How the Identity Metasystem will change Everything
- LANGUAGE: English DATE: Thursday, November 13, 2008 TIME: 19:00 - 20:00 CET (10:00am PT, 12:00am MT, 18:00 U
Since a few years, several industry luminaries are trying to define a better way to handle Identity in the Enterprise and on the Internet. What came out of extensive discussions within the industry was the identity metasystem. Microsoft has just released "Geneva", the first version of its implementation of the identity metasystem.
Microsoft has just announced the "Geneva" Claims-based Access Platform, a comprehensive, open and interoperable identity metasystem. Geneva simplifies user access and collaboration across traditional boundaries of the enterprise. It also seamlessly extends identity into cloud services and provides the identity fabric for the new Windows Azure framework.
In a recent webinar, Kuppinger Cole Senior Analyst Felix Gaehtgens presented the latest news about the "Geneva" platform he took from briefings he had during Microsoft´s Professional Developer's Conference. The webinar was heavily booked and participants were asking more questions then could be answered during the time available. We therefore decided to launch another webinar on this subject, focusing on the most important questions asked during the first one.
- How is the Metasystem and Microsoft ´s Geneva Platform relevant for large enterprises?
- What protocols does Geneva support? Can claims be transformed between WS-Trust and SAML 2.0?
- What about compabtibility of CardSpace / Zermatt now and Geneva in future? Can applications based on Zermatt/CardSpace easily be migrated?
- What is the timeline? When will Microsoft Geneva be available for implementation?
- What is Microsoft's strategy about OpenID?
Join this free Webinar to have KCP's Senior Analyst Felix Gaehtgens answer your question on Microsoft´s identity Management product strategy.
Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.