Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything.

Slides:



Advertisements
Similar presentations
Open Grid Forum 19 January 31, 2007 Chapel Hill, NC Stephen Langella Ohio State University Grid Authentication and Authorization with.
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
TFTM TFTM Committee working call to discuss how to describe the “IDESG-Acknowledged Identity Ecosystem” in its interim or long term state October.
TFTM Interim Trust Mark/Listing Approach Paper Discussion Deck TFTM Committee IDESG Plenary Meeting January 14, IDESG TFTM Committee1.
This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department of Commerce, National Institute of Standards.
Kantara Initiative Identity Assurance Framework Overview and Value Proposition March 8, 2011.
OpenStand and Collaborative Communities For innovation, solutions and market growth Kantara Initiative 3 June 2014 Summit Karen McCabe Senior Director,
Framework Planning Draft 1 Jack Suess Ian Glazer Peter Alterman Andrew Hughes Michael Garcia.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Introduction to ICANN’s new gTLD program. A practical example: the Dot Deloitte case. Jan Corstens, Partner, Deloitte WIPO Moscow, 9 Dec 2011.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Functional Model Workstream 1: Functional Element Development.
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
Identity and Access Mgmt and electronic Identities Belgian Federal Government Walter Van Assche January 16 th, 2012 Chisinau.
NSTIC ID Ecosystem A Conceptual Model v03 Andrew Hughes October October IDESG Version 1.
Karen Sollins MIT Communications Futures Program October 24, 2013 Trust: trustmarks, concepts, frameworks.
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
TFTM Interim Trust Mark/Listing Approach Paper Accreditation, Certification, and Trust Mark Program Key Administrative and Operational Responsibilities.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
TFTM TFTM Committee working call to discuss how to describe the “IDESG-Acknowledged Identity Ecosystem” in its interim or long term state November.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
MDS Global IT Strategy Discussion July 7, Agenda  IntroductionErnest  Strategic directionsGanesh  DiscussionAll  Next stepsErnest.
Stuff, including interfederation stuff Dr Ken Klingenstein, Director, Middleware and Security, Internet2.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Jose Jimenez Telefónica I+D Future Network & Mobile Summit 2011 The vision of Future Internet in the FI PPP Core Platform project.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Align Business and Information Technology – with SOA Pradeep Nair Director – Software Group (IBM India/SA)
Justin Richer The MITRE Corporation October 8, 2014 Overview of OAuth 2.0 and Blue Button + REST.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
Kantara Initiative Privacy Framework Overview and Value Proposition 13 May 2011.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Connect communicate collaborate Trust & Identity EC meets GÉANT 19 June 2014 Brussels Valter Nordh, NORDUnet Federation as a Service Task Leader Trust.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
G-Cloud - The Delivery of a Shared Computing Platform for Government Ian Osborne Director, Digital Systems KTN Intellect.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Progress Report on the U.S. NSTIC Efforts Jack Suess – Delegate for Research, Development, Education & Innovation
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Enabling Secure Multi-Organization Collaboration Andrew Porter IT Director, Enterprise Architecture Merck & Co., Inc.
Department of Internal Affairs Disrupting Government Service Models Tim Occleshaw Government Chief Technology Officer Service and System Transformation.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Identity Management Overview
5 Strategies to Win Business and Stay Competitive
Kantara Workshop and European Plenary
An Overview of Kantara Initiative, Inc.
Higher Education’s Role in the Identity Ecosystem
InCommon Steward Program: Community Review
CIOs, IT, and Digital Transformation
Making Blockchain Real for Business
Chris Farmer Director of Fraud Strategy
Overview of Electronic Commerce
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
HIMSS National Conference New Orleans Convention Center
Introduction of ISO/IEC Identity Proofing
Corporate Program Update
Reiniger LLC.
Introduction of ISO/IEC Identity Proofing
The Intelligent Enterprise and SAP Business One
Presentation transcript:

Identity Relationship Management The Next Evolution of Identity and Access Management for the Internet of Everything

IRM Summit Kantara Workshop TimeTopicPresenter 12:00-12:15Welcome Allan Foster 12:15-13:00IRM Landscape, Trusted ID, ICAM, & FCCX Joni Brennan 13:00-13:30NSTIC / IDESG Ian Glazer 13:30-14:15UMA for Enterprise Eve Maler 14:15-14:45Break 14:45-15:15Experian agile IDProofing Kolin Whitley 15:15-15:45Radiant Logic IRM ADAP, Contextual Identity Michel Prompt 15:45-16:15Open-Stand & Collaborative Communities – as core to bizdev Karen McCabe 16:15-16:45Calls to action & Thanks Joni Brennan

IRM Summit IRM Landscape Kantara Initiative Overview Trusted ID FICAM & FCCX

IRM Summit IRM Landscape

The IRM Story

Evolution of Identity Employees Consumers Employees & Partners Things Perimeter Perimeter Federation Perimeter-less Federation Cloud / SaaS Perimeter-less Federation Cloud SaaS Mobility Attributes Context Stateless Relationships

Identity Relationship Management Model for managing a company’s interactions with current and future customers and “things” using Identity and Access Management (IAM). IRM rapidly and cost effectively unleashes new business opportunities that drive next generation consumer-facing services and top line revenue.

Pillars of Identity Relationship Management … CONSUMERS & THINGS over employees ADAPTABLE over predictable REVENUE over operating expense VELOCITY over process and tools INTERNET SCALE over enterprise scale DYNAMIC over static intelligence BORDERLESS over perimeter MODULAR over monolithic BUSINESS PILLARSTECHNICAL PILLARS = = = =

CONSUMERS & THINGS over employees only

INTERNET SCALE over enterprise scale

ADAPTABLE over predictable

DYNAMIC INTELLIGENCE over static intelligence

TOP LINE REVENUE over operating expense

BORDERLESS over perimeter

VELOCITY over process and tools

MODULAR over monolithic

The Next Generation of Identity & Access Management

What’s Next?

Tell us how you ‘do’ IRM! Join the

IRM Summit Kantara Initiative Overview

Who is Kantara 60+ Leading Organizations, 100’s of Participants, Industry and Governments: Trust Privacy Security Community Trustees At-Large: Government of Canada Trans-European Research Education Networking Association

What We Do The building blocks of Trusted Identity…

So that you can INFLUENCE CONNECT LEARN PARTNER SHARE GROW

What we provide RULES TOOLS EXPERTS

IRM Summit Trusted Identity

NSTIC – National Strategy for Trusted Identities in Cyberspace Trust is not the goal Identity is not the goal Trust and Identity are tools to enable business and public services growth Trustworthy Identities enable Trusted platforms where businesses connect and services grow.

Trusted Identity Kantara Programs verify IdPs and Assessors Policy, Technology, Privacy Reusable program applicable to FICAM, FCCX, NSTIC, EU eIDAS, IDAP, + IdPs, RPs, FOs Our part in the trust chain

IRM Summit For FICAM and FCCX

FICAM & FCCX FICAM – Federal Identity Credential and Access Management (Policy) Connects citizens to public services leveraging private sector Credential Service Providers Kantara Operates Certification Program – Trust Framework Provider FCCX – Federal Cloud Credential eXchange (Implementation) The technical identity hub that operates FICAM Kantara Operates Certification Program – Trust Framework Provider

Trust Framework Model Registration Verification Assessment Certification Trust Status Listing Service Interested Parties Kantara Trust Registry

Accredited and Approved Verizon Universal Identity Service (VUIS) IDPV Component Recognition Norton Credential Service Provider Registered Applicant MITREid (LoA 1) organizations in pipeline Kantara Accredited to LoA 1-4 Kantara Approved to LoA 1-3 non-crpyto

Component Services Responding to industry experts Kantara members developed the modular component service approach. Component Services: Identity Proofing / Verification Credential Issuance and Management Responding to industry experts Kantara members developed the modular component service approach. Component Services: Identity Proofing / Verification Credential Issuance and Management Identity Proofing & Verification Organizational Trust Credential & Token Management Credential Service Provider

MODULAR Assurance

CONTEXTUAL Assurance

ADAPTABLE Assurance

BORDERLESS Assurance

Questions? Kantara Executive Director: Joni Brennan General Inquiries: JOININNOVATETRUST

Shaping the Future of Digital kantarainitiative.org kantarainitiative.org/listinfo/community bit.ly/Kantara_Assurance kantarainitiative.org/membership/