1 / 6

Developments and challenges in authentication and authorisation

Developments and challenges in authentication and authorisation. Klaas Wierenga klaas.wierenga@surfnet.nl Amsterdam, October 2 2006. Organisational Challenges. Local identity management Provisioning must be understood both on campus and in applications Managing roles and attributes

neviah
Download Presentation

Developments and challenges in authentication and authorisation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Developments and challenges in authentication and authorisation Klaas Wierenga klaas.wierenga@surfnet.nl Amsterdam, October 2 2006

  2. Organisational Challenges • Local identity management • Provisioning • must be understood both on campus and in applications • Managing roles and attributes • Harmonisation • OSI-layer crossing • Scalability problems (many sources of authority)

  3. Technical Challenges (1) • Horizontal integration • Government federations • Commercial federations (Liberty Alliance, WS-* based) • Across national boundaries • Vertical integration • Web SSO, eduroam, grids • Lightpath provisioning (GLIF), measurement and monitoring (PerfSonar) • E-mail, IM, SIP, SSH

  4. Technical Challenges (2) • External IdP’s • Different levels of authentication • Different levels of authorisation • From authentication to authorisation • Do those enterprise directories really contain authoritative authorisation information? • Security constraints • Policy and technology • N-tier problems • Where are the attributes?

  5. Political and Societal challenges • Privacy • Locally • Within federations • Across Europe • World-wide • Interconnection policies • building federations • bridging federations • Integration of enterprise and federated identity with personal identity • Agreement on consistent approaches to authentication

  6. Players • Cisco • Nortel • Juniper • Sun • M$ • Liberty Alliance • Amazon • OGF • GLIF

More Related