Top Banner
Leveraging identity with Josso, the Professional Open Source
19
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Converge   Leveraging Identity With Professional Open Source Final

Leveraging identity with Josso, the Professional Open Source

Page 2: Converge   Leveraging Identity With Professional Open Source Final

Goals

Introduce a 4-step Identity Implementation Roadmap

Examine the most common Identity Management Project mistakes; and how to avoid them

Compare commercial and open source Identity Management Solutions head-to-head 

Drill down on the JOSSO Open Source Product, Adopters and Case Studies

Q&A

Page 3: Converge   Leveraging Identity With Professional Open Source Final

A non-IAM Adopter Organization

Page 4: Converge   Leveraging Identity With Professional Open Source Final

Bird’s eye view of an IdentityInside-Out Implementation Roadmap

• Deliver an Authoritative Source

• End the password nightmare

• Build service around Identity

• Push Identity beyond organizational boundaries

Page 5: Converge   Leveraging Identity With Professional Open Source Final

Unify – Deliver an Authoritative Source

WHY Build value from your identity data Realize the data backbone of the identity spinal cord

HOW Adopt and Extend a user schema Choose your persistence mechanism and protocol for

storing and exposing your organization identities respectively

Set up an Authoritative Source for user and entitlement information

APPROACHES Batch data synchronization and Reconciliation Directory Virtualization

Page 6: Converge   Leveraging Identity With Professional Open Source Final

Leverage – End the password nightmare

WHY Increase operational efficiency Increase security

HOW Authentication and Authorization still handled within

the application tier Point business applications to the authoritative source

for looking up user and entitlement records Federate local identity store against authoritative

source APPROACHES

Connecting authoritative source to identity consumers

Business application retrofitting of the identity data layer

Page 7: Converge   Leveraging Identity With Professional Open Source Final

Service – Build services around identity

WHY Enhance user experience Increase operational efficiency Increase security

HOW Set up an Asserting Authority capable of emitting security

tokens Adopt standards for security token emission, formatting

and underlying trust system Shift Authentication and Authorization Processes to the

Asserting Authority Leverage Asserting Authority services from business

applications and application platforms APPROACHES

Implement a Standard-based Access Management Solution

Page 8: Converge   Leveraging Identity With Professional Open Source Final

Externalize – Push Identity beyond organizational boundaries

WHY Achieve interoperation with external organizations/domains Extend the reach of organization’s identity services to the Cloud Bring Public Cloud services on board

HOW Introduce support for producing and consuming standard-based

assertions (e.g. using the SAML2 protocol) Set up Inbound & Outbound Federated Connections with Partner

sites APPROACHES

Deliver the Federated Identity capabilities into the Access Management Solution – with little to no impact in the application base

Deliver the Federated Identity Capabilities into the Business Application tier – requires retrofitting business applications that need to be externalized; or need to leverage externalized services

Page 9: Converge   Leveraging Identity With Professional Open Source Final

An IAM Adopter Organization

Page 10: Converge   Leveraging Identity With Professional Open Source Final

Two sides of the same coin

Page 11: Converge   Leveraging Identity With Professional Open Source Final

Head-to-Head Comparison of Commercial and Open Source IAM

Page 12: Converge   Leveraging Identity With Professional Open Source Final

JOSSO in a nutshell

Feature BenefitTransparent Low time-to-market and cost

Wide Application Server Support Leverage existing computing infrastructure

Pluggable Full control of your identity and access management logic

Multiple Authentication Mechanisms

Centralize user authentication services

Standard Based Straightforward integration

Professionally Supported Guaranteed implementation

Open Source Dramatically Lower Cost

Page 13: Converge   Leveraging Identity With Professional Open Source Final

The JOSSO Experience

Page 14: Converge   Leveraging Identity With Professional Open Source Final

Distinguished JOSSO Adopters

Avery Dennison Hanwha Redhat

Autodesk Inarcassa Sensus Metering Systems

Backbase jCatalog Software AG

Cognizant JDSU Telefónica

European Space Agency

Médecine & Hygiène Telkcom Indonesia

European Commission

National Leisure Group

The Open Group

Italian Banks Association

NEC Trelleborg

Government of Argentina

ORT University VFA

Government of Spain

Pentaho Vlaamse Radio- en Televisieomroep

Government of the US

Pfizer Wavemaker

Page 15: Converge   Leveraging Identity With Professional Open Source Final

The State of Florida Case Study The Need: Enable interoperation among

heterogeneous homeland security systems in terms of identity

The Solution: Deliver a timely, cost-effective identity and access management back-bone

Solution Highlights :• JOSSO as the identity stack• Based on Weblogic and JBoss environments• High-availability and Scalability enabled for

Identity and Access Management Services• 60,000 users Approximately

Page 16: Converge   Leveraging Identity With Professional Open Source Final

Software AG Case Study

The Need: Enable seamless employee and customer access to Communities Ecosystem

The Solution: Deliver a timely, cost-effective Standard-based Federated Identity Solution without disrupting Communities Ecosystem

Solution Highlights :• JOSSO and Atricore Identity Bus as the

identity stack• Federating against Novel Access

Management using SAML2• High-availability and Scalability enabled for

Identity and Access Management Services• 50,000 users approximately

Page 17: Converge   Leveraging Identity With Professional Open Source Final

European Union Case Study

The Need: Enable identity services into the Planets Product - Preservation and Long-term Access through Networked Services - coordinated by the British Library

The Solution: Power the Planet platform with Open Source Identity Management Technology

Solution Highlights :• JOSSO as the identity stack• High-availability and Scalability enabled for

Identity and Access Management Services

Page 18: Converge   Leveraging Identity With Professional Open Source Final

AQ&

Page 19: Converge   Leveraging Identity With Professional Open Source Final

Contact Information

Atricore Inc. : www.atricore.com

Parceiro Certificado no Brasil:

GoNow : www.gonow.com.br

R. Tenerife, 31 – 10º andar

Vila Olímpia – São Paulo/SP

(11) 3046 2525