Anil John: Purity and Pragmatism in Standards Profile Compliance Profiles of standards allow for interoperability and standards-based implementation across disparate systems. As such, they are critical from an enterprise perspective to ensure that investments and choices made regarding technical infrastructure are not vendor specific, and the conformance to a profile can be independently verified to ensure interoperability. I've written about this before, but in this blog post, wanted to focus a bit more on the choices available to relying parties when it comes to conforming to identity federation protocol profiles.
Sandy Carielli: The Password Reset Conundrum Many of us have received an e-mail, either from a web portal we frequent, or from the IT department at our place of employment, telling us that we need to reset our password due to a security breach. The next question that comes to mind is how effective is that password change? And how might that effectiveness change when that password change is required from a large number of users on a single system?
Mark Dixon: Cloud Computing: Top Ten Lists Ironically, within minutes this evening, I followed two cloud computing links - BC Comics' definition and a more serious, post, Top 10 List for Success in the Cloud, by Octave Orgeron. With all due respect to Octave, I propose a Top 10 List for successful cloud computing, using Wiley's definition (following the comic strip). <bc.gif http://www.gocomics.com/bc/2013/06/11>
Peter Cummings: Is the cloud really a "honeypot" for PRISM? Revelations in the last week around PRISM have shocked many and it is forcing many of us to re-evaluate our position towards providers of cloud services. What I find shocking is the possible extent of the monitoring and the way it has been done. To me at least, an important question has to be asked in the wake of these revelations: Is the cloud as we know it really a honeypot for PRISM?.
Paul Madsen Elvis-like, the data has left the building Enterprises want to ensure business data is accessed only by those who have a valid right to do so, i.e. those that require access in order to do their jobs. When the business data is only ever stored on a server, behind a web page or an API, restricting such access is relatively easy. When the identity store (where the roles are kept) is remote from the business data (as is the case when the data is held by some SaaS), the mechanisms (and standardized protocols) might differ, but the logic remains the same.
Binary Blogger: Social Media Explained - A Humorous Take I stumbled across a mini-viral photo, demotivator, email rounds type of image. I got a good chuckle out of it and thought I would give it a proper write up. I have no idea where it originated so I cannot give credit to where it's due, if I find out I will update it accordingly.
Identity Woman: Interesting events in 2013 This is a calendar of events that I know in 2013 (and beyond). I think they're interesting, I'm currently planning on attending all the events in BLACK, I'm helping co-organize all the events with RED headlines. Some events will change from interesting to attending as they approach.
IDESG: July 2013 Plenary Meeting What: 5th IDESG Plenary Meeting When: July 24-26, 2013 Where: Massachusetts Institute of Technology (MIT) Media Labs - 75 Amherst St Cambridge, MA 02139
Call For Papers - Open Identity Summit 2013 September 10th - 11th 2013, Kloster Banz, Germany Focus areas will be Research and Applications in the area of Identity Management and Open Source with a special focus on Cloud Computing.
eID & ePass 5th edition National eID & ePassport Conference - the Global Forum on the drivers behind the digitalization of citizen ID documents proudly announce the 5th edition in BERLIN 2013, 28th & 29th of October @Intercontinental Berlin.
InCommon Advance CAMP: Identity Services Summit November 12-13, 2013 San Jose, Calif. Part of the 2013 Identity Week (www.incommon.org/idweek) Join leading identity architects and developers from U.S. research and higher education and international and commercial identerati at Advance CAMP.
InCommon: CAMP Cloud: Identity and Access in an Era of Outsourced Services November 14-15, 2013 - San Jose, Calif. Part of the 2013 Identity Week (www.incommon.org/idweek) Are your campus stakeholders looking at cloud-based solutions? Are you experiencing challenges or do you have concerns with outsourcing email, storage, or other essential services? Are you concerned about the management and maintenance of an accurate, accountable identity inventory? Come to "CAMP Cloud: Identity and Access in an Era of Outsourced Services" and learn about solutions being discussed and implemented across higher education.