Versatile Authentication, Risk- and Context-Based Authentication: Why you need these Concepts
Versatile Authentication, i.e. the ability to flexibly use and combine different authentication mechanisms, and risk-/context-based authentication and authorization are key technologies for not only the future IAM infrastructure, but your future Information Security approach. This session will explain these concepts and how they help to solve business challenges like social logins, access from mobile devices, etc. The session provides an overview of these technologies and insight into the vendor markets, for both on-premise and cloud solutions.
Authoritative Identity vs Social Footprint – Identity´s “The Tortoise and the Hare”
While authoritative sources of identity information support the mainstream use case for identity proofing and subsequent credential binding to authenticate to an online service, there is a large proportion of the online population who are excluded because they have no social footprint – younger people and students, recent immigrants and so on. Applying Big Data capabilities to the social networking spaces offers up a social footprint that some might consider “good enough” for a low risk transaction. But how far could it be taken? Is there a case for using a dynamic social footprint instead of a traditional static authoritative source for higher risk transactions? This panel comprises experts on both sides of this divide, and is sure to offer robust and entertaining debate.