SAML is dead. Long Live SAML!
- LANGUAGE: English DATE: Friday, September 14, 2012 TIME: 16:00 CEST, 10am EDT
With the Cambrian Explosion of Everything upon us, the number of devices, identities, assertions and connections is outstripping traditional technologies to manage SSO. The most used underlying protocol to manage SSO and Federated Naming has been the Security and Access Markup Language (SAML) protocol. The problem is, all of the management solutions built using SAML require SSO provisioning to be started, maintained and ended by a system administrator. SAML--in its current state--has no mechanism to allow for programmatic automation to be implemented. This leads to the question of whether SAML has already been relegated to a legacy that cannot be revived--or not. Join us for a discussion of the issues around this highly relevant and important topic.
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.