Managing Identites at Scale
Facebook Twitter LinkedIn

Managing Identites at Scale

Combined Session
Thursday, May 17, 2018 12:00—13:00
Location: AMMERSEE II

Inferring User Identity

The outdated myth that a single human being controls a single account on your Internet service is no longer adequate to understand who is using your system for which purpose. We model identity in three tiers. The "group" tier includes households, families, companies, and other social circles of people who are connected in some way. The "human being" tier is our best-guess, frequently-changing approximation of the human being that may be using our system at the moment. The "account" tier is the user account that was used to authenticate this user. In this talk we explain how some of these approximations are currently inferred, and which behaviors give insights into probabilities associated with the probabilities / weights of each inferred link.

Key Takeaways:

Dr. Mitchell Wyle
Dr. Mitchell Wyle
eBay Inc.
Mitchell Wyle completed his doctorate in Computer Science in 1994. He spent 15 years in Silicon Valley before moving to Seattle Washington. Mr. Wyle worked at Microsoft for 10 years before joining...

Adopting BYOID through CIAM Technologies

By recent identity flood, end-users in organizations do not wish to have additional identities(especially username and password) for their companies or universities anymore. This makes them to reduce their end-user satisfactions and royalities and sometimes make them to use shadow IT which may have security risk for the organizations.

In addition, for many organizations e-mail is not suitable communicating tool anymore especially for younger age, because they are used to use social network tools like twitter/facebook to communicate each other.

But in the same time, it is true that IT admins are still required to manage employees' or students' identities in organizations for internal audit and security.

In this talk, I would like introduce possibilities to solve this dilemma for organizations by BYOID(Bring Your Own Identities) with CIAM technologies with some demo using Microsoft Azure Active Directory B2C.

Key Takeaways:

Adopting BYOID through CIAM Technologies
Presentation deck
Adopting BYOID through CIAM Technologies
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Naohiro Fujie
Naohiro Fujie
Itochu Techno-Solutions Corporation
Naohiro Fujie, Deputy General Manager at Itochu Techno-Solutions Corporation(CTC), has spent more than 15 years in the IT industry and primary focused on Enterprise Identity & Access Management...
Subscribe for updates
Please provide your email address