Home · About · A-Z Index · Search · Contacts · Press · Register · LoginPlenary - Boundaryless Information Flow: Keeping IT SecureDay 3: Wednesday 5th February 2003 |
|
This presentation acted as a plenary introduction to the subsequent meeting on Identity Management. After a short video which brought together a variety of excerpts from previous conference presentations on the theme of messaging. One of the things driving identity management is the move to Web Services - a world where things are very loosely coupled. Up until now the Directory Services world has assumed a more stable relationship between the client and the directory. The world is no longer made up of users - it is made up of identities, where an identity is a representation of an entity, such as a user, an organization, computer, PDA, cell phone, an item of software. An identity is made up of a principle, the credentials needed to authenticate and verify the principal - which may be made up of many different things - a smart card, a fingerprint; the roles that the entity can occupy; and the attributes that describe the entity, which may vary according to various roles. He introduced 'Taylor's Law of Directories': the value of a directory is measured by the number of relationships it manages and the new applications that result. Given that the identities are many and varied, as already described, the real role of the directory is to manage the relationships between them. An identity in a Web Services world needs to be:
The move to Web Services is helping to accelerate the change in deployment scenarios:
New XML-based protocols are changing the market place for the better:
There are many challenges to making identity management work in the new Web services world. One key challenge is that Web services standards are still new, and technology evolution needs to continue to support Web Services protocols. Certification programs to certify deployment methodologies are still lacking - customers to not know whether or not they are conforming to a specification. The overriding principle is that simplicity is key to it all. QuestionsQ: Marty Schleiff, Boeing: It is possible to authenticate a person: how can an application be authenticated. A: We're starting to adopt UDI as a standard for applications and to build it on top of directories. I haven't seen anyone yet using a certificate for an application. |