Loops in Scala (Imperative & Tail Recursive)

The following are different ways of implementing simple loops in Scala While loop The Scala while loop executes a certain block of code, as long as a certain condition is true. while(someObject.hasNext()) process(someObject.next()); Do While Loop The Scala  do while loop is similar to the while loop except the condition is executed after the loop body. This means that the loop body… Continue reading Loops in Scala (Imperative & Tail Recursive)

Cross Domain Identity Patterns: Mapped Federation

With Mapped Federation users need to exist in both the identity provider and the service provider. As per transient federation a metadata exchange contract is defined between the identity provider and the service provider. With Mapped Federation further attributes for uniquely identifying the user are required. This may be the UID (e.g. email address) that… Continue reading Cross Domain Identity Patterns: Mapped Federation

Cross Domain Identity Patterns: Chained Federation & Service Broker

Chained Federation allows access to multiple Service Providers to be granted to multiple trusted Identity Providers. The identity provider request access to the service provider via the Service Broker which authorises the request and forwards to the appropriate service provider based on the TargetURL. This is useful where an enterprise is providing multiple services to… Continue reading Cross Domain Identity Patterns: Chained Federation & Service Broker

Cross Domain Identity Patterns: Transient Federation

A transient federation agreement is a pre-negotiated (trusted metadata exchange) set of contracts (normally bilateral) which enable trusted pairs to recognise each other's identities. The contract may specify user roles, governance, security and verification policies, or specific technical methods. The implementation may utilise a Trust Broker (possibly a 3rd party credential authority) for validating the… Continue reading Cross Domain Identity Patterns: Transient Federation

Identity Management Business Case Drivers for both Customer and Workforce

Developing a business case for identity management is often a challenge because there are not always immediate tangible benefits. Furthermore the legal or security need to maintain separation between customer and workforce will create overlap between architecture that may necessitate separate business cases. It is therefore important to explicitly align the business case with the… Continue reading Identity Management Business Case Drivers for both Customer and Workforce

Moving Away from a Push Model for Enterprise Identity Architecture

The discipline of Enterprise Architecture and an architecture for identity management do not currently have a best practice. The TOGAF discipline of Enterprise Architecture promotes a holistic and systemic view for interoperable systems; these may be supply chains, business processes or identity repositories. The Emerging Architecture of Identity Management argues that identity management is based… Continue reading Moving Away from a Push Model for Enterprise Identity Architecture

Safe Harbour, Data Privacy and Scottish Independence

The Data Protection Directive (officially Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data is a European Union directive which regulates the processing of personal data within the European Union. The Criteria for Safe Harbour privacy are incorporated into the Directive… Continue reading Safe Harbour, Data Privacy and Scottish Independence

OAuth Terminology in SAML2

A Resource Server in OAuth is a Service Provider in SAML2An Authorization Server in OAuth is an Identity Provider in SAML2Thankfully a Client is a UserI still often say SPIL (SAML2.0 Service Provider Initiated Login) and IDIL (SAML2.0 Identity Provider Initiated Login) on a regular basis.  I find RSIL and ASIL harder.