Security and Identity in the Cloud

Cloud Identity Blog is my way to discuss, show and share information about different technology topics, mainly in the Security, Identity and Access Management areas.

June, 2010

  • Open Standard Authentication in the Enterprise, Part 3

      In previous post we started to talk about different SSO solutions.  This post will cover another common SSO approach. Current Solutions Federal Agencies employ two primary strategies to provide Single Sign On across multiple Domains, Applications...
  • Open Standard Authentication in the Enterprise, Part 2

      In previous post we started to talk about different complexities of SSO implementations. Lets review what type of solutions are common in current implementations. Current Solutions Federal Agencies employ two primary strategies to provide Single...
  • Open Standard Authentication in the Enterprise, Part 1

    In the next few posts, I’m going to talk about SSO in Enterprise environments, with emphasis on Federal Government Agencies. Federal Agencies are facing multiple issues with managing digital identities for employees and contractors. While most...
  • Levels of Assurance and Claims-based authentication

      Federal Agencies must comply with OMB 04-04 publication. There is an established framework asserting different levels of assurance for digital identities, such as user accounts/passwords, Smart Cards and other types of tokens. Claims-based authentication...
  • Personally Identifiable Information (PII) and User Anonymity

      Every system and application in Federal Government must adhere to the OMB memorandum M-04-04 and protect PII. One option that claims-based applications can give you is user anonymity. Remember that your application no longer directly authenticates...