Download presentation
Presentation is loading. Please wait.
Published byFranziska Kalb Modified over 6 years ago
1
From Authentication to Privilege Management to the Attribute Economy: Marketing runs amok…
2
Topics The simple life The Simple Life GUI The full IdM life
The full IdM Life GUI The attribute economy Living in an attribute economy Make sure the trust fabrics support the assertions
3
A Simple Life Application access controls (including network devices)
Shib User IdP Source of Authority Source of Authority Source of Authority p2p
4
A Simple Life GUI Application access controls
(including network devices) Autograph Shib User Authn IdP Source of Authority Source of Authority Source of Authority p2p
5
A Full IdM Life Application access controls
(including network devices) Shib User IdP Local apps Source of Authority Source of Authority Source of Authority p2p
6
A Full Life GUI Application access controls
(including network devices) Autograph Shib User Authn IdP Local apps Signet/ Grouper Source of Authority Source of Authority Source of Authority p2p
7
Real Life Application access controls (including network devices) Shib
Source of Authority Application access controls (including network devices) Source of Authority Portal Gateway Shib Source of Authority Proxy Source of Authority IdP User Source of Authority Source of Authority Source of Authority Source of Authority p2p
8
An Example Flow in the Attribute Economy
Source of Authority Application access controls (including network devices) VO Service Center IdP Gateway Shib Source of Authority IdP User Source of Authority Source of Authority Source of Authority Source of Authority p2p
9
Application access controls (including network devices)
Portal Shib Autograph User Authn IdP S/G S/G Source of Authority p2p Source of Authority
10
A VO Service Center Flow
Application access controls (including network devices) Source of Authority Shib S/G Autograph User Authn IdP S/G S/G Source of Authority p2p Source of Authority
11
Inviting Attributes into your life…
For privacy and secrecy For better security For efficiency
12
Peering
13
Possible peering parameters
LOA Attribute mapping Economics Liability Privacy
14
VOs plumbed to federations
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.