Putting Context in Identity: Authentication, Authorization and Risk Management
Facebook Twitter LinkedIn

Putting Context in Identity: Authentication, Authorization and Risk Management

Combined Session
Wednesday, April 23, 2008 14:00—15:00
Location: Antares

Gathering context data at the point of authorization helps to minimize risk while allowing fine-grained authorization to occur. Maintaining context state data, and viewing it from different “angles” allows further refinement of the authentication ceremony including steps towards self-service provisioning and authorizations.

John Aisien
John Aisien
Oracle Corporation
John is the lead member of the outbound product management team that drives sales and adoption of Oracle Fusion Middleware within the Europe, Middle East and Africa (EMEA) region. Oracle Fusion...
Steve Neville
Steve Neville
Entrust
Michel Prompt
Michel Prompt
Radiant Logic
Michel is a world-renowned software developer, and a serial entrepreneur. He is the CEO and co-founder of Radiant Logic. In the IAM space, he is the co-inventor of the virtual directory category...
Subscribe for updates
Please provide your email address