Leveraging New Business Models with Identity Management An e-learning case study
|
|
|
- Richard Short
- 10 years ago
- Views:
Transcription
1 Leveraging New Business Models with Identity Management An e-learning case study José M. del Álamo DIT, Universidad Politécnica de Madrid, Ciudad Universitaria s/n, Madrid, Spain Abstract. New business models have arisen in different contexts such as the Internet and telecom networks which have been grouped under the umbrella of the buzzword 2.0. They propose opening up service platforms in order to increase profit by means of innovative collaboration agreements with third parties supported by identity management technologies. This paper introduces a research work, the PABIOS project, where these ideas have being applied in an e-learning context. It also describes how identity management technologies have been integrated into its architecture through a validation prototype. 1. Introduction Many e-companies have been working for a long time just with their own close set of customers and resources. It was one of their treasures and they were jealous to share them with other companies because they were afraid to lose some profit in aid of their competitors. Performing in such a way has lead to walled-garden business models. Their main drawback is that a huge engineering effort has to be spent both on development and also on marketing sides, in order to get a new service up and deployed to the market. On the other hand, new business models have arisen in different contexts such as the Internet and telecom networks, which have been grouped under the umbrella of the buzzword 2.0: Web 2.0 [1], Telco 2.0 [2], Mobile Web 2.0 [3], and so on. Their common approaches are: 1. The idea of a platform; i.e. there is not a hard boundary as in the walledgarden, but rather, a gravitational core around which the business is created. 2. Harnessing collective intelligence; i.e. turn your customers and providers into a global brain, which could be used to enhance your business.
2 2 José M. del Álamo 3. Data is one of the assets a company owns; notice that most of times this information is about the company customers. Regarding the first point, nowadays there is a trend in telecom and Internet domains towards partnership and the need to build technology platforms that enable for third party providers to collaborate. Relevant examples of this trend are British Telecommunications (BT) Project Web21C [4] and Amazon Web Services [5] platforms, which allow external developers and businesses to build their own applications with a set of Web Services interfaces. The most innovative case though, is the so called user-centric platform. It allows users (not necessarily technically skilled) to create their own contents and applications (mashups) from the combination of different sources. There are several initiatives of user-centric platforms both in telecom networks, such as the Open Platform for User-centric service Creation and Execution (OPUCE) [6], or in the Internet, such as Yahoo Pipes [7]. The previous paragraphs also point towards the second idea of the 2.0 approach: make profit from allowing your partners/users to innovate over your platform. Everyone can be a reseller now so, if you support with your platform the development and offering of innovative services, you will get some profit from the use of your own services, the use of your platform features from third party developers, and the ancillary services you could provide. Nonetheless, the combination of user-centric environments with social networks allows users to share their services within a community which will promote the most interesting ones at a minimum cost (viral marketing), thus eliminating the aforementioned main disadvantage of walled-garden business models i.e. development and marketing expenses. The obvious question now is, why should any third party use my platform and not anyone else's? The answer points to the third idea of the 2.0 approach: data is one of the assets a company owns. Companies had been collecting identity information about their customers which was kept on information silos just for their own use. However, now they can use this information to boost their platforms and take advantage of the benefits the 2.0 approaches provide, thus leveraging new and profitable business models. Moreover, in most cases they had even established a trust relationship with their customers, which could be also used as a powerful asset. On the other hand, in most countries there are laws which require companies to ensure security and privacy when revealing personal information about a customer, such as the Directive 2002/58/EC of the European Union [8]. Thus, we have arrived at a point where we could create open platforms that third parties would use to develop innovative and profitable services as far as customers' privacy and anonymity are protected. Identity management is the cornerstone to support these win-win scenarios because it provides the means to manage and selectively disclose user-related identity information within an institution or between several of them while preserving and enforcing privacy and security needs. This paper proposes an approach on the usage of Identity Management technologies in order to leverage the new business models represented within the 2.0 concepts. To validate the feasibility of the proposal an e-learning field has been
3 Leveraging New Business Models with Identity Management An e-learning case study 3 chosen. In this context, a prototype demonstrates how an e-learning platform supported by identity management allows third parties to offer their services and even to develop their own e-learning applications. The work is framed within a CELTIC European Research project: The P4P Application Based Open Source (PABIOS) project [9]. Next section introduces the e-learning context of the project showing the drawbacks of current e-learning systems and the advantages of the proposed approach. Then, the basics of Federated Identity Management technologies are introduced. Finally, the PABIOS project is described, showing the validation scenarios, and detailing the use of identity management technologies to support the aforementioned ideas. Section 5 concludes the paper with a brief summary and orientation of future work. 2. Application Field: e-learning Due to the interactivity and ubiquity of the Internet, learning is possible without space and time barriers. The competition between learning institutions is rapidly increasing and therefore they are under pressure to find new strategies and business models to produce and deliver cost-efficient educational products. Moreover, learners are also putting on pressure by demanding specialized and up-to-date contents and services that fit their curriculum requirements. In this scenario a strategic consideration for learning institutions should be whether to develop all the components of the e-learning business model solely with in-house resources or open their systems to collaboration agreements with third parties such as libraries, publishers, e-learning content providers, other educational institutions, etc. The advantages and drawbacks of both models have been described in the previous section. Nowadays there are already some initial approaches through collaboration between learning institutions but they are bound to the use of identity management to support single sign on scenarios. One example is the pan-european project called EduRoam (Educational Roaming) [10] which allows users visiting another institution to log on to it using the same credentials they would use if they were at their home institution. Another example is Eduserv Athens [11], the de facto standard for secure access management to web-based services for the UK education and health sectors. Although these scenarios are a first step in the collaboration process, they are quite limited: it is impossible for the students to use their identity information out of the boundaries of their home institution in order to get better and faster services. On the other hand, a 2.0-oriented e-learning platform would provide its own e- learning contents and base services, but also the means for third parties to provide theirs based on identity information. This platform will leverage new business models for educational institutions allowing them to provide their students with new materials and services cost effectively, securely and with guarantees for students' privacy and anonymity. In order to create such a platform a complete identity management solution must be applied. Next section describes its bases.
4 4 José M. del Álamo 3. Federated Identity Management Foundations Identity information is at the core of the relationship of a company with its customers, partners and other companies, and is a basis to support its business models. Extending the definition taken from [12], network identity refers to the collections of data about a subject that represent attributes, preferences, and traits in all his open accounts in a network. Identity management is understood as the discipline that deals with the access management of users to distributed network identity resources in its technical, legal and business aspects. At a technical level, the network management is related to network security, service providing, clients management, easy and transparent log in (single sign on SSO) and log out (single log out SLO), distributed identity resources linkage (identity federation) and Web Services providing. There are two main approaches for identity management: centralized and federated. The requirements of the approaches described in this paper set an environment where there are different entities collaborating e.g. the platform, partners, and other educational entities, each one within a different administrative domain and with its own set of subscribers. Thus a centralized model is not possible. There are various standards and frameworks that support Federated Identity Management, being the most important the Security Assertion Markup Language (SAML) [13], Liberty Alliance [14] and Shibboleth [15]. SAML is an XML standard from OASIS committee for exchanging authentication, authorization and identity information between security domains. Both Shibboleth and Liberty converge on SAML, but Shibboleth have been developed with the aim of provide support for Web SSO scenarios. The Liberty Alliance approach for federated identity management associates service providers to trusted domains called circles of trust, that are supported by an architecture and a set of protocols, and by operative agreements in which trust relationships are defined between providers (Fig 1). Within a circle of trust, subscribers can federate (link) isolated accounts that they own across different providers using a pseudonym. Some entities could be especially prepared to manage these federations, as well as providing other ancillary services: Identity Provider (IDP). It is a trusted entity which authenticates users, maintains their federations, and issues identifiers to other entities. An IDP may include an Authentication Service (AS) to authenticate service providers that are working on behalf of end users. A typical identity provider is a university which manages its own directory of accounts of its students. Service Provider (SP). A role performed by a system that provides services to end-users or other system entities. Within an identity management context, an SP can also provide or ask for users' identity information using Web services. In the former case it is called a Web Service Provider (WSP) and in the latter case it is called a Web Service Consumer (WSC). An SP could be both a WSP and a WSC. Examples of service providers are libraries, on-line book shops, independent e-learning content providers, etc.
5 Leveraging New Business Models with Identity Management An e-learning case study 5 Circle of Trust - Business Agreements, Service Level Agreements, Guidelines and policy Identity Provider SP1 SP2 SP3 - Trust Entity - Authentication Infrastructure - Maintain identity attributes Service Providers IDP - Gives final user services - No investment (necessary) in authentication infraestructures AS SP4 DS CoT Discovery Service - Knows user s resources location - Dispatch credentials and references for accessing resources - Associated to IDP Figure 1 Circle of trust concept Discovery Service (DS). It knows where the users' identity resources are stored within the circle of trust and how to access them; i.e. it knows all the WSP inside the circle of trust. 4. The PABIOS project PABIOS project is developing an e-learning oriented environment which allows the creation of social (People for People P4P) applications by means of the integration of collaborative peer to peer (P2P) services and a large number of other distributed services provided by third parties. PABIOS provides the P2P infrastructure and a platform with some basic e-learning services as well as the means to incorporate third party ones. The integration of the providers into the platform is supported by federated identity management technologies which provide privacy and security for both the end users and also the providers themselves. Fig. 2 shows an overview of PABIOS architecture which includes the following entities: PABIOS Learning Management System (LMS): It is the basis for the creation, management and delivery of e-learning services. A free, open source implementation of an LMS named Moodle [16] has been used to provide these features. PABIOS framework: The main task of the framework is being the interface between the P4P applications and the PABIOS LMS, and providing the infrastructure that allows the integration of third party providers. PABIOS P4P application: This prototype is used to demonstrate the PABIOS features. This client-side application is the main access point for
6 6 José M. del Álamo P4P application PABIOS framework User Service consume Web Services P2P communications Framework Infrastructure User P4P application Service consume Web Services PABIOS LMS Third Party Providers the users to the PABIOS LMS services, the P2P communication services, and the third party services. 4.1 Validation scenario Figure 2 PABIOS Architecture The basic scenario consists of a single domain corresponding with an e-learning institution, the PABIOS College, supported by the PABIOS platform. The PABIOS College is offering e-learning materials to thousand of their students through a P4P application. In the validation scenario students must make a transfer every time they join a new course and send by fax a copy of the payment invoice. This is an annoying process which waste much time. In order to facilitate it, PABIOS College agrees on collaborate with a payment provider which is willing to offer their services to their customers in exchange of a small fee. The PABIOS College will receive a percentage of that fee. This win-win business model is possible due to the fact that PABIOS system knows all the customers and offers an open identity-based platform for the third party to join. The main requirement of this platform is that no identity information must be reveal to any of the parties participating; thus when students federate the accounts they have both in the payment provider and in the College, a pseudonym is agreed to refer to them during each transaction. Web Services has been chosen as the middleware to support the communication between all the entities participating. We use Liberty entities to support the identity management requirements of the scenario. Figure 3 shows PABIOS architecture with the Liberty entities that participate in the scenario. In the implementation the P4P application performs as an SP because it provides services to students introducing them to the PABIOS College and to the e-learning services it offers. On the other hand, whenever students want to join a new course the P4P application needs to use their identity information to make the payment. Thus it
7 Leveraging New Business Models with Identity Management An e-learning case study 7 first authenticates against the AS in order to retrieve some information related to where the DS is and how to access it. In this case the P4P application is performing as a WSC. When the P4P application needs to know some identity information regarding a student, it would firstly query the DS in order to know the location of those identity resources and the credentials to access them, and then it would query the SP that stores such information; i.e. the payment service. Finally, the payment service performs as a WSP because it modifies identity information as requested by the P4P application, e.g. make a payment on the student account. 4. Conclusions Identity management is the cornerstone to support the new business models arisen from the Internet that open up service platforms to collaboration with third parties. It allows win-win scenarios where third parties can provide personalized services within a service platform offering and/or using users' identity information. The PABIOS project aims to create a complete platform to support this business models in an e-learning context. Its initial results have been summarized in this paper, especially those focused on the integration of an identity management infrastructure within the architecture. In order to validate the suitability of the PABIOS architecture we have developed a simple, but realistic and relevant, prototype. It consists of a simple educational institution which offers its e-learning services through a client-side application and that agrees on collaborate with a payment provider, thus facilitating the process that students must follow to join a new course using their identity information. Further work considers the validation of other scenarios such as collaboration with online shops, e.g. travel agencies or book shop, which will appreciate the use of identity information of students to improve their business processes. PABIOS framework P4P application (SP/WSC) 1. Where is the DS? Federation User 2. Where is the Payment Service? AS DS IDP Payment service (SP/WSP) 3. Use identity resource Framework Infrastructure PABIOS LMS Figure 3 Liberty entities within PABIOS architecture
8 8 José M. del Álamo Acknowledgements This work is framed within the CELTIC European research and development project PABIOS (P4P Application Based Open Source), EUREKA initiative, project ID CP We thank all our partners in the project for their valuable comments and proposals aiming at improving the ideas described in the paper. References 1. T. O'Reilly, What is Web 2.0: Design patterns and business models for the next generation of software, O'Reilly Media Inc. (September 30, 2005); 2. STL Partners Ltd., Telco 2.0 Manifesto: How to make money in an IP-based world. (May 16, 2007); 3. A. Jaokar and T. Fish, Mobile Web 2.0 (Futuretext, London, 2006). 4. Web21C SDK Developer Center (2007); 5. Amazon Web Services (2007); 6. OPUCE Website (2007); 7. Yahoo Pipes Website (2007); 8. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002, concerning the processing of personal data and the protection of privacy in the electronic communications sector, Official Journal, L 201, Jul. 2002, pp PABIOS Website (2007); Eduroam Website (2007); Eduserv Athens Website (2007); 12 P. Windley, Digital Identity (O'Reilly Media, USA, 2005). 13 S. Cantor et al, Assertions and protocols for the OASIS security assertion markup language (SAML), Standard v2.0 (OASIS, 2005). 14 Liberty Alliance Website (2007); 15 Shibboleth Project Website (2007); Moodle Website (2007);
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty Alliance ehealth SIG National Library of Medicine
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Enabling SAML for Dynamic Identity Federation Management
Enabling SAML for Dynamic Identity Federation Management Patricia Arias, Florina Almenárez, Andrés Marín and Daniel Díaz-Sánchez University Carlos III of Madrid http://pervasive.gast.it.uc3m.es/ WMNC 2009
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Provisioning and deprovisioning in an identity federation
Provisioning and deprovisioning in an identity federation Problem description and solution proposals 19.12.2008/[email protected] Contents 1. Description of the context... 2 2. Problem description...
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Logout in Single Sign-on Systems
Logout in Single Sign-on Systems Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura IFIP IDMAN, London, UK, 8-9.4.2013 Logout in Single Sign-on Systems Motivation Single sign-on (SSO) systems SSO
Federation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 [email protected]
Identity Management in Telcos. Jörg Heuer, Deutsche Telekom AG, Laboratories. Munich, April 2008
Identity Management in Telcos Jörg Heuer, Deutsche Telekom AG, Laboratories. Munich, April 2008 1 Agenda. Introduction User-centric Identity and Telcos Comprehensive Identity Models IDM Reference Architecture
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY ASR 2006/2007 Final Project Supervisers: Maryline Maknavicius-Laurent, Guy Bernard Federated Identity Project topic Superviser: Maryline Maknavicius
Software Design Document SAMLv2 IDP Proxying
Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities. With so
Trend of Federated Identity Management for Web Services
30 Trend of Federated Identity Management for Web Services Chulung Kim, Sangyong Han Abstract While Web service providers offer different approaches to implementing security, users of Web services demand
Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH
Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems Ginés Dólera Tormo Security Group NEC Laboratories Europe Email: [email protected]
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Shibboleth N-Tier Support. Chad La Joie [email protected]
Shibboleth N-Tier Support Chad La Joie [email protected] Agenda Use Case Terminology Shibboleth Solution Future Effort Resources 2 Use Case Current use case comes from University of Chicago University
Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
Managing Trust in e-health with Federated Identity Management
ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun
This way, Bluewin will be able to offer single sign-on for service providers within the circle.
Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe
APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine.
E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine. Yaroshenko Tetiana, yaroshenko[@]ukma.kiev.ua Introduction The Kyiv Mohyla Foundation of America and the National University of Kyiv Mohyla
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Architect Søren Peter Nielsen - [email protected]
The OIOSAML Toolkits Accelerating a common egov infrastructure using open source reference implementations OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Infrastructure
Securing The Cloud With Confidence. Opinion Piece
Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
Research and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
Federated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
Identity and Access Management for Federated Resource Sharing: Shibboleth Stories
Identity and Access Management for Federated Resource Sharing: Shibboleth Stories http://arch.doit.wisc.edu/keith/apan/ apanshib-060122-01.ppt Keith Hazelton ([email protected]) Sr. IT Architect,
Identity Management Systems A Comparison of Current Solutions
Identity Management Systems A Comparison of Current Solutions Annu Myllyniemi Helsinki University of Technology [email protected] Abstract Nowadays, there is a vast amount of work going on in the
Web Access Management and Single Sign-On
Web Access Management and Single Sign-On Ronnie Dale Huggins In the old days of computing, a user would sit down at his or her workstation, login to the desktop, login to their email system, perhaps pull
Software Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:
Toward campus portal with shibboleth middleware
Toward campus portal with shibboleth middleware Eisuke Ito and Masanori Nakakuni [email protected] u.ac.jp, Kyushu University nak@fukuoka u.ac.jp, Fukuoka University Outline 1. Background 2. Shibboleth 3.
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
An Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Merit Cloud Media User Guide
in collaboration with NJEDgeNet Table of Contents 1 Requirements... 3 1.1 Shibboleth... 3 1.2 Administration Hierarchy... 3 2 Administration Hierarchy... 3 3 Manage Videos... 4 3.1 Supported Video Formats...
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Standards and Guidelines for. Information Technology. Infrastructure, Architecture, and Ongoing Operations
Standards and Guidelines for Information Technology Infrastructure, Architecture, and Ongoing Operations This document describes applicable standards and guidelines for the university's policy on Information
A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR
A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth
Integration of Learning Management Systems with Social Networking Platforms
Integration of Learning Management Systems with Social Networking Platforms E-learning in a Facebook supported environment Jernej Rožac 1, Matevž Pogačnik 2, Andrej Kos 3 Faculty of Electrical engineering
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
