A Common Service Layer for M2M & The Challenge of AAA for Smart Devices

The Internet of Things, as distinct from the internet of people, requires communication between devices to enable home automation, telematics and health care monitoring. This intercommunication is dependent upon semantically structured and shared data for enabling functions such as identification, authentication, authorisation, bootstrapping and provisioning. Standardising both the semantically structured data and the enabling functions across M2M applications… Continue reading A Common Service Layer for M2M & The Challenge of AAA for Smart Devices

The Future of Identity Management According to CoTS Vendors Part 1

Most identity management software vendors will rationalise their service enablement capability as so: Identity and access management has traditionally focused on managing user accounts in the form of directory service entries - the traditional IAM/IdM view it has seldom involved managing identities, let alone multiple types. They might digress slightly here on the history of Master Data… Continue reading The Future of Identity Management According to CoTS Vendors Part 1

Enterprise M2M Use Cases: #2 Corporate Customer Fleet Management Change M2M Device MNO

GSMA Official Document 12FAST.13 - Embedded SIM Remote Provisioning Architecture published in December 2013 provides a technical specification to enable the remote provisioning and management of Embedded SIMs to allow the “over the air” provisioning of an initial operator subscription and the subsequent change of subscription from one operator to another.  The technical specification includes technical use… Continue reading Enterprise M2M Use Cases: #2 Corporate Customer Fleet Management Change M2M Device MNO

Enterprise M2M Use Cases: #1 Corporate Customer Fleet Management New M2M Order Provisioning

GSMA Official Document 12FAST.13 - Embedded SIM Remote Provisioning Architecture published in December 2013 provides a technical specification to enable the remote provisioning and management of Embedded SIMs to allow the “over the air” provisioning of an initial operator subscription and the subsequent change of subscription from one operator to another.  The technical specification includes technical use… Continue reading Enterprise M2M Use Cases: #1 Corporate Customer Fleet Management New M2M Order Provisioning

Embedded SIM SM-DP & SM-SR

The GSMA has united the mobile operators and SIM suppliers behind a single Embedded SIM specification to avoid costly, fragmented & incompatible technical solutions and help accelerate the M2M market.  In order to support M2M use cases with no human intervention and to facilitate the secure over the air installation of mobile operator credentials into a SIM,… Continue reading Embedded SIM SM-DP & SM-SR

5 Key Architectural Considerations on Implementing Identity and Access Management for M2M

Identity and access management have traditionally been used to manage the identity and credentials assigned to human users.  Machine to machine devices such as Smart Metering GPRS enabled electricity meters or SIM cards in cars require their own identity and access management capabilities. These include new M2M authentication schemes because traditional authentication schemes always assume the presence of a person.… Continue reading 5 Key Architectural Considerations on Implementing Identity and Access Management for M2M

Salesforce Identity Connect to Other Directory Services

Identity Connect is a charged extension to Salesforce Identity that enables an organisation to use their existing directory services.  It specifically allows integration to Active Directory and enables the upload of user data from Active Directory to one or more Salesforce organisations, and automatically to synchronise this data when user entries are added, changed, or removed. In… Continue reading Salesforce Identity Connect to Other Directory Services

Loops in Scala (Imperative & Tail Recursive)

The following are different ways of implementing simple loops in Scala While loop The Scala while loop executes a certain block of code, as long as a certain condition is true. while(someObject.hasNext()) process(someObject.next()); Do While Loop The Scala  do while loop is similar to the while loop except the condition is executed after the loop body. This means that the loop body… Continue reading Loops in Scala (Imperative & Tail Recursive)

Cross Domain Identity Patterns: Mapped Federation

With Mapped Federation users need to exist in both the identity provider and the service provider. As per transient federation a metadata exchange contract is defined between the identity provider and the service provider. With Mapped Federation further attributes for uniquely identifying the user are required. This may be the UID (e.g. email address) that… Continue reading Cross Domain Identity Patterns: Mapped Federation

Cross Domain Identity Patterns: Chained Federation & Service Broker

Chained Federation allows access to multiple Service Providers to be granted to multiple trusted Identity Providers. The identity provider request access to the service provider via the Service Broker which authorises the request and forwards to the appropriate service provider based on the TargetURL. This is useful where an enterprise is providing multiple services to… Continue reading Cross Domain Identity Patterns: Chained Federation & Service Broker