We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBridget Elsworth
Modified over 2 years ago
Møte ”Identitets baserte tjenester”
SSO Authn Authz Identity Role Policy IdM Role Mgmt Service Info resource Trust Policy mgmt + enforcement Compliance -EU -Datatilsynet Simplified SO (gjenta po) Security classific -id/role - resource -serv Standards Technology Federation Logging Audit/ Assurance id propgation
Endre lønn Endre lønn Info classification enforcement PEPPEP
1. ”Segregation of duties”
2. Autentisering/Autorisering DB1 PEPPEP id DB2
3. SOA Sikkerhet Governance SSO - Design time - Run time - Deploy time
Open Questions How to Authorise client ? (Which technology/identifier) How to use this in design ? (How to ensure compliance ?)
Design principles Sep of policy, class and service/resource Policy, decision, enforcement, admin
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
© 2006 Open Grid Forum Security Area OGF19 Standard All Hands.
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
PASSPrivacy, Security and Access Services Don Jorgenson Introduction to Security and Privacy Educational Session HL7 WG Meeting- Sept
OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Presented to: By: Date: Federal Aviation Administration Registry/Repository in a SOA Environment SOA Brown Bag #5 SWIM Team March 9, 2011.
PKI and LOA Establishing a Basis for Trust David L. Wasley PKI Deployment Forum April 2008.
From Identity and Authentication point solutions to SOA and ESB – From Identity and Authentication point solutions to SOA and ESB –NZ Gov IdM Architectural.
Combining the strengths of UMIST and The Victoria University of Manchester Adapting to Federated Identity SHEBANGS Shibboleth Enabled Bridge to Access.
21 st June Agenda 09:15Arrival – Breakfast served 09:30Workshop Group Questions 10.30Networking Control Framework Control Framework Breakfast Group.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
ABFAB for Internet-of-Things Rhys Smith, Janet Sam Hartman & Margaret Wasserman, Painless Security.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1.
Organizational Governance Embracing Internal Audits Role.
1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
Single Sign-on Integration (SSI) Information Security Project [ Part 3/3 ] Information Security Project [ Part 3/3 ] For Professor Yan Chen; By Team Triad.
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty.
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
ENGINEERING AUTHORITY AND TRUST IN CYBERSPACE: A ROLE-BASED APPROACH Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
BYOD Security Maintaining a Secure Infrastructure Friday 15 th March 2013.
Open Grid Forum 19 January 31, 2007 Chapel Hill, NC Stephen Langella Ohio State University Grid Authentication and Authorization with.
0 McLean, VA August 8, 2006 SOA, Semantics and Security.
European Middleware Initiative (EMI) 101. State-Of-The-Art in Grids Today High Performance Computing (HPC) InfrastructuresHigh Throughput Computing (HTC)
© 2016 SlidePlayer.com Inc. All rights reserved.