Risk
6/29/2008
05:19 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Catalyst Conference 2008: The State Of Federated Identity Management

At last week's Catalyst conference in San Diego, I had a chance to sit down with identity management executives from IBM and CA to discuss the state of federated identity management. It appears while the federation of identities hasn't taken off as expected, there is still life in the technology.

At last week's Catalyst conference in San Diego, I had a chance to sit down with identity management executives from IBM and CA to discuss the state of federated identity management. It appears while the federation of identities hasn't taken off as expected, there is still life in the technology.In case you're not aware, in identity management lingo, "federation" is the sharing of identity information (application access rights, etc.) across departmental, administrative, and even organizational domains. Essentially, under federated identity management an organization makes it possible for the employees of suppliers, contractors, business partners, or any external business to manage the identities of their employees for access.

This makes perfect sense from a business perspective, and a handful of years ago I'd fully expected federated identity management deployments to be commonplace among large corporations. But it hasn't turned out that way. My colleague Charles Babcock dove into the challenges of GM and Boeing when it came to managing global identity management.

The assumption everyone took earlier this decade, when it came to federated identity management, was that the projects would be primarily driven by Web-based single sign-on initiatives. Turns out, that wasn't so, either.

At the Burton Group's Catalyst Conference last week, I first sat down to talk with CA's Bilhar Mann, who played an instrumental role in CA's acquisition of Netegrity in 2004. Netegrity was of the first Web SSO independent vendors, along with Oblix, which was acquired by Oracle, and its technology is the underpinning of CA SiteMinder Web Access Manager.

While there has been some external Web SSO federation projects, Mann explained, many customers want federation within their corporate domain, for things such as their SOA implementations and applications that reside on the intranet. As it turns out, Web SSO and federation aren't as tightly coupled as the industry once thought they would be.

With that goal in mind, CA has kick-started a beta program for an app it calls CA Federation Manager, which Mann said will help customers get into federated identity management with, or without, a Web access management system such as CA SiteMinder. According to Mann, CA Federation Manager will be standards-based and by enabling an organization to act as the identity provider -- the side of the federated partnership that provides user authentication and asserts the validity of the identity, or as a service provider -- the side of the partnership that provides the target applications or services.

I also met with Joe Anthony, program director identity and compliance management, and Venkat Raghavan, director, information storage and security market at IBM Tivoli Software.

Tivoli Federated Identity Manager (FIM) software just became available on June 20. FIM supports many new capabilities that should help bolster federated identity initiatives, whether focused in-house or across corporate domains. FIM supports security for SOAs and extends interoperability to open source and other identity management standards and frameworks. Perhaps most important, at least when it comes to helping spur demand for cross-domain federation, is the fact that FIM will work with non-IBM Web access management software. That means, it shouldn't require much in the way of additional work for a company using Tivoli Access Manager to federate identity management with a company running CA SiteMinder or Oracle's Web Access Manager.

Are these vendor moves enough to help spur federated Web SSO among companies? Only time will tell. I thought we'd already be there by now. But IDC is predicting some significant movement in the two years ahead. According to that research firm, global revenue for federated identity and access management software should more than double from last year's $340 million to $702 million by 2010.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.