Federated Identity Management - We Built It; Why Won't They Come?

نویسندگان

  • Jostein Jensen
  • Martin Gilje Jaatun
چکیده

M any companies take advantage of single-sign-on (SSO) technologies. After a successful login, the authentication service sends the computer a security token, which is subsequently forwarded as proof of authentication each time that computer accesses a protected service. Examples of services linked through SSO include access to network drives, email services, a corporate intranet, project portals, and secured wireless networks. Only a few years ago, it would have been unthinkable for all these systems to link to a common access control solution. In the last decade, the SSO model has been extended from intra-organizational use to allow collaboration on identity management across organizational boundaries and security domains. This is known as federated identity management (FIM). A user authenticates to the local organization, obtains a security token, and uses this token to access resources in other organizations. From a user’s perspective, FIM benefits include1

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Federated Identity Management in Business-to-Business Outsourcing

While the outsourcing of IT services is a promising and cost-effective solution for many aspects of today’s information and communication infrastructures, it poses new management challenges in the area of authentication, autorization and accounting (AAA). Due to the demand of cross-organizational AAA, traditional Identity & Access Management is presently developing into Federated Identity Manag...

متن کامل

Federated Identity Management

This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Cameron’s 7 Laws of Identity, how can we protect the user’s privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some cu...

متن کامل

Why the Critics of Poor Health Service Delivery Are the Causes of Poor Service Delivery: A Need to Train the Policy-makers; Comment on “Why and How Is Compassion Necessary to Provide Good Quality Healthcare?”

This comment on Professor Fotaki’s Editorial agrees with her arguments that training health professionals in more compassionate, caring and ethically sound care will have little value unless the system in which they work changes. It argues that for system change to occur, senior management, government members and civil servants themselves need training so that they learn to understand the effec...

متن کامل

Economic Tussles in Federated Identity Management

Federated identity management (FIM) enables a user to authenticate once and access privileged information across many disparate domains. It is a technology of great promise whose adoption has been disappointing. FIM’s proponents include both governments and leaders in the IT industry. Many explanations have been given for its slow uptake, from disputes over liability assignment for authenticati...

متن کامل

Negotiating Trust in Identity Metasystem

Many federated identity management systems have been proposed to solve the problem of authorizing users across security domains. Although these solutions attempt to follow the user-centric design approach to empower users by letting them make important decisions on whether to release sensitive information, they do not provide much help to users in making good decisions. More importantly, privac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2013