Wednesday, December 12, 2007
LDAP support via sudo in UNIX
read more | digg story
Thursday, December 6, 2007
Solving the privacy puzzle in a federated identity model
read more | digg story
Monday, December 3, 2007
Logical Data Models for SOA Information Exchange
read more | digg story
SOA in the IdM
"SOA. Service-oriented architecture refers to a paradigm that focuses on how you maximize the sharing, reuse and interoperability of distributed corporate resources across your network. And to maximize sharing, reuse, etc., you need a universal middleware environment, an integration fabric, a set of standards. So that comes down to things like the Web services standards" and I would add LDAP and SQL to these standards, don't keep this idea only in the world of external users, internet, or even intranet - use these concepts at the data integration level inside your IT deployments, especially in the IdM services space....
Virtual Directories are such a middleware component that can accomplish this. SOA is here if you want it, or you can wait until the vendors catch up and start helping you understand how to use their products....
Security and Data Management
read more | digg story
Friday, November 30, 2007
Why use LDAP?
The question is a good one and I think as LDAP proliferates across more systems, many people will have the same question - and it deserves a good answer, so here is my two-cents-worth.
§ Cross-platform functionality and industry standards-based (important consideration for future growth and deployments)
§ Widely accepted standard for the Internet
§ Inexpensive since licensing is usually not based on number of connections or clients open source directories are widely available. Also, replication and synchronization features are usually built-in rather than requiring a separate license as is the case for many databases.
§ Replication and synchronization is easy compared to complex DBMS implementation with highly specific SQL script requirements.
§ ACI’s for delegated administration so you can setup accounts that are highly specific in what administration functions a group has {e.g. an account may only allow for phone numbers to be updated, another for new objects (name, email, phone number) to be inserted, but not deleted or existing objects modified}
§ High Performance, since directory data is store hieratical you have very high availability over DBMS, sometimes up to 10 times higher.
The following is a short list of common uses of directory services since these uses are data profiles that are fairly static and do not have deep relationships – they are stored as relatively “flat” trees.
§ Phone / Address book
§ Infrastructure Resource List (ip addresses, etc)
§ Public Certificates
§ User credentials, groups, roles (for authentication/ authorization)
Directories are also more secure and can keep credentials “locked” and unable to read or copy from an outside source, and you can do in a database. Directories are based on a hierarchal storage schema, a “tree” structure. Information that would be able bi-directionally in a database are not available in this manner in a directory. Items that are lower in the hierarchy could be read, but data higher in the hierarchy are not available to the client. So you could read a person’s contact information, but not necessarily be able to see what accounts he has, or other people in a group that she is a part of. In a database, records are stored relationally, so if you can read a person in a group, you can read the group and theoretically see the records of everyone in the group if you have direct access to the tables, not true in a directory. read more | digg storyWednesday, November 28, 2007
Tuesday, November 20, 2007
IT Infrastructure model
read more | digg story
Identity as Application Infrastructure: Evolution or Revolution?
read more | digg story
Friday, November 16, 2007
Single Sign-On beyond the firewall
read more | digg story
Single Sign-On beyond the firewall
read more | digg story
Wednesday, November 14, 2007
The Future of IdM
Take a serious look at how IdM is now what changes are coming, I think the analysis is 80% dead-on.
http://jacksonshaw.blogspot.com/2007/11/everything-you-know-about-identity.html
read more | digg story
Tuesday, November 6, 2007
Information Fabric and SOA
read more | digg story
Abstraction Layer (Data Virtualization) and SOA
It is a bit light in good technical explanation of the problems and might leave you feeling like, "so what now". The principles are good ones, it needs to be developed more... pass along your questions and I can focus on material that is the most relevant to you...
read more | digg story
Monday, November 5, 2007
The basics of identity management
If you implement a point solution for solving authentication, getting to any Federated environment will be very difficult. Design with the future in mind, make sure you implement the right solutions when you tackle Authentication.
read more | digg story
Friday, November 2, 2007
DIY software faults are expensive, says survey
read more | digg story
Ideas I got after reading an article about UNIX and distributed authentication
http://blogs.techrepublic.com.com/opensource/?p=127
I think the ideas here are more interesting than the implementation suggested. If you can cache the identifiers, why not do that across multiple LDAP stores, (even from multiple security domains, domain controllers, and AD forests) into a single directory. You couldn't disconnect your laptop, but you could achieve reduced or single sign-on, especially for external applications. The identification step (or search) of the LDAP store would be much faster, once you have the DN the credential check would be sent back to the corresponding LDAP store.
If I have confused you, just let me know... I will be happy to fill in more details of where my mind is going on this after reading this article today....
read more | digg story
Ideas
http://blogs.techrepublic.com.com/opensource/?p=127
I think the ideas here are more interesting than the implementation suggested. If you can cache the identifiers, why not do that across multiple LDAP stores, (even from multiple security domains, domain controllers, and AD forests) into a single directory. You couldn't disconnect your laptop, but you could achieve reduced or single sign-on, especially for external applications. The identification step (or search) of the LDAP store would be much faster, once you have the DN the credential check would be sent back to the corresponding LDAP store.
If I have confused you, just let me know... I will be happy to fill in more details of where my mind is going on this after reading this article today....
Monday, October 29, 2007
Using AD within Linuz for authentication
Does Active Directory top Linux authentication options?
http://searchenterpriselinux.techtarget.com/originalContent/0,289142,sid39_gci1279624,00.html
Integration issues between Linux and Active Directory discussed by Enk (Gartner) – metadirectories and other solutions – LDAP and Kerberos are discussed as a disadvantage because most organizations do not have people with LDAP expertise -
“cross-platform authentication market will probably remain in flux until at least 2009”
Thursday, October 25, 2007
Common Virtual Directory Scenarios
http://360tek.blogspot.com/2006_03_01_360tek_archive.html
"
- Protocol Translation
- Web Service Enablement
- Multi-Repository Search
- Joined Identity View
- Permission-Based Results
- Dynamic DIT
- Authentication
- Real-Time Data Access
Virtual Directory technologies eliminate boundaries. Hassles related to LDAP object types, attribute definitions and other schema-related issues are eliminated by virtualizing the view into the backend identity stores. You're no longer limited by the existing data format or database branding. There's no requirement to migrate the data from a relational database into an LDAP directory in order to make the data LDAP- or Web Service- accessible."
He talks about these issues quickly, but don't think they are not HUGE issues in deployment.
Metadata
http://www.addsimplicity.com/adding_simplicity_an_engi/2007/10/what-metadata.html
Metadata can be very useful in managing identities, knowing the context of users is critical for IDM initiatives (e.g. authorization) leveraging existing policy, groups, and roles means a more consistent enforcement of business logic and better security across your organization.
In this case metadata refers to how the system currently defines a user, I like to refer to this information as context. Why? because the metadata allows me to see the context in which the user operates - what the actor does inside the system.
Understanding your metadata means you can leverage it, as always "knowledge is power"...
read more | digg story
synchronization versus virtualization
read more | digg story