iamreflections.blogspot.com
Identity and access management reflections: Compliance and security in different verticals
http://iamreflections.blogspot.com/2012/11/compliance-and-security-in-different.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Saturday, November 3, 2012. Compliance and security in different verticals. I attended a very interesting healthcare round table last week organized by RSA. One of the things that we discussed was how different verticals handle their respective compliance legislation. Another aspect is that the information handled by healthcare organizations is harder to fence. Financial organizations tend...
iamreflections.blogspot.com
Identity and access management reflections: To encrypt or not to encrypt, that is the question
http://iamreflections.blogspot.com/2012/12/to-encrypt-or-not-to-encrypt-that-is.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Thursday, December 6, 2012. To encrypt or not to encrypt, that is the question. In my last post I wrote about the South Carolina breach and this attack has now made it's way to even vernerable publications like the Economist. The interesting question here is when does encryption of PII or PHI at rest go from "advanced technology that really goes above and beyond" to "industry standard"?
iamreflections.blogspot.com
Identity and access management reflections: Challengers: Forgerock
http://iamreflections.blogspot.com/2012/01/challengers-forgerock.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Sunday, January 15, 2012. First up is Forgerock. Forgerock largely consists of ex Sun employees that left during or just after the Oracle take over. Forgerock has managed to pick up some of the very brightest Sun talents as well as some of the most interesting concepts and ideas from the now defunct Sun IDM community. The stack consists of four major components:. If you look at the components ...
iamreflections.blogspot.com
Identity and access management reflections: May 2013
http://iamreflections.blogspot.com/2013_05_01_archive.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Thursday, May 30, 2013. IT Service Catalog in OIM11G R2 - filtering objects. In the post "IT service catalog evolution". A large number of ROs comes with a number of issues. But the biggest is usually that it can make it hard for the business to pick the right entitlement in the request interface. The catalog offers the ability to not only present resource objects (application instances) but a...
iamreflections.blogspot.com
Identity and access management reflections: Pre pulse 2013
http://iamreflections.blogspot.com/2013/03/pre-pulse-2013.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Saturday, March 2, 2013. Pulse 2013 is coming up fast and furious and I am packing my bags. If anyone of my readers is interested in meeting me in person and are attending Pulse I will be part of the panel for "IAM-2297: Best Practices in Adopting Identity and Access Management" which will take place in MGM-Grand Room 122 at Tuesday 5-6 pm. The talk will be centered around two questions:.
iamreflections.blogspot.com
Identity and access management reflections: Pulse 2013 - Best practices in IAM
http://iamreflections.blogspot.com/2013/01/pulse-2013-best-practices-in-iam.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Tuesday, January 15, 2013. Pulse 2013 - Best practices in IAM. Pulse 2013 is coming up soon and I am planning my yearly trip to lovely Las Vegas. This year I will be on a panel titled " Best Practices in adopting Identity and Access Management - a panel discussion". The Pulse panels are always a lot of fun so I am really looking forward to it. Posted by Martin Sandren. View my complete profile.
iamreflections.blogspot.com
Identity and access management reflections: Useful TIM tips and tricks
http://iamreflections.blogspot.com/2012/01/useful-tim-tips-and-tricks.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Friday, January 27, 2012. Useful TIM tips and tricks. I ran into a page full of useful TIM tips and tricks that I thought I should share: IBM Tivoli Identity Manager How To. Posted by Martin Sandren. January 13, 2014 at 1:01 AM. Thank you for providing clear information on this. you can also refer Access control suppliers in hyderabad. Subscribe to: Post Comments (Atom).
iamreflections.blogspot.com
Identity and access management reflections: Nothing is scarier than a business user with a credit card - collaboration
http://iamreflections.blogspot.com/2013/08/nothing-is-scarier-than-business-user.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Saturday, August 10, 2013. Nothing is scarier than a business user with a credit card - collaboration. Could the same thing happen in the US? I would say perhaps so perhaps it is time to consider alternatives to sending all your docs to a US based company if you yourself is non US based. There are a number of pages such as Prism break. And is marketed by Cloud Distribution. I have been playing...
iamreflections.blogspot.com
Identity and access management reflections: Externalized authorization and Xacml
http://iamreflections.blogspot.com/2010/08/externalized-authorization.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Saturday, August 7, 2010. Externalized authorization and Xacml. XACML and attribute based access control does offer a promise to give you this ability. It is off course nothing revolutionary as you can implement exactly the same in your favorite programming language but there are situations where having the authorization logic embedded within the business logic may not be so good. OIM 11g: Req...
iamreflections.blogspot.com
Identity and access management reflections: Datapower - a blast from the past
http://iamreflections.blogspot.com/2012/03/datapower-blast-from-past.html
Identity and access management reflections. Reflections, musings and ideas about identity and access management. Wednesday, March 7, 2012. Datapower - a blast from the past. Back in 2005 I was living in London and working for Sena Systems. During the next five years I didn't do any Datapower work so when I got the chance to take part in a hands on DP lab day I took the chance. The most striking part of the experience was how little DP had changed. Most of the user interface was almost identical ....Inter...