This article doesn't discuss identity in the theoretical sense, but rather, identity in the technical sense, with respect to system security. How do you manage access, for example, for Jenny, a person who changes campus but who needs to continue collaboration with the same team for her PhD research? The article describes a five-level maturity model presented by identity expert Ian Glazer from Salesforce at the recent Internet2 conference, beginning with the idea of basic identity management, then protection from internal users, then bulk attacks, focused 'single-row' attacks, and finally, transparency of data access.In the case of Jenny, above, Internet2's InCommon identity management federation links 600 universities together, and last year, InCommon joined eduGAIN, a collection of some 40 identity networks worldwide. Meanwhile, Glazer and colleagues are forming an association for identity professionals called IDPro, which will deal with these and related issues.
Today: 1 Total: 19 [Share]
] [View full size