Authorization; Identity Relationships
Facebook Twitter LinkedIn

Authorization; Identity Relationships

Expert Talk
Thursday, May 17, 2018 12:00—13:00
Location: WINTER GARDEN

Identity Solved. What Next? Tackling your Toughest Authorization Challenges

Over the last decade, IT has grown from being a support function to being at the core of any business. Car manufacturers are morphing into transportation service industries; IoT and mobile has evolved from a luxury item for the executive few to an indispensable accessory. Everything is digital: plane tickets, ledgers, medical records, bank accounts, education, credit checks, and even votes in some places.

With so many digital services being offered, so much data being generated, and so many different ways to consume it, it is easy to lose track of who’s got access to what let alone for what purpose. It’s equally hard to know who did access data about you.Yes, this is getting both personal and sensitive. The Equifax breach in 2017 was a stark reminder that collectively, we don’t have things under control: security checks have too often been built as independent silos each with its own access mechanisms.

Dynamic Authorization Management (DAM) can help us keep things under control. In this presentation, David will pull from his experiences over the last decade to illustrate how DAM can help simplify authorization management, enhance traditional access control mechanisms such as RBAC, enable new technologies e.g. microservices, and stay compliant with new rules and regulations such as GDPR and consent management.

The presentation will address existing authorization processes e.g. the joiner-mover-leaver process and how they can be simplified. It will also delve into how Dynamic Authorization Management can be used to enable a smoother, more secure digital transformation strategy by putting controls directly on the data and at the API level while letting business owners decide and implement their own business and authorization rules.

Key Takeaways:

Identity Solved. What Next? Tackling your Toughest Authorization Challenges
Presentation deck
Identity Solved. What Next? Tackling your Toughest Authorization Challenges
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
David Brossard
David Brossard
Axiomatics AB
David is the VP Customer Relations at Axiomatics AB, the leader in externalized authorization management. In his day-to-day job, David helps customers architect authorization solutions that enable...

Authorization for the IoT: The OAuth Device Grant Flow

OAuth is well established as the go to protocol for API security, but there are still a few application types out there that struggle to securely fit into the OAuth story. This includes devices where user input is tricky, where data entry uses a tv remote control, and everyone gets to see you slowly type in your password. Or devices where there is no browser, where the dreaded Resource Owner Password Credentials grant type still reigns.

Finally, there is a solution, with the all new Device flow for OAuth, specially designed for browserless platforms or devices with limited input methods. In this talk we’ll see the device flow in action by extending IdentityServer 4, an open source OpenID Connect and OAuth written in .NET, and look at how it is an improvement on existing solutions using real world scenarios where it should be used.

Key Takeaways:

Authorization for the IoT: The OAuth Device Grant Flow
Presentation deck
Authorization for the IoT: The OAuth Device Grant Flow
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Scott Brady
Scott Brady
Rock Solid Knowledge
Scott Brady is a software developer and Pluralsight author specialising in identity and access management. Focusing on ASP.NET, Scott has increasingly found himself in undocumented territory,...

From Silos and Warehousing to Just-in-time: Disclosing Entity Relations

Even though it may currently seem that solving GDPR challenges is all we need to take care of - there are a few more challenges related to IAM and its infrastructures that need to be solved, whether related to Consumer or Enterprise Identities or IoT Devices and many more contexts.

For sure, there is no 'one size fits it all' solution, but some of the technologies and new paradigms will help shaping tomorrows landscape and its view on identities

Key Takeaways:

Thorsten Niebuhr
Thorsten Niebuhr
WedaCon
With nearly 30 years experience in IT and in the fields of Directory Technologies, Identity Management and Data Privacy, Thorsten is a recognized expert in our industry. As a technical trainer,...
Subscribe for updates
Please provide your email address