headerimage The Open Group home page
You are here:  Home > Events > Enterprise Architecture Practitioners Conference Austin
  Stuart Boardman - Director of Consulting, CGI  

Stuart Boardman20 years in IT. 11 years with CGI (formerly AMS) in a variety of roles encompassing technical and functional architecture, project management, offering development and pre-sales. I was a founding member of the AMS Technical Architect community and am active in the CGI Technology and Practice Focus Networks.Functionally my expertise is in telecommunications - mostly mobile.
cgi
I have workeed on projects for many different European telcos in pretty much all areas of OSS and BSS. Over the last few years I've been very active around SOA within CGI, various clients and in the Open Group.

Before IT, I tried very hard to make a living playing music but never quite made it. I still play in my spare time (CDs available on request). I have a son aged 15 who plays in a metal band.

   
 

Presentation
Identity and Access Management in SOA
SOA raises new challenges for Identity and Access Management (IAM) but equally IAM represents a challenge, which has yet to be properly addressed in SOA. Every aspect of the agile enterprise must be agile: the organization, its processes and policies and the IT services and infrastructure that support that. Ironically the existence of security standards for Web Services makes it far too easy to design a superficially service oriented IAM solution, which is actually anything but service oriented.

Access policy management and operation is of course only one aspect of service deployment. There is a genuine risk that the management of deployment features of a service will become distributed across a number of solution spaces, giving rise to even more complex governance issues. We therefore need to find solutions that minimize or mitigate the risk.

SOA also opens up the world of the extended (and virtual) enterprise. Enterprise services may be shared with, operated by or delegated (outsourced) to partners and suppliers. From the IAM perspective this is a specific challenge, in which services may be deployed in radically different security domains and where identity federation is merely one aspect of the puzzle.

In this presentation we will look at various design options, present a general approach and show how it can be applied with various types of vendor solutions and standards in the context of a complete enterprise vision

return to program

 

   
   |   Legal Notices & Terms of Use   |   Privacy Statement   |   Top of Page   Return to Top of Page