Harnessing Sun’s OpenSSO Authentication and Authorization Mechanisms

  • LANGUAGE: English DATE: Thursday, January 14, 2010 TIME: 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
Upcoming Webinars

It's been several years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and whilst not endorsing any particular platform per se, we acknowledge that there are several products out there that support this today. As part of a whole series of webinars focusing on practical issues and implementation details, this webinar will deeply dive into the implementation of Sun Microsystems OpenSSO.

Moderated by Felix Gaehtgens, our guests Abdi Mohammadi and Dr. Steffo Weber, both from Sun Microsystems, will show how to harness Sun's OpenSSO authentication and authorization mechanisms programmatically from any application (web applications, fat clients etc) via the following mechanisms:

  • HTTP headers
  • REST based web-service
  • SOAP based web-service
  • OpenSSO's proprietary SDK

Abdi and Steffo will demonstrate how to retrieve arbitrary user attributes from within a programme that is almost agnostic when it comes to technical details about the actual access management platform infrastructure (in this case, OpenSSO). Thus, using OpenSSO's identity services does not require much knowledge about OpenSSO. In fact, it is easier to retrieve information from OpenSSO than e.g. from LDAP. Moreover, it can be used from any framework (Java, .Net, PHP, Ruby on Rails - you name it).


Speakers

Steffo Weber currently works as an architect (Identity Management) at Sun. Steffo studied Computing Sciences in Bonn and Dortmund, Germany and holds a Ph.D. in Theoretical Computer Science. He started as a security specialist at debis IT Security Sevices in 1997. In 2000 he started working for...

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00