19
Leveraging identity with Josso, the Professional Open Source

Converge Leveraging Identity With Professional Open Source Final

  • Upload
    gonow

  • View
    231

  • Download
    0

Embed Size (px)

Citation preview

Leveraging identity with Josso, the Professional Open Source

Goals

Introduce a 4-step Identity Implementation Roadmap

Examine the most common Identity Management Project mistakes; and how to avoid them

Compare commercial and open source Identity Management Solutions head-to-head 

Drill down on the JOSSO Open Source Product, Adopters and Case Studies

Q&A

A non-IAM Adopter Organization

Bird’s eye view of an IdentityInside-Out Implementation Roadmap

• Deliver an Authoritative Source

• End the password nightmare

• Build service around Identity

• Push Identity beyond organizational boundaries

Unify – Deliver an Authoritative Source

WHY Build value from your identity data Realize the data backbone of the identity spinal cord

HOW Adopt and Extend a user schema Choose your persistence mechanism and protocol for

storing and exposing your organization identities respectively

Set up an Authoritative Source for user and entitlement information

APPROACHES Batch data synchronization and Reconciliation Directory Virtualization

Leverage – End the password nightmare

WHY Increase operational efficiency Increase security

HOW Authentication and Authorization still handled within

the application tier Point business applications to the authoritative source

for looking up user and entitlement records Federate local identity store against authoritative

source APPROACHES

Connecting authoritative source to identity consumers

Business application retrofitting of the identity data layer

Service – Build services around identity

WHY Enhance user experience Increase operational efficiency Increase security

HOW Set up an Asserting Authority capable of emitting security

tokens Adopt standards for security token emission, formatting

and underlying trust system Shift Authentication and Authorization Processes to the

Asserting Authority Leverage Asserting Authority services from business

applications and application platforms APPROACHES

Implement a Standard-based Access Management Solution

Externalize – Push Identity beyond organizational boundaries

WHY Achieve interoperation with external organizations/domains Extend the reach of organization’s identity services to the Cloud Bring Public Cloud services on board

HOW Introduce support for producing and consuming standard-based

assertions (e.g. using the SAML2 protocol) Set up Inbound & Outbound Federated Connections with Partner

sites APPROACHES

Deliver the Federated Identity capabilities into the Access Management Solution – with little to no impact in the application base

Deliver the Federated Identity Capabilities into the Business Application tier – requires retrofitting business applications that need to be externalized; or need to leverage externalized services

An IAM Adopter Organization

Two sides of the same coin

Head-to-Head Comparison of Commercial and Open Source IAM

JOSSO in a nutshell

Feature BenefitTransparent Low time-to-market and cost

Wide Application Server Support Leverage existing computing infrastructure

Pluggable Full control of your identity and access management logic

Multiple Authentication Mechanisms

Centralize user authentication services

Standard Based Straightforward integration

Professionally Supported Guaranteed implementation

Open Source Dramatically Lower Cost

The JOSSO Experience

Distinguished JOSSO Adopters

Avery Dennison Hanwha Redhat

Autodesk Inarcassa Sensus Metering Systems

Backbase jCatalog Software AG

Cognizant JDSU Telefónica

European Space Agency

Médecine & Hygiène Telkcom Indonesia

European Commission

National Leisure Group

The Open Group

Italian Banks Association

NEC Trelleborg

Government of Argentina

ORT University VFA

Government of Spain

Pentaho Vlaamse Radio- en Televisieomroep

Government of the US

Pfizer Wavemaker

The State of Florida Case Study The Need: Enable interoperation among

heterogeneous homeland security systems in terms of identity

The Solution: Deliver a timely, cost-effective identity and access management back-bone

Solution Highlights :• JOSSO as the identity stack• Based on Weblogic and JBoss environments• High-availability and Scalability enabled for

Identity and Access Management Services• 60,000 users Approximately

Software AG Case Study

The Need: Enable seamless employee and customer access to Communities Ecosystem

The Solution: Deliver a timely, cost-effective Standard-based Federated Identity Solution without disrupting Communities Ecosystem

Solution Highlights :• JOSSO and Atricore Identity Bus as the

identity stack• Federating against Novel Access

Management using SAML2• High-availability and Scalability enabled for

Identity and Access Management Services• 50,000 users approximately

European Union Case Study

The Need: Enable identity services into the Planets Product - Preservation and Long-term Access through Networked Services - coordinated by the British Library

The Solution: Power the Planet platform with Open Source Identity Management Technology

Solution Highlights :• JOSSO as the identity stack• High-availability and Scalability enabled for

Identity and Access Management Services

AQ&

Contact Information

Atricore Inc. : www.atricore.com

Parceiro Certificado no Brasil:

GoNow : www.gonow.com.br

R. Tenerife, 31 – 10º andar

Vila Olímpia – São Paulo/SP

(11) 3046 2525