How the Identity Metasystem will change Everything
- LANGUAGE: English DATE: Thursday, November 13, 2008 TIME: 19:00 - 20:00 CET (10:00am PT, 12:00am MT, 18:00 U
Since a few years, several industry luminaries are trying to define a better way to handle Identity in the Enterprise and on the Internet. What came out of extensive discussions within the industry was the identity metasystem. Microsoft has just released "Geneva", the first version of its implementation of the identity metasystem.
Microsoft has just announced the "Geneva" Claims-based Access Platform, a comprehensive, open and interoperable identity metasystem. Geneva simplifies user access and collaboration across traditional boundaries of the enterprise. It also seamlessly extends identity into cloud services and provides the identity fabric for the new Windows Azure framework.
In a recent webinar, Kuppinger Cole Senior Analyst Felix Gaehtgens presented the latest news about the "Geneva" platform he took from briefings he had during Microsoft´s Professional Developer's Conference. The webinar was heavily booked and participants were asking more questions then could be answered during the time available. We therefore decided to launch another webinar on this subject, focusing on the most important questions asked during the first one.
- How is the Metasystem and Microsoft ´s Geneva Platform relevant for large enterprises?
- What protocols does Geneva support? Can claims be transformed between WS-Trust and SAML 2.0?
- What about compabtibility of CardSpace / Zermatt now and Geneva in future? Can applications based on Zermatt/CardSpace easily be migrated?
- What is the timeline? When will Microsoft Geneva be available for implementation?
- What is Microsoft's strategy about OpenID?
Join this free Webinar to have KCP's Senior Analyst Felix Gaehtgens answer your question on Microsoft´s identity Management product strategy.
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.