Harnessing Sun’s OpenSSO Authentication and Authorization Mechanisms

  • LANGUAGE: English DATE: Thursday, January 14, 2010 TIME: 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
Upcoming Webinars

It's been several years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and whilst not endorsing any particular platform per se, we acknowledge that there are several products out there that support this today. As part of a whole series of webinars focusing on practical issues and implementation details, this webinar will deeply dive into the implementation of Sun Microsystems OpenSSO.

Moderated by Felix Gaehtgens, our guests Abdi Mohammadi and Dr. Steffo Weber, both from Sun Microsystems, will show how to harness Sun's OpenSSO authentication and authorization mechanisms programmatically from any application (web applications, fat clients etc) via the following mechanisms:

  • HTTP headers
  • REST based web-service
  • SOAP based web-service
  • OpenSSO's proprietary SDK

Abdi and Steffo will demonstrate how to retrieve arbitrary user attributes from within a programme that is almost agnostic when it comes to technical details about the actual access management platform infrastructure (in this case, OpenSSO). Thus, using OpenSSO's identity services does not require much knowledge about OpenSSO. In fact, it is easier to retrieve information from OpenSSO than e.g. from LDAP. Moreover, it can be used from any framework (Java, .Net, PHP, Ruby on Rails - you name it).


Speakers

Steffo Weber currently works as an architect (Identity Management) at Sun. Steffo studied Computing Sciences in Bonn and Dortmund, Germany and holds a Ph.D. in Theoretical Computer Science. He started as a security specialist at debis IT Security Sevices in 1997. In 2000 he started working for...

Watch now

Downloads

Webinar presentation

Video download

Popular Videos

Next Webinar

Webinar

Endpoint Protection Made Easy With Privilege Management

Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.

Next Conference

Congress

European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00