their adult life with a clean slate. One of the most amusing talks was given by Mike Chung from KPMG on the topic of predications. He recommended a number of books: Nate Silver’s The Signal and the Noise, two books by Nassim Nicholas Taleb: The Black Swan and Fooled by Randomness. Dan Ariely’s book Predictably Irrational. Robert Kaplan’s Revenge of Geography and Daron Acemoglu’s Why Nations Fail. Robert McNamaras In Retrospect and Jim Paul’s What I Learned Losing a Million Dollars. Apparently none of which helped him very much given his self-proclaimed abysmal record making accurate forecasts in identity and access management. For example, he forecast in the mid 2000’s that WS-* would be the predominant federation protocol among other equally inaccurate claims. He totally missed the rise of mobile computing. And even more amazingly, companies paid him his inaccurate advice. Hearing stuff like this makes me nervous about the big bets Gluu has placed on OAuth2, and reminded me that if Gluu is able to invest our scarce resources properly in one of the most dynamic technical markets, we’re probably more lucky than smart.
  • 3. Most Americans are unaware of the identity card programs that have been undertaken by almost all European governments. The conference featured talks on the efforts of Sweden, Germany, and Belgium. All of these cards can be used to access government services. But many are expanding to B2B and B2C purposes. For example, in Belgium there are beer vending machines that read the birthday off of your national id cards to figure out if you’re old enough to be served. In Japan I video-taped a machine that automatically poured a glass of beer. Its clear… our country is just so far behind, it’s ridiculous. Given my keen interest for federation, the talk I got the most out of was Rainer Horbe’s ’s talk on federation. Austrians clearly understand the value of federations, and also that these federations are hard to form. So the Austrian Chamber of Commerce formed the Wirtschaftsportalverbund (which believe it or not is an abbreviation for something like the Austrian Identity Federation Authority) which aims to establish B2B and B2C federations the cost of identity management and SSO. This group is creating a framework to help businesses jumpstart federations, including the required technical and governance components. One of the most interesting conversations I had at the conference was with Haydar Cimen from KPN and Steve Pannifer from Hyperion Consulting regarding Snowden. While a majority of Americans now regard him as a heroic whistle blower, his support in Europe is even higher. In fact, I seem to be the only one in my industry who thinks he needs to answer for his actions.
  • 4. My problem is that if more people follow his precedent, our government and businesses couldn’t operate. If he thinks the moral imperative to uncover this wrong was sufficient to justify his actions, he shouldn’t be hiding in Russia. If he had stayed in the US, I’d support him for standing up for his beliefs. Many people don’t think he would have gotten a fair trial if he had stayed. Or that maybe the government would have water-boarded him, or left him in solitary for years like they did to Manning. Whatever you think of Snowden, it’s clear that our allies view the US as little better than China, are hesitant to travel to the US for fear of being the victim of a big-data analysis snafu, and are resentful that their systems are being hacked in the pursuit of America’s enemies in a covert cyber war for which we apparently have a great talent (and an insane amount of budget). I was happy to see many old friends, especially from Surfnet and Kinnesnet. I also got a chance to chat with Hans Zandbelt from Ping Identity. Apparently after working all day on helping companies implement federation, he can’t get enough, so he has been moonlighting to write his own OpenID Connect plugin for Apache. It’s much simpler than the one Gluu has undertaken in our crowd-sourcing project. The nice thing about it is that it is standalone. Gluu uses a local process, “oxd”, to handle the OAuth2 messaging. Some people don’t want this additional complexity.
  • 5. We used this approach because it enabled us to leverage our Java libraries for OpenID Connect and UMA, and it would have taken us too long to do all the messaging in C (as we already have Java libraries written). Hans’ plugin supports less features, but its a great example of how you can use a subset of the features if it suits your purpose. More options for developers is great, so I hope Hans has the energy to keep working on it, and to make it available to other developers. If you want to look at the code, its currently here. Finally, one of the best uses of technology on display in a video from the UK by hipster the “Urban Wizard.” To express his identity he likes to dress up like a wizard when he walks around London. He melted his Oyster card (subway debit card), and attached the chip to his staff. As he walks into the subway, he touches his staff to the turnstiles, and magically, the doors swing open. Apparently the police were not amused, and won’t let him do this anymore. But it’s a reminder that technology is not a one-size fits all affair. People will use things in ways the developers never intended. Who knows what OX will be used for one day… open source and open standards are more embracing of this phenomenon than the metro police Article Resource:-http://thegluuserver.tumblr.com/post/68143784696/postcardfrom-identitynext-2013