The Internet of Things is not predicated on mobile or fixed-line operators. It is predicated on the value derived from the interplay between different sensors and actuators. In the history of mobile telecommunications it was the mobile network operators who provided a service that brought together radio waves and handset manufacturers. The success of mobile… Continue reading BSS for the IoT: You Don’t Have To Be A Mobile Network Operator To Do It
Author: mustnotgrumble
A Scottish Safe Harbour for Identity Management Update: RBS, Lloyds to move south if Scots vote for independence
Reuters are reporting that the Royal Bank of Scotland and Lloyds Bank will both relocate to England if Scots vote for independence next week. The Royal Bank of Scotland, which employs 11,500 staff in Scotland, announced that it had taken the option to relocate to England because a vote for independence would create uncertainties which could impact… Continue reading A Scottish Safe Harbour for Identity Management Update: RBS, Lloyds to move south if Scots vote for independence
A Scottish Safe Harbour for Identity Management
The Data Protection Directive (officially Directive 95/46/EC) regulates the processing of personal data within the European Union and also provides the criteria for Safe Harbour privacy for companies operating within the European Union. The Safe Harbour regulations forbid sending of customer's personal data to countries outside the European Economic Area unless there is a guarantee that it… Continue reading A Scottish Safe Harbour for Identity Management
Some Identity Standard Factoids
The following are some interesting security factoids that point towards the benefit of a mobile 2FA (Over the Air or Wireless Public Key Infrastructure) federated identity model: The most commonly used password in the English speaking world is '123456'. Previously it was 'password' An average UK internet user has five different username and password combinations… Continue reading Some Identity Standard Factoids
Single Identity Repository for Internal Staff, Partners & Customers and Security Zones of Control
It is not impossible to have a single user directory tree for internal users / staff, partners and customers. All that is required is unique identifiers and different levels of permission normally managed through group membership. However pretty much every organisation quite rightly separates these groups as independent trees. These independent trees are normally realised… Continue reading Single Identity Repository for Internal Staff, Partners & Customers and Security Zones of Control
4.5 billion CyberVor records and Trusted Identity Federation
Hold Security have announced that the CyberVor gang (dubbed by Hold Security with “vor” meaning “thief” in Russian) has amassed over 4.5 billion records, mostly consisting of stolen credentials. 1.2 billion of these credentials appear to be unique, belonging to over half a billion e-mail addresses. To get such an impressive number of credentials, the CyberVors robbed… Continue reading 4.5 billion CyberVor records and Trusted Identity Federation
Considering Various Active Directory and Oracle Identity Manager Integration Options
There are a number of different ways of integrating different versions of Microsoft's Active Directory (including ADFS & FIM) with different versions of Oracle's Identity Management suite. Unfortunately for the implementer there is very little published architecture best practice covering identity migration / integration. This is surprising because of both vendors' large market share and the annual… Continue reading Considering Various Active Directory and Oracle Identity Manager Integration Options
Why the Future of Identity is OpenID Connect and not SAML
This blog is part of a series comparing the implementation of identity management patterns in SAML and OpenID Connect: Identity Broker Service in OpenID Connect Identity Broker Service in SAML OpenID Connect AuthN & AuthZ Comparison of OpenID Connect with OAuth2.0 & SAML2.0 Cross Domain Identity Patterns: Chained Federation & Service Broker Future of Identity Federation is OpenID Connect Identity… Continue reading Why the Future of Identity is OpenID Connect and not SAML
Identity Broker Service in OpenID Connect: Supporting Multiple Identity Providers & Service Providers
This blog is part of a series comparing the implementation of identity management patterns in SAML and OpenID Connect: Identity Broker Service in SAML OpenID Connect AuthN & AuthZ Cross Domain Identity Patterns: Chained Federation & Service Broker Identity Broker Service in OpenID Connect In an earlier blog post (Identity Broker Service in SAML) described how to support connections between… Continue reading Identity Broker Service in OpenID Connect: Supporting Multiple Identity Providers & Service Providers
Identity Broker Service in SAML: Supporting Multiple Identity Providers & Service Providers
This blog is part of a series comparing the implementation of identity management patterns in SAML and OpenID Connect: OpenID Connect AuthN & AuthZ Cross Domain Identity Patterns: Chained Federation & Service Broker Identity Broker Service in SAML A federated organisation may have multiple distinct services (service providers) where each service is protected under a distinct trust domain. The… Continue reading Identity Broker Service in SAML: Supporting Multiple Identity Providers & Service Providers