Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Buy Now $27.99
Standard view
Full view
of .
Look up keyword or section
Like this
7Activity

Table Of Contents

Foreword
Preface
Chapter 1
CHAPTER 1
Introduction
Business Opportunity
Digital Identity Matters
Using Digital Identity
The Business Context of Identity
Foundational Technologies for Digital Identity
Identity Management Architectures
Chapter 2
CHAPTER 2
Defining Digital Identity
The Language of Digital Identity
Identity Scenarios in the Physical World
Identity, Security, and Privacy
Digital Identity Perspectives
Identity Powershifts
Conclusion
Chapter 3
CHAPTER 3
Trust
What Is Trust?
Trust and Evidence
Trust and Risk
Reputation and Trust Communities
Chapter 4
CHAPTER 4
Privacy and Identity
Who’s Afraid of RFID?
Privacy Pragmatism
Privacy Drivers
Privacy Audits
Privacy Policy Capitalism
Anonymity and Pseudonymity
Privacy Principles
Limiting collection
Prerequisites
Chapter 5
CHAPTER 5
The Digital Identity Lifecycle
Provisioning
Propagating
Using
Maintaining
Deprovisioning
Chapter 6
CHAPTER 6
Integrity, Non-Repudiation, and Confidentiality
Integrity
Non-Repudiation
Hybrid key systems
Chapter 7
CHAPTER 7
Authentication
Authentication and Trust
Authentication Systems
Challenge-Response Systems
Policy First
Authorization Patterns
User-Based Permission Systems
Abstract Authorization Architectures
Digital Certificates and Access Control
Chapter 9
CHAPTER 9
Names and Directories
Utah.gov: Naming and Directories
Naming
Directories
Aggregating Directory Information
Virtual Directories
Digital Rights Management
Digital Leakage
The DRM Battle
Apple iTunes: A Case Study in DRM
Features of DRM
DRM Reference Architecture
Trusted Computing Platforms
Specifying Rights
Chapter 11
CHAPTER 11
Interoperability Standards
Standards and the Digital Identity Lifecycle
Integrity and Non-Repudiation: XML Signature
Confidentiality: XML Encryption
Authentication and Authorization Assertions
Example SAML Use Cases
Identity Provisioning
Representing and Managing Authorization Policies
Chapter 12
CHAPTER 12
Federating Identity
Centralized Versus Federated Identity
The Mirage of Centralized Efficiency
Network Effects and Digital Identity Management
Federation in the Credit Card Industry
Benefits of Federated Identity
Digital Identity Standards
Three Federation Patterns
Identity federation network
An Architecture for Digital Identity
Identity Management Architecture
The Benefits of an Identity Management Architecture
Success Factors
Roadblocks
Identity Management Architecture Components
Technical Reference Architecture
Chapter 14
CHAPTER 14
Governance and Business Modeling
IMA Lifecycle
IMA Governance Model
Initial Steps
Creating a Vision
IMA Governing Roles
Evaluating Processes
A Practical Action Plan
Filling the Gaps with Best Practices
Chapter 16
CHAPTER 16
Identity Data Architectures
Build a Data Architecture
Processes Link Identities
Employee Provisioning
Principles for Identity Data
Chapter 17
CHAPTER 17
Interoperability Frameworks for Identity
Principles of a Good IF
Contents of an Identity IF
Example Interoperability Framework
A Word of Warning
Chapter 18
CHAPTER 18
Identity Policies
The Policy Stack
Attributes of a Good Identity Policy
Determining Policy Needs
Writing Identity Policies
An Identity Policy Suite
The Policy Review Framework
Assessing Identity Policies
Enforcement
Procedures
Chapter 19
CHAPTER 19
Identity Management Reference Architectures
Reference Architectures
Reference Architecture Best Practices
Using a Reference Architecture
Components of a Reference Architecture
Technical Position Statements
Consolidated Infrastructure Blueprint
System Reference Architectures
Chapter 20
CHAPTER 20
Building an Identity Management Architecture
Scoping the Process
Which Projects Are Enterprise Projects?
Sequencing the IMA Effort
A Piece at a Time
Conclusion: Dispelling IMA Myths
Index
P. 1
Digital Identity

Digital Identity

Ratings:

3.5

(1)
|Views: 611|Likes:

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.

Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.

How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.

Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.

How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

More info:

Publish date: Jul 1, 2008
Added to Scribd: May 16, 2009
Copyright:Traditional Copyright: All rights reservedISBN:9780596153465
List Price: $27.99 Buy Now

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
See more
See less

04/07/2015

256

9780596153465

$27.99

USD

You're Reading a Free Preview
Pages 11 to 75 are not shown in this preview.
You're Reading a Free Preview
Pages 86 to 170 are not shown in this preview.
You're Reading a Free Preview
Pages 188 to 196 are not shown in this preview.
You're Reading a Free Preview
Pages 207 to 256 are not shown in this preview.

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Diana Valerieva liked this
Silopolis liked this
lurauave10030 liked this
bhaskarmfa liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->