2nd European Identity Conference
22.04. – 25.04.2008, Munich


<a Martin Kuppinger, KuppingerCole
IdM, SOA & IT-Governance24.04.2008 14:00-15:00
IdM & SOA Governance: Reengineering IT-Governance

Martin Kuppinger, KuppingerCole

Over the last years, Compliance has often been cited as the most important driver for Identity Management. But, honestly, it is IT Governance as one of the most important parts of Corporate Governance. Within IT Governance (and within the identity and access management), the scope shouldn’t be limited to either Enterprise Systems and core business processes or to the Identity Management level. Companies need an consistent approach for IT Governance which focuses on risks as well as…

Results from a Recent Survey

Matthias Bandemer, Ernst & Young AG

Ernst + Young and KCP have, right in time for EIC, released the results of a survey on the relationship between IAM and SOA. Based on the results of surveys, the experience of E+Y and the research and thought leadership of KCP this session will provide insight in the status, trends and requirements of the relationship of IAM and SOA.

Merging IdM, SOA & ESB24.04.2008 15:00-16:00
End-to-End Trust through leveraging SOA & IAM

Stuart Boardman, CGI

Loosely Coupling Best-of-Breed Identity Management Solutions

Bernd Hohgr�fe, Siemens Enterprise Communications

As business processes become more and more flexible, internal and external parties need to be integrated in a quick but secure way. Therefore, IT systems need a reliable source of identities and their access rights to allow information flow in heterogeneous environments beyond system and company boundaries. Up to now, monolithic architectures and single-vendor solutions have been typical for IdM implementations. But after having gone through some mergers and acquisitions, many companies are…

Why IDM Systems have to utilize SOAs

Ga-Lam Chang, Peak Solution

The main problems with conventional IDM-Systems are the tremendous amounts of point to point connections and their maintenance. Beyond this there is no clear assignment of responsibilities for the IDM-Operator and the Application Owner in reference to the IDM Interface. Particularly if the IDM System is based on agents. Therefore we created an SOIDMA strategy for a big German tele-communication provider. The objective was to keep the system responsibility to the Application Owners, to meet…

Merging Identity Management and SOA Management – Tools and Trends

Stuart Boardman, CGI • Bernd Hohgr�fe, Siemens Enterprise Communications • Patrick Harding, Ping Identity • Ga-Lam Chang, Peak Solution • Dr. Bruno Quint, CORISECIO

With the advent of a necessary transition from an architectural, resource-centric approach to one which is identity-centric, Identity Management needs to be delivered as a set of distributed infrastructure services. In this Panel, Martin Kuppinger will discuss with implementation experts and vendors the capabilities of current Identity Management solutions to work as distributed services.

Application Security Infrastructures24.04.2008 16:30-17:30
Application Security Infrastructures

Martin Kuppinger, KuppingerCole

Martin Kuppinger describes the concept of application security infrastructures in different contexts. Application security infrastructures provide standardized interfaces for the creation of secure applications which rely on a defined, central infrastructure. Application security infrastructures become increasingly important as well in the context of identity services, which are exposed by a growing number of identity management tools.

Security by Design � Externalizing Authentication and Authorization

Mike Small, KuppingerCole • Doron Grinstein, BITKOO • Michael Kranawetter, Microsoft

Today still a large part of applications uses its own approaches for authentication and authorization, without manageability through external tools. On the other hand, the idea of externalizing at least some part of this and using central, independent management platforms for security isn’t new – it goes back at least to the early days of RACF. Now there are some new tools and approaches to do this. Several vendors provide such solutions. The panel discusses as well the maturity…

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.