Some thoughts on identity from Phil Becker. 北京朝阳管道疏通Identity transforms security from “keep out unauthorized” to “allow access by authorized.” Digital identity is the organizing c北京朝阳管道疏通onstruct for a distributed, service oriented computing that allows it to dynamically adjust to the needs of each user while simultaneously following the policies of various authorities who control and manage the data and applications being used, ad enabling 北京朝阳管道疏通visibility into what occurs.
Identity today:
Identity deployments now succeed far more often than 北京朝阳管道疏通they fail Identity virtualization and federation are prover technologies with growing deployment base Authentication has evolved significantly in response to use experience requirements. Regaining lost visibility for compliance is a北京朝阳管道疏通 continuing driver as is compliance automation. Self service delegation has become a big driver. The coming third wave: t北京朝阳管道疏通ruly networked management by identity. The drivers:
The nature of networking drives promiscuous inconnectivity and use empowerment (self-service) Scale revealing the need to modularize solutions and have interoperability standards The nee to interconnect (a北京朝阳管道疏通nd network identity systems becomes undeniable. Identity’s natural state is decentralized, since it has its origins in many disparate places. The concept that we can centralize identity data on a large scal北京朝阳管道疏通e has been tried and found wanting. The task is to manage and leverage identity while respecting it’s decentralized nature.
The future:
Greatly increased networking between identity management domains The emergence of compelling identity based user experience driven applications Posted on 10:08 AM | Comments (0) | Recommend | Print