Risk
6/29/2008
05:19 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Catalyst Conference 2008: The State Of Federated Identity Management

At last week's Catalyst conference in San Diego, I had a chance to sit down with identity management executives from IBM and CA to discuss the state of federated identity management. It appears while the federation of identities hasn't taken off as expected, there is still life in the technology.

At last week's Catalyst conference in San Diego, I had a chance to sit down with identity management executives from IBM and CA to discuss the state of federated identity management. It appears while the federation of identities hasn't taken off as expected, there is still life in the technology.In case you're not aware, in identity management lingo, "federation" is the sharing of identity information (application access rights, etc.) across departmental, administrative, and even organizational domains. Essentially, under federated identity management an organization makes it possible for the employees of suppliers, contractors, business partners, or any external business to manage the identities of their employees for access.

This makes perfect sense from a business perspective, and a handful of years ago I'd fully expected federated identity management deployments to be commonplace among large corporations. But it hasn't turned out that way. My colleague Charles Babcock dove into the challenges of GM and Boeing when it came to managing global identity management.

The assumption everyone took earlier this decade, when it came to federated identity management, was that the projects would be primarily driven by Web-based single sign-on initiatives. Turns out, that wasn't so, either.

At the Burton Group's Catalyst Conference last week, I first sat down to talk with CA's Bilhar Mann, who played an instrumental role in CA's acquisition of Netegrity in 2004. Netegrity was of the first Web SSO independent vendors, along with Oblix, which was acquired by Oracle, and its technology is the underpinning of CA SiteMinder Web Access Manager.

While there has been some external Web SSO federation projects, Mann explained, many customers want federation within their corporate domain, for things such as their SOA implementations and applications that reside on the intranet. As it turns out, Web SSO and federation aren't as tightly coupled as the industry once thought they would be.

With that goal in mind, CA has kick-started a beta program for an app it calls CA Federation Manager, which Mann said will help customers get into federated identity management with, or without, a Web access management system such as CA SiteMinder. According to Mann, CA Federation Manager will be standards-based and by enabling an organization to act as the identity provider -- the side of the federated partnership that provides user authentication and asserts the validity of the identity, or as a service provider -- the side of the partnership that provides the target applications or services.

I also met with Joe Anthony, program director identity and compliance management, and Venkat Raghavan, director, information storage and security market at IBM Tivoli Software.

Tivoli Federated Identity Manager (FIM) software just became available on June 20. FIM supports many new capabilities that should help bolster federated identity initiatives, whether focused in-house or across corporate domains. FIM supports security for SOAs and extends interoperability to open source and other identity management standards and frameworks. Perhaps most important, at least when it comes to helping spur demand for cross-domain federation, is the fact that FIM will work with non-IBM Web access management software. That means, it shouldn't require much in the way of additional work for a company using Tivoli Access Manager to federate identity management with a company running CA SiteMinder or Oracle's Web Access Manager.

Are these vendor moves enough to help spur federated Web SSO among companies? Only time will tell. I thought we'd already be there by now. But IDC is predicting some significant movement in the two years ahead. According to that research firm, global revenue for federated identity and access management software should more than double from last year's $340 million to $702 million by 2010.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4793
Published: 2014-12-27
The update function in umbraco.webservices/templates/templateService.cs in the TemplateService component in Umbraco CMS before 6.0.4 does not require authentication, which allows remote attackers to execute arbitrary ASP.NET code via a crafted SOAP request.

CVE-2013-5958
Published: 2014-12-27
The Security component in Symfony 2.0.x before 2.0.25, 2.1.x before 2.1.13, 2.2.x before 2.2.9, and 2.3.x before 2.3.6 allows remote attackers to cause a denial of service (CPU consumption) via a long password that triggers an expensive hash computation, as demonstrated by a PBKDF2 computation, a si...

CVE-2013-6041
Published: 2014-12-27
index.php in Softaculous Webuzo before 2.1.4 allows remote attackers to execute arbitrary commands via shell metacharacters in a SOFTCookies sid cookie within a login action.

CVE-2013-6043
Published: 2014-12-27
The login function in Softaculous Webuzo before 2.1.4 provides different error messages for invalid authentication attempts depending on whether the user account exists, which allows remote attackers to enumerate usernames via a series of requests.

CVE-2013-6227
Published: 2014-12-27
Unrestricted file upload vulnerability in plugins/editor.zoho/agent/save_zoho.php in the Zoho plugin in Pydio (formerly AjaXplorer) before 5.0.4 allows remote attackers to execute arbitrary code by uploading an executable file, and then accessing this file at a location specified by the format param...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.