European Identity Conference 2010
04.05. – 07.05.2010, Munich


<a Felix Gaehtgens, Kuppinger Cole
How to make your Software Security Architecture Future-Proof05.05.2010 14:00-15:00
How to make your Software Security Architecture Future-Proof

Dale Olds, Novell • Kim Cameron, Microsoft • Rakesh Radhakrishnan, Oracle • Blake Dournaee, Intel • Gerry Gebel, Axiomatics Americas

Attributes Centric Identity Architecture05.05.2010 15:00-16:00
Attributes Centric Identity Architecture

Fulup Ar Foll, Sun Microsystems / Liberty

After so many years of conflict, the war in between authentication protocols finally ended. While there is no clear winner, the only three survivors (SAML2, OpenID & InfoCard) have established an informal “armistice”, where each claims to be more complementary than competitors. The industry, as well as customers, can easily sustain three protocols. Today any significant software implementation bridges the remaining protocols seamlessly. While this scenario may not be perfect,…

Improving the Security and Usability of OpenID

Ariel Gordon, Microsoft

OpenID has gained significant popularity as an Internet identity system. Nonetheless, its adoption has been limited by usability and security issues. It has been widely speculated in the community that one of the ways that we can make OpenID more usable and safer is with the introduction of an active client to assist the user with his logon experience. In this session, we will describe the results of a community collaboration to develop an experimental multi-protocol version of Windows…

Regain Control of Your Perimeter in the Cloud05.05.2010 16:30-17:30
Regain Control of Your Perimeter in the Cloud

Dr. Babak Sadighi, Axiomatics AB • Blake Dournaee, Intel

The traditional concept of an in-house data center behind a static corporate firewall is history once and for all. The enterprise is now in full embrace of dynamic applications provided and scaled by dedicated cloud service providers. To innovate faster, regain control, and compete in a new world that is shifting from a “need to know” to “need to share” paradigm requires a new focus on security and authorization in a dynamic perimeter. This dynamic perimeter spans hybrid…

Claims Based Identity and the Cloud

Vittorio Bertocci, Microsoft

One of the many advantages of claims-based architectures is that they abstract away the details of their components, including where things are hosted. As long as services and identity providers are network-addressable, they can live on-premises and in the cloud and easily move between the two environment without changing the emerging properties of the system. The immediate advantage is that existing identity providers, typically on-premises, are readily available for the new applications in…

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.