SAML is dead. Long Live SAML!

  • LANGUAGE: English DATE: Friday, September 14, 2012 TIME: 16:00 CEST, 10am EDT
Upcoming Webinars
Is SAML a dead protocol or just a walking Zombie ready to consume all enterprise brains? Or is it yet alive and well both in legacy and the future? Attend this webinar to join the discussion KuppingerCole´s Distinguished Analyst Craig Burton about health and well being of the Federated sign-on protocol of choice -- SAML.

With the Cambrian Explosion of Everything upon us, the number of devices, identities, assertions and connections is outstripping traditional technologies to manage SSO. The most used underlying protocol to manage SSO and Federated Naming has been the Security and Access Markup Language (SAML) protocol. The problem is, all of the management solutions built using SAML require SSO provisioning to be started, maintained and ended by a system administrator. SAML--in its current state--has no mechanism to allow for programmatic automation to be implemented. This leads to the question of whether SAML has already been relegated to a legacy that cannot be revived--or not. Join us for a discussion of the issues around this highly relevant and important topic.


Speakers

As the creator of breakthrough concepts like NetWare Open Systems, The Network Services Model, metadirectory, and The Internet Services Model, Craig Burton is one of the leading visionaries and analysts in the computing industry. He is a frequently consulted expert on new technologies and the...

Pamela Dingle is a Senior Technical Architect within the Office of the CTO at Ping Identity. Pamela has a long history with Identity Management, working as an implementer and moving into architecture and strategy over 10 years of evolution of systems such as directories, application servers, web...

Watch now

Downloads

Webinar Presentation

Webcast download

Popular Webcasts

Next Webinar

Webinar

You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Next Conference

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Next Seminar

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00