TITLE

What Is Federated Identity Management?

AUTHOR(S)
Kobielus, James
PUB. DATE
August 2005
SOURCE
Business Communications Review;Aug2005, Vol. 35 Issue 8, p56
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article discusses various issues related to the significance of federated identity management (IdM) computer network security. Federated IdM is a hot topic right now in the world of network security. Although it has many definitions and applications, at heart, federated IdM refers to a new standards-based approach to directory services that streamlines and secures user access to networked resources. Compared to previous access, authentication and directory integration approaches, federated IdM is a better solution. Although federated IdM requires additional network security infrastructure components--notably the identity provider and service provider functional components--each organization stores, manages and controls its own identity information, including user IDs, passwords and account profiles. Federation also allows organizations to reduce or eliminate the administrative burden of having to register external users in local directories. When two or more autonomous organizations decide to federate, they retain control of their respective identities and resources, but first they must establish trust relationships with one another. INSETS: Money Machines And Cellular Roaming--Forerunners To Federated...;Internal Benefits Of Federated IdM.
ACCESSION #
17848698

 

Related Articles

  • AN APPROACH TO BUILDING PROFILE BASED ON THE UTILITY OF FEATURES IN THE ADAPTIVE SYSTEMS. Thi-Huyen Le; Duc-Long Le; An-Te Nguyen; Dinh-Thuc Nguyen // Proceedings of the IADIS International Conference on WWW/Interne;Jan2009, p295 

    Recently, adaptive systems have been employed in many fields such as e-Commerce, recommender system and e- Learning. In these systems, every user owns a profile to represent his specific individual characteristics. Depending on the different applying field, it contains different information to...

  • ISPs could cash in on security services for UK Internet users. Armitt, Claire // New Media Age;7/14/2005, p11 

    This article reveals that Internet service providers (ISPs) could make profit on security services for Internet users in Great Britain. Half of Internet users in the country would pay their ISPs to protect them from viruses and spam, claims new research from Internet security company Preventon....

  • The politics of net neutrality. Rash, Wayne // eWeek;9/24/2007, Vol. 24 Issue 30, p51 

    The author reflects on the issues concerning the concept of net neutrality in the U.S. He explained that net neutrality refers to the ability of Internet users to reach everything on the Internet. However, he pointed out has the term has been referred to as a requirement for all Internet...

  • An Interview with Alain M. Sadeghi President, Founder and Senior Security Engineer eTechSecurityPro. Sadeghi, Alain M. // Journal of Global Information Technology Management;2006, Vol. 9 Issue 3, p62 

    The article presents an interview with Alain M. Sadeghi, president, founder and senior security engineer at eTechSecurityPro. When asked about the background on the state of information security industry, Sadeghi explains that the greatest strength of Internet is its presence and global...

  • Take These Steps to Protect Your Client from ISP Service Failures. Engebretson, David J. // SDM: Security Distributing & Marketing;Dec2004, Vol. 34 Issue 12, p37 

    The article discusses steps to protect from Internet Service Provider (ISP) service failures. While network technology offers tremendous opportunities for the connection and control of electronic security devices and systems, the ISP broadband connection constitutes the weakest link for remote...

  • PRODUCT FOCUS: Security Equipment.  // Industrial Maintenance & Plant Operation;Oct2005, Vol. 66 Issue 10, p15 

    Evaluates various products for the security systems industry. Capability of the upgraded LucidLink! Wireless Security software developed by Interlink Networks Inc.; Function of the Part Numbers in the Pocket system manufactured by UFP Technologies Inc.; Features of the 540 TV Line security...

  • Packet Inspection on Programmable Hardware. Soewito, Benfano // Computer Engineering & Intelligent Systems;2013, Vol. 4 Issue 2, p59 

    In the network security system, one of the issues that are being discussed is to conduct a quick inspection of all incoming and outgoing packet. In this paper, we make a design packet inspection systems using programmable hardware. We propose the packet inspection system using a Field...

  • Card Is Designed For Online Purchases.  // ATM & Debit News;5/10/2007, Vol. 7 Issue 27, p1 

    The article offers information on an Internet payment and debit card developed by VeriSign Inc. Each of the so-called double-authentication card has a constantly changing security code, which can be accessed by touching a button on the card's back. When a number is provided by a cardholder in an...

  • Blood Vessel Imaging Access Control.  // Security: Solutions for Enterprise Security Leaders;Jan2006, Vol. 43 Issue 1, p10 

    The article features the new VA-100G finger Blood Vessel Authentication System from iAccess Systems Inc. in Long Beach, California. This system has passed the requirements under the Underwriter Laboratory (UL) Specification UL294 intended for Standard Access Control Systems. It has a two-factor...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics