Download presentation
Presentation is loading. Please wait.
Published byBen Bratton Modified over 10 years ago
1
From Authentication to Privilege Management to the Attribute Economy: Marketing runs amok…
2
Topics The simple life The Simple Life GUI The full IdM life The full IdM Life GUI The attribute economy Living in an attribute economy Make sure the trust fabrics support the assertions
3
User Application access controls (including network devices) IdP Shib p2p Source of Authority Source of Authority Source of Authority A Simple Life
4
User Application access controls (including network devices) IdP Shib p2p Source of Authority Source of Authority Source of Authority Authn Autograph A Simple Life GUI
5
User Application access controls (including network devices) IdP Shib p2p Source of Authority Source of Authority Source of Authority A Full IdM Life Local apps
6
User Application access controls (including network devices) Shib p2p Source of Authority Source of Authority Source of Authority Authn Autograph A Full Life GUI Signet/ Grouper IdP Local apps
7
User Application access controls (including network devices) IdP Shib p2p Source of Authority Source of Authority Source of Authority Portal Gateway Proxy Source of Authority Source of Authority Source of Authority Source of Authority Source of Authority Real Life
8
User Application access controls (including network devices) IdP Shib p2p Source of Authority Source of Authority Source of Authority VO Service Center Gateway Source of Authority Source of Authority Source of Authority IdP An Example Flow in the Attribute Economy
9
User Application access controls (including network devices) IdP Shib p2p Autograph Authn Source of Authority Source of Authority S/G Portal
10
User Application access controls (including network devices) IdP Shib p2p Autograph Authn Source of Authority Source of Authority S/G VO Service Center Source of Authority S/G A VO Service Center Flow
11
Inviting Attributes into your life… For privacy and secrecy For better security For efficiency
12
Peering
13
Possible peering parameters LOA Attribute mapping Economics Liability Privacy
14
VOs plumbed to federations
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.