We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byStephanie Stanley
Modified over 2 years ago
Multi-Protocol Identity Provider Architecture Considerations Uppili Srinivasan, Oracle
Token Payload Trust Fabric Identity Network Ideals – Heterogeneity & Co-existence Internet Commerce Partner Networks & Consortiums Social Networks & Blogs Point-to-point E-Business Relationship s User Mediated Dynamic Trust Circle of Trust Point-point E-Business Trust SAML X.509Kerberos Protocols SAML Federation WS-Trust / WS- Federation OpenID (Adapted from Kim Camerons ID meta-system Ideals) Identity Solutions Ideal Architecture: Multi-Protocol but integrated Trust model, token types and protocols decoupled Legacy / Current : Multi-protocol Identity silos Trust model, token types and protocols tightly coupled in each silo
Card Based Authentication in SAML SP SAML Card Enabled SAML IDP IDPSTS SSO / Card RP
Multi-Protocol Identity Environment Multi-protocol Identity Provider Card Enabled End-users Partner circle of trust OpenID Consuming ISPs Outsourced (Web) Services SAML WS-Trust / WS-Fed OpenID STSSAML Protocol Facades Card RP
Social Networks & Blogs Common Authentication & Trust Infrastructure Common Authentication and Trust F/W APIs Pseudonym & Privacy Handling Attributes / Claims Access Trust & Policy Mgmt Credential & Token Handling Authorizatio n Decision Services Attribute Authorities Internet Commerce Partner Networks & Consortiums Point-to-point E-Business Relationships Identity Provider and Single Sign-on Services Token / Trust & Federation Services SAMLOpenIDWS-Trust / WS-federation Integrated Multi-protocol Technology Infrastructure Interconnected Heterogeneous Identity Network Session Mgmt Card Enablement & Mgmt
Multi-Protocol IDP Scenarios & Benefits Session management & global sign-off Consistent enforcement Privacy policies Trust policies / authorizations Single point of administration Card provisioning & enablement Attribute services External (IDP) token / credential service Privacy policies Trust policies and authorization
GT 4 Security Goals & Plans Sam Meder
From Identity and Authentication point solutions to SOA and ESB – From Identity and Authentication point solutions to SOA and ESB –NZ Gov IdM Architectural.
Services and Identity Management Prof. Sasu Tarkoma.
A Federated Single Sign-On architecture with multi factor authentication A high level yet somewhat technical presentation.
© Siemens NV/SA, October 2004 Communications Network and Information Security Report ICTSB/NISSG Stefan Goeman.
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
Spotlight On Active Directory Interoperability Kim Saunders Director, Interoperability Programs Andreas Luther Group Program Management, Microsoft Identity.
Seven Perspectives on CardSpace Ronny Bjones Security Strategist Microsoft Corporation.
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty.
InfoCard and the Identity Metasystem Kim Cameron, Chief Architect of Identity Microsoft.
Active Directory Federation Services How does it really work? John Craddock
Grid Security Alvaro Arenas e-Science Centre, RAL, UK CoreGRID Summer School 2006.
Shibboleth and UKAMF-FEAR not as scary as it sounds! Rhys Smith Cardiff University.
PASSPrivacy, Security and Access Services Don Jorgenson Introduction to Security and Privacy Educational Session HL7 WG Meeting- Sept
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 Trend in User-Centric Identity Management Technology and its Standards Sangrae
Using VO based federation model for dynamic resource provisioning or VO devirtualised TF-EMC2 – 8-9 September 2005, Barcelona Yuri Demchenko Advanced Internet.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
The Basics of Federated Identity. Overview of Federated Identity and Grids Workshop Session 1 - for all Basics and GridShib Session 2 – more for developers.
MyProxy Jim Basney Senior Research Scientist NCSA
SEcurE access to GEOspatial services OGC-OGF Collaboration workshop Open Grid Forum 22 (OGF22) February, 2007 Chris Higgins (EDINA, University of Edinburgh)
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Single Sign-on Integration (SSI) Information Security Project [ Part 3/3 ] Information Security Project [ Part 3/3 ] For Professor Yan Chen; By Team Triad.
Managed virtual smart cardsUnmanaged virtual smart cards Inventory management PIN reset and unblock PIN change Policy enforcement Certificate.
© 2016 SlidePlayer.com Inc. All rights reserved.