SlideShare a Scribd company logo
Copyright © 2015 ForgeRock, all rights reserved.
CONSENT 2.0
APPLYING USER-MANAGED ACCESS TO THE
PRIVACY CHALLENGE
July 21, 2015
Copyright © 2015 ForgeRock, all rights reserved.
Your Hosts
Markus Weber
@MWAtForgeRock
Eve Maler
@xmlgrrl
Copyright © 2015 ForgeRock, all rights reserved.
Recent Pew Survey:
91% of American adults say that
consumers have lost control
over how personal information
is collected and used by companies.
Source: http://www.pewresearch.org/key-data-points/privacy/
Copyright © 2015 ForgeRock, all rights reserved.
Recent Accenture Survey:
67% of individuals are willing to
share data with companies
- drops to 27% if the business is
sharing data with a third party
Copyright © 2015 ForgeRock, all rights reserved.
ForgeRock’s Identity Platform
and emerging standards
Copyright © 2015 ForgeRock, all rights reserved.
ForgeRock’s Identity Platform
and emerging standards
COMMONSERVICES
Copyright © 2015 ForgeRock, all rights reserved.
ForgeRock’s Identity Platform
and emerging standards
COMMONSERVICES
Copyright © 2015 ForgeRock, all rights reserved.
ForgeRock’s Identity Platform
and emerging standards
COMMONSERVICES
Copyright © 2015 ForgeRock, all rights reserved.
ForgeRock’s Identity Platform
and emerging standards
COMMONSERVICES
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
aspiration
risk mitigation
cynicism
Copyright © 2015 ForgeRock, all rights reserved.
From the web
to the IoT,
the “fear/greed”
tension around data
sharing is only going
to grow
Copyright © 2015 ForgeRock, all rights reserved.
“Post-compliance” consent tools only take us so far
OAuth: standard and scoped … but
opt-in at run time, Alice-only, and closed-system
“Share”: proactive and delegable … but
proprietary, closed-system, and often insecure
Copyright © 2015 ForgeRock, all rights reserved.
Customer Identity 2.0 needs Consent 2.0
Context The right moment to make the decision to share
Control The ability to share just the right amount
Choice The true ability to say no and to change one’s mind
Respect Regard for one’s wishes and preferences
Copyright © 2015 ForgeRock, all rights reserved.
The new
Venn of
access
control and
consent
Copyright © 2015 ForgeRock, all rights reserved.
Financial scenario
Alice wants to allow (consent
to or delegate to) her
accountant to import her tax
data directly from her
employer’s site into the tax
return application he uses,
with the ability to revoke that
consent.
Copyright © 2015 ForgeRock, all rights reserved.
Healthcare / IoT scenario
Alice can see in her central
dashboard what resources
she already has shared.
She shared, for example,
data from her implantable
cardiac defibrillator with her
doctor.
Copyright © 2015 ForgeRock, all rights reserved.
ForgeRock’s OpenUMA solution
will help you meet
the new privacy challenge
Copyright © 2015 ForgeRock, all rights reserved.
ForgeRock is
delivering two key
OpenUMA
components by
the end of 2015
authorization
server
resource server
(client)
UMA Provider
based on
UMA Protector
based on
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Copyright © 2015 ForgeRock, all rights reserved.
Additionally…
• User tab for fielding pending requests
• Resource labels for viewing and filtering
• Special “Alice-to-Alice sharing” experience
Copyright © 2015 ForgeRock, all rights reserved.
How UMA
works:
federated
authorization
on top of
OAuth
Loosely coupled to enable
centralized authorization-as-
a-service for any number of
an individual’s resource
servers
A new concept, to enable
party-to-party sharing driven
by policy (or access
approval) rather than
requiring the individual to be
present at access time
Authorization data is added to this token
if trust in the requesting party is
successfully elevated, typically through
authentication and/or claims-gathering
Copyright © 2015 ForgeRock, all rights reserved.
Where the action is at Kantara
http://tinyurl.com/umawg
Brand-new
UMA Developer Resources
Work Group
Copyright © 2015 ForgeRock, all rights reserved.
Where the action is at OpenID Foundation
HEART Profile for UMA
HEART Profile for OAuth 2.0
HEART Profile for OpenID Connect
(comes with its own SSO API)
HEART OAuth
Profile for FHIR
API
HEART UMA
Profile for FHIR
API
http://openid.net/wg/heart/
Copyright © 2015 ForgeRock, all rights reserved.
ForgeRock helps you deliver
Consent 2.0 experiences to your
customers that demonstrate context,
control, choice, and respect
Copyright © 2015 ForgeRock, all rights reserved.
RSA Conference Asia Pacific & Japan
22 - 24 July, 2015, Singapore
Gartner Catalyst Conference
10 - 13 August, 2015, San Diego, CA
Les Assises
30 September - 3 October, 2015, Monaco
Where in the World is ForgeRock?
Copyright © 2015 ForgeRock, all rights reserved.
Where to follow us:
https://twitter.com/ForgeRock
http://www.linkedin.com/company/forgerock
https://www.youtube.com/user/ForgeRock
https://vimeo.com/forgerock
http://forgerock.com/resources/
Copyright © 2015 ForgeRock, all rights reserved.
Try it & Participate!
https://forgerock.org/openuma/
Copyright © 2015 ForgeRock, all rights reserved.
THANKS! QUESTIONS?
Copyright © 2015 ForgeRock, all rights reserved.
The UMA
nitty gritty
Resource
owner
Resource
server
Authorization
server
Client
Authorization
API
UI
UI
UI
Requesting
party
Protection
API
Authorization
client
Protection
client
RS-specific
API
RS-specific
client
2
1
5
RPT
6
7
8
3
4
PAT
11
AAT
PAT
PAT
RPT
chooses resources to
protect – out of band
sets policies –
out of band
AAT
9
10
PAT
RS needs OAuth client credentials at AS to get PAT
C needs OAuth client credentials at AS to get AAT
All protection API calls must carry PAT
All authorization API calls must carry AAT
1. RS registers resource sets and scopes (ongoing
– CRUD API calls)
2. C requests resource (provisioned out of band;
must be unique to RO)
3. RS registers permission (resource set and
scope) for attempted access
4. AS returns permission ticket
5. RS returns error 403 with as_uri and
permission ticket
6. C requests authz data, providing permission
ticket
7. (After claims-gathering flows not shown) AS
gives RPT and authz data
8. C requests resource with RPT
9. RS introspects RPT at AS (default profile)
10. AS returns token status
11. RS returns 20x

More Related Content

What's hot

Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
ForgeRock
 
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: ForgeRock Identity Platform OverviewNYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
ForgeRock
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
ForgeRock
 
NYC Identity Summit Tech Day: Best Practices for API Security
NYC Identity Summit Tech Day: Best Practices for API SecurityNYC Identity Summit Tech Day: Best Practices for API Security
NYC Identity Summit Tech Day: Best Practices for API Security
ForgeRock
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
ForgeRock
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Eve Maler
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
ForgeRock
 
NYC Identity Summit Tech Day: Authorization for the Modern World
NYC Identity Summit Tech Day: Authorization for the Modern WorldNYC Identity Summit Tech Day: Authorization for the Modern World
NYC Identity Summit Tech Day: Authorization for the Modern World
ForgeRock
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
ForgeRock
 
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
ForgeRock
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ping Identity
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Ping Identity
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT Era
ForgeRock
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
ForgeRock
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Ping Identity
 
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseThe Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
ForgeRock
 
Build a Trust Platform to Enable a Frictionless Customer Experience
Build a Trust Platform to Enable a Frictionless Customer Experience Build a Trust Platform to Enable a Frictionless Customer Experience
Build a Trust Platform to Enable a Frictionless Customer Experience
ForgeRock
 
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
ForgeRock
 
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through ScriptingWebinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
ForgeRock
 

What's hot (20)

Webinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform AwakensWebinar: Identity Wars: The Unified Platform Awakens
Webinar: Identity Wars: The Unified Platform Awakens
 
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: ForgeRock Identity Platform OverviewNYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
NYC Identity Summit Tech Day: Best Practices for API Security
NYC Identity Summit Tech Day: Best Practices for API SecurityNYC Identity Summit Tech Day: Best Practices for API Security
NYC Identity Summit Tech Day: Best Practices for API Security
 
Beyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinarBeyond username and password it's continuous authorization webinar
Beyond username and password it's continuous authorization webinar
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
 
NYC Identity Summit Tech Day: Authorization for the Modern World
NYC Identity Summit Tech Day: Authorization for the Modern WorldNYC Identity Summit Tech Day: Authorization for the Modern World
NYC Identity Summit Tech Day: Authorization for the Modern World
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT Era
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 ReleaseThe Future is Now: The ForgeRock Identity Platform, Early 2017 Release
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
 
Build a Trust Platform to Enable a Frictionless Customer Experience
Build a Trust Platform to Enable a Frictionless Customer Experience Build a Trust Platform to Enable a Frictionless Customer Experience
Build a Trust Platform to Enable a Frictionless Customer Experience
 
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
 
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through ScriptingWebinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
 

Similar to Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in? Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in?
CA Technologies
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
ForgeRock
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API Management
CA Technologies
 
Making the space between people and devices disappear
Making the space between people and devices disappearMaking the space between people and devices disappear
Making the space between people and devices disappear
Cong Wei
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
MassTLC
 
Kalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn DevicesKalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn Devices
AllSeen Alliance
 
June 27 top_10_techtrends_dcearley_176465
June 27 top_10_techtrends_dcearley_176465June 27 top_10_techtrends_dcearley_176465
June 27 top_10_techtrends_dcearley_176465
Kirill Goncharuk
 
Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!
ForgeRock
 
Create a MV file sharing module using R/Link
Create a MV file sharing module using R/LinkCreate a MV file sharing module using R/Link
Create a MV file sharing module using R/Link
Rocket Software
 
Unlocking Value From the Internet of Things (IoT) with APIs
Unlocking Value From the Internet of Things (IoT) with APIsUnlocking Value From the Internet of Things (IoT) with APIs
Unlocking Value From the Internet of Things (IoT) with APIs
Apigee | Google Cloud
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
CA API Management
 
Can Containers be Secured in a PaaS?
Can Containers be Secured in a PaaS?Can Containers be Secured in a PaaS?
Can Containers be Secured in a PaaS?
Tom Kranz
 
Can Containers be secured in a PaaS?
Can Containers be secured in a PaaS?Can Containers be secured in a PaaS?
Can Containers be secured in a PaaS?
Tom Kranz
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
Leonard Lee
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
CA Technologies
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
CA API Management
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
CA Technologies
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA Technologies
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
ForgeRock
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
CA Technologies
 

Similar to Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge (20)

Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in? Knock, Knock…The Internet of Things wants to come in?
Knock, Knock…The Internet of Things wants to come in?
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API Management
 
Making the space between people and devices disappear
Making the space between people and devices disappearMaking the space between people and devices disappear
Making the space between people and devices disappear
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
Kalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn DevicesKalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn Devices
 
June 27 top_10_techtrends_dcearley_176465
June 27 top_10_techtrends_dcearley_176465June 27 top_10_techtrends_dcearley_176465
June 27 top_10_techtrends_dcearley_176465
 
Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!
 
Create a MV file sharing module using R/Link
Create a MV file sharing module using R/LinkCreate a MV file sharing module using R/Link
Create a MV file sharing module using R/Link
 
Unlocking Value From the Internet of Things (IoT) with APIs
Unlocking Value From the Internet of Things (IoT) with APIsUnlocking Value From the Internet of Things (IoT) with APIs
Unlocking Value From the Internet of Things (IoT) with APIs
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
 
Can Containers be Secured in a PaaS?
Can Containers be Secured in a PaaS?Can Containers be Secured in a PaaS?
Can Containers be Secured in a PaaS?
 
Can Containers be secured in a PaaS?
Can Containers be secured in a PaaS?Can Containers be secured in a PaaS?
Can Containers be secured in a PaaS?
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 

More from ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
ForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
ForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
ForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
ForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
ForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
ForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
ForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
ForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
ForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock
 

More from ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Recently uploaded

Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 

Recently uploaded (20)

Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 

Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge

  • 1. Copyright © 2015 ForgeRock, all rights reserved. CONSENT 2.0 APPLYING USER-MANAGED ACCESS TO THE PRIVACY CHALLENGE July 21, 2015
  • 2. Copyright © 2015 ForgeRock, all rights reserved. Your Hosts Markus Weber @MWAtForgeRock Eve Maler @xmlgrrl
  • 3. Copyright © 2015 ForgeRock, all rights reserved. Recent Pew Survey: 91% of American adults say that consumers have lost control over how personal information is collected and used by companies. Source: http://www.pewresearch.org/key-data-points/privacy/
  • 4. Copyright © 2015 ForgeRock, all rights reserved. Recent Accenture Survey: 67% of individuals are willing to share data with companies - drops to 27% if the business is sharing data with a third party
  • 5. Copyright © 2015 ForgeRock, all rights reserved. ForgeRock’s Identity Platform and emerging standards
  • 6. Copyright © 2015 ForgeRock, all rights reserved. ForgeRock’s Identity Platform and emerging standards COMMONSERVICES
  • 7. Copyright © 2015 ForgeRock, all rights reserved. ForgeRock’s Identity Platform and emerging standards COMMONSERVICES
  • 8. Copyright © 2015 ForgeRock, all rights reserved. ForgeRock’s Identity Platform and emerging standards COMMONSERVICES
  • 9. Copyright © 2015 ForgeRock, all rights reserved. ForgeRock’s Identity Platform and emerging standards COMMONSERVICES
  • 10. Copyright © 2015 ForgeRock, all rights reserved.
  • 11. Copyright © 2015 ForgeRock, all rights reserved. aspiration risk mitigation cynicism
  • 12. Copyright © 2015 ForgeRock, all rights reserved. From the web to the IoT, the “fear/greed” tension around data sharing is only going to grow
  • 13. Copyright © 2015 ForgeRock, all rights reserved. “Post-compliance” consent tools only take us so far OAuth: standard and scoped … but opt-in at run time, Alice-only, and closed-system “Share”: proactive and delegable … but proprietary, closed-system, and often insecure
  • 14. Copyright © 2015 ForgeRock, all rights reserved. Customer Identity 2.0 needs Consent 2.0 Context The right moment to make the decision to share Control The ability to share just the right amount Choice The true ability to say no and to change one’s mind Respect Regard for one’s wishes and preferences
  • 15. Copyright © 2015 ForgeRock, all rights reserved. The new Venn of access control and consent
  • 16. Copyright © 2015 ForgeRock, all rights reserved. Financial scenario Alice wants to allow (consent to or delegate to) her accountant to import her tax data directly from her employer’s site into the tax return application he uses, with the ability to revoke that consent.
  • 17. Copyright © 2015 ForgeRock, all rights reserved. Healthcare / IoT scenario Alice can see in her central dashboard what resources she already has shared. She shared, for example, data from her implantable cardiac defibrillator with her doctor.
  • 18. Copyright © 2015 ForgeRock, all rights reserved. ForgeRock’s OpenUMA solution will help you meet the new privacy challenge
  • 19. Copyright © 2015 ForgeRock, all rights reserved. ForgeRock is delivering two key OpenUMA components by the end of 2015 authorization server resource server (client) UMA Provider based on UMA Protector based on
  • 20. Copyright © 2015 ForgeRock, all rights reserved.
  • 21. Copyright © 2015 ForgeRock, all rights reserved.
  • 22. Copyright © 2015 ForgeRock, all rights reserved.
  • 23. Copyright © 2015 ForgeRock, all rights reserved.
  • 24. Copyright © 2015 ForgeRock, all rights reserved.
  • 25. Copyright © 2015 ForgeRock, all rights reserved.
  • 26. Copyright © 2015 ForgeRock, all rights reserved.
  • 27. Copyright © 2015 ForgeRock, all rights reserved.
  • 28. Copyright © 2015 ForgeRock, all rights reserved.
  • 29. Copyright © 2015 ForgeRock, all rights reserved.
  • 30. Copyright © 2015 ForgeRock, all rights reserved. Additionally… • User tab for fielding pending requests • Resource labels for viewing and filtering • Special “Alice-to-Alice sharing” experience
  • 31. Copyright © 2015 ForgeRock, all rights reserved. How UMA works: federated authorization on top of OAuth Loosely coupled to enable centralized authorization-as- a-service for any number of an individual’s resource servers A new concept, to enable party-to-party sharing driven by policy (or access approval) rather than requiring the individual to be present at access time Authorization data is added to this token if trust in the requesting party is successfully elevated, typically through authentication and/or claims-gathering
  • 32. Copyright © 2015 ForgeRock, all rights reserved. Where the action is at Kantara http://tinyurl.com/umawg Brand-new UMA Developer Resources Work Group
  • 33. Copyright © 2015 ForgeRock, all rights reserved. Where the action is at OpenID Foundation HEART Profile for UMA HEART Profile for OAuth 2.0 HEART Profile for OpenID Connect (comes with its own SSO API) HEART OAuth Profile for FHIR API HEART UMA Profile for FHIR API http://openid.net/wg/heart/
  • 34. Copyright © 2015 ForgeRock, all rights reserved. ForgeRock helps you deliver Consent 2.0 experiences to your customers that demonstrate context, control, choice, and respect
  • 35. Copyright © 2015 ForgeRock, all rights reserved. RSA Conference Asia Pacific & Japan 22 - 24 July, 2015, Singapore Gartner Catalyst Conference 10 - 13 August, 2015, San Diego, CA Les Assises 30 September - 3 October, 2015, Monaco Where in the World is ForgeRock?
  • 36. Copyright © 2015 ForgeRock, all rights reserved. Where to follow us: https://twitter.com/ForgeRock http://www.linkedin.com/company/forgerock https://www.youtube.com/user/ForgeRock https://vimeo.com/forgerock http://forgerock.com/resources/
  • 37. Copyright © 2015 ForgeRock, all rights reserved. Try it & Participate! https://forgerock.org/openuma/
  • 38. Copyright © 2015 ForgeRock, all rights reserved. THANKS! QUESTIONS?
  • 39. Copyright © 2015 ForgeRock, all rights reserved. The UMA nitty gritty Resource owner Resource server Authorization server Client Authorization API UI UI UI Requesting party Protection API Authorization client Protection client RS-specific API RS-specific client 2 1 5 RPT 6 7 8 3 4 PAT 11 AAT PAT PAT RPT chooses resources to protect – out of band sets policies – out of band AAT 9 10 PAT RS needs OAuth client credentials at AS to get PAT C needs OAuth client credentials at AS to get AAT All protection API calls must carry PAT All authorization API calls must carry AAT 1. RS registers resource sets and scopes (ongoing – CRUD API calls) 2. C requests resource (provisioned out of band; must be unique to RO) 3. RS registers permission (resource set and scope) for attempted access 4. AS returns permission ticket 5. RS returns error 403 with as_uri and permission ticket 6. C requests authz data, providing permission ticket 7. (After claims-gathering flows not shown) AS gives RPT and authz data 8. C requests resource with RPT 9. RS introspects RPT at AS (default profile) 10. AS returns token status 11. RS returns 20x

Editor's Notes

  1. Abstract: Existing notice-and-consent paradigms of privacy have begun to fail dramatically — and people have begun to notice. Now that Edward Snowden has burst our privacy bubble and IoT devices are recording our every move, it’s time for companies to break out of the privacy-as-compliance rut. The User-Managed Access (UMA) standard and ForgeRock’s OpenUMA project are stepping into the breach. OpenUMA gives companies a new tool for delivering to individuals a convenient central hub for proactively authorizing who and what can get access to their personal data and content.
  2. x:02-x:03 MW: Logistics, intro (EM: Mention PbD Ambassadorship)
  3. x:04-x:08 MW talks about new product/solution: OpenUMA - we’re open standards-friendly! We have these elements in our stack, and we provide support for all of the traditional and emerging standards. The emerging standards JWT, OAuth, and OIDC have a special relationship with AM and IG. We are certified conforming with OIDC. Eve, tell us more about the latest news. EM: UMA from Kantara is the latest emerging standard. I’m founder and chair. It builds on these others. We are building support for it in a new solution called OpenUMA.
  4. x:04-x:08 MW talks about new product/solution: OpenUMA - we’re open standards-friendly! We have these elements in our stack, and we provide support for all of the traditional and emerging standards. The emerging standards JWT, OAuth, and OIDC have a special relationship with AM and IG. We are certified conforming with OIDC. Eve, tell us more about the latest news. EM: UMA from Kantara is the latest emerging standard. I’m founder and chair. It builds on these others. We are building support for it in a new solution called OpenUMA.
  5. x:04-x:08 MW talks about new product/solution: OpenUMA - we’re open standards-friendly! We have these elements in our stack, and we provide support for all of the traditional and emerging standards. The emerging standards JWT, OAuth, and OIDC have a special relationship with AM and IG. We are certified conforming with OIDC. Eve, tell us more about the latest news. EM: UMA from Kantara is the latest emerging standard. I’m founder and chair. It builds on these others. We are building support for it in a new solution called OpenUMA.
  6. x:04-x:08 MW talks about new product/solution: OpenUMA - we’re open standards-friendly! We have these elements in our stack, and we provide support for all of the traditional and emerging standards. The emerging standards JWT, OAuth, and OIDC have a special relationship with AM and IG. We are certified conforming with OIDC. Eve, tell us more about the latest news. EM: UMA from Kantara is the latest emerging standard. I’m founder and chair. It builds on these others. We are building support for it in a new solution called OpenUMA.
  7. x:04-x:08 MW talks about new product/solution: OpenUMA - we’re open standards-friendly! We have these elements in our stack, and we provide support for all of the traditional and emerging standards. The emerging standards JWT, OAuth, and OIDC have a special relationship with AM and IG. We are certified conforming with OIDC. Eve, tell us more about the latest news. EM: UMA from Kantara is the latest emerging standard. I’m founder and chair. It builds on these others. We are building support for it in a new solution called OpenUMA.
  8. What is UMA all about? individual authorization sharing access control security privacy consent permission policy preferences context control choice respect delegation enterprise entitlements Let’s take a step back and talk about why all this is important to you and your customers…
  9. x:09-x:15 EM: talks about the new privacy challenge and why Consent 2.0 and the new UMA standard are required (mention PbD) Aspiration: Fair Information Practice Principles (FIPPs) of Privacy, and Privacy by Design (PbD), speak of transparency, control, and consent goals, but… Risk mitigation: (warding off evil spirits) The top driver for corporate privacy funding is meeting compliance obligations; >50% of corporate and government privacy groups report into Legal or Compliance, and… Cynicism…ready for a change: 91% of Americans agree or strongly agree consumers have lost control over PII collection and use; 80% who use social networking sites are concerned about third-party access Image sources: https://www.flickr.com/photos/russellstreet/4560146800/ | CC BY-SA 2.0 https://www.flickr.com/photos/surveying/11697771545/ | CC BY 2.0 https://www.flickr.com/photos/mikecogh/8284096640/ | CC BY-SA 2.0
  10. It’s not just about websites and web and mobile apps scraping personal information. Especially when it comes to the Internet of things, It’s also about the sheer number of data sources, the inability to limit collection, and the inability to manage consenting to collection one by one. You can’t keep clicking “I agree” every time your smart socks want to record a heel strike. People will have to get ahead of the curve – and they might actually want to share that data, but only with personal trainers, doctors, and third-party marathon training apps. But then we have the problem of interoperability. The smarthomedb.com site currently lists reviews of OVER A HUNDRED different companies serving the consumer IoT market already, in 36 product categories.
  11. Privacy is not, and has never been, about secrecy. If you want service in the offline or online world, you need to share personal data to some degree. Privacy in a meaningful sense is about context, control, choice, and respect. This is the mantra of the people who have been working on the User-Managed Access standard – the UMAnitarians! What are we talking about when we say Consent 2.0 solutions? Two main concepts: Think “Share button”, and think “convenient dashboard for managing sharing settings”.
  12. x:16-x:25 MW/EM interview-style walkthrough of the demo UX (screenshots or demo, TBD) Chained delegation features Pending requests History page Resource and scope registration Admin console config flags Other UMA stuff that’s sexy Show recorded video (can be downloaded from here: https://drive.google.com/open?id=0B5Q4evmm_OOCN050RWtGSFhnV3c&authuser=0 )
  13. x:36-x:40 MW Let’s share the latest news: Product/solution breakdown forgerock.org/openuma Check out nightly builds New Kantara group and call to action for both Kantara groups [also HEART?] Follow us on Twitter New Kantara group, call to action: join both groups, join forgerock.org/openuma community, check out nightlies, follow us on Twitter… (5min) The UMA architecture has these three pieces. ForgeRock will deliver the two key pieces on the top in order to help you protect your API/application (policy enforcement points) and let your users set up sharing preferences (policy decision point).
  14. UMA provider along with OAuth provider.png
  15. UMA provider attributes.png
  16. Shares dropdown.png
  17. Resources page with resources to share.png
  18. Share the resource popup.png
  19. Share the resource popup filled out.png
  20. Requesters page.png
  21. History tab.png
  22. Revoke all access.png
  23. Shared With Me tab.png
  24. x:26 MW/EM What did we just see? Can you just go through how UMA works a little more slowly? (10min)
  25. x:41 Q&A Seed questions: EU Data Protection revisions: relevant to UMA?…
  26. [Don’t use slide if we don’t show the live demo; revise callouts if we show a different demo]