2,260 bytes added,
09:09, 25 September 2007 Some thoughts on identity from Phil Becker. [http://www.datangshutong.com/bjcygdst.htm 北京朝阳管道疏通]Identity transforms security from “keep out unauthorized” to “allow access by authorized.” Digital identity is the organizing c[http://www.datangshutong.com/bjcygdst.htm 北京朝阳管道疏通]onstruct for a distributed, service oriented computing that allows it to dynamically adjust to the needs of each user while simultaneously following the policies of various authorities who control and manage the data and applications being used, ad enabling [http://www.datangshutong.com/bjcygdst.htm 北京朝阳管道疏通]visibility into what occurs.
Identity today:
Identity deployments now succeed far more often than [http://www.datangshutong.com/bjcygdst.htm 北京朝阳管道疏通]they fail
Identity virtualization and federation are prover technologies with growing deployment base
Authentication has evolved significantly in response to use experience requirements.
Regaining lost visibility for compliance is a[http://www.datangshutong.com/bjcygdst.htm 北京朝阳管道疏通] continuing driver as is compliance automation.
Self service delegation has become a big driver.
The coming third wave: t[http://www.datangshutong.com/bjcygdst.htm 北京朝阳管道疏通]ruly networked management by identity. The drivers:
The nature of networking drives promiscuous inconnectivity and use empowerment (self-service)
Scale revealing the need to modularize solutions and have interoperability standards
The nee to interconnect (a[http://www.datangshutong.com/bjcygdst.htm 北京朝阳管道疏通]nd network identity systems becomes undeniable.
Identity’s natural state is decentralized, since it has its origins in many disparate places. The concept that we can centralize identity data on a large scal[http://www.datangshutong.com/bjcygdst.htm 北京朝阳管道疏通]e has been tried and found wanting. The task is to manage and leverage identity while respecting it’s decentralized nature.
The future:
Greatly increased networking between identity management domains
The emergence of compelling identity based user experience driven applications
Posted on 10:08 AM | Comments (0) | Recommend | Print