Identity - Best Practice II

  • TYPE: Combined Session DATE: Wednesday, May 15, 2019 TIME: 15:30-16:30 LOCATION: ALPSEE


In these tempestuous times, Mobile Operators (MNOs) and the mobile industry are increasingly exploring ways in which they can help customers transact more safely online, and in particular through the provision of:
- Authentication services
- Identity claims verification (GDPR)
- PSD2-compliant authorisation services
- Network signals for mitigating fraud
- Secure conversational commerce (chatbots)
- Identity wallet/agent services

This presentation will provide an update on the worldwide Mobile Connect initiative active today, the pivotal role of identity within conversational commerce facilitated by RCS (chatbots), the importance of an identity layer in next generation systems (5G, IoT) and the likely roles for MNOs in the decentralised identity frameworks of tomorrow.


David Pollington is the Head of Services at the GSMA, providing technical & strategic steer on identity across a number of GSMA's programmes including Mobile Connect (a worldwide x-MNO authentication & identity initiative), IoT and RCS (business messaging). Prior to joining the...

BYO-Scenarios promise borderless collaboration at low cost for employees, external staff, partners, customers and guests. We will take a brief look at these promises and do some reality-check on limitations and consequences.

Key topics:

  • Short check: Usability of Bring-your-own-Identity
  • Compliance and some legal aspects: How much do we need to know?
  • Some limitations given by cloud-providers and license agreements
  • From encapsulated micro-environments to zero-trust-patterns: the hidden costs of BYO-Scenarios


Eleni Richter is working as chief architect of the identity and organizational data management at EnBW and as lecturer in IAM at Lucerne University of Applied Sciences and Arts. She has been working for more than 18 years in different positions at EnBW: IT-security-manager, IT consultant,...

Have you ever thought of a better way to do role modelling?
The goal of this presentation is to show how Big Data analysis can be used to obtain a different and effective way of role modelling. Just like in traditional role mining, we take entitlement data from the source applications, but apply tools from the Big Data “world” and use these for analyzing the data.
By comparing accounts and entitlements by definition of their similarity, it is possible to make a visual presentation indicating logical groupings of accounts and entitlements, and use the visualizations to present the actual data to the business.
Hereby we can make a model showing what could be a proper role mining scheme for the actual entitlement data.

Key takeaways:
(1) a strict way to define account and entitlement similarity
(2) a proposal for visualization of logical groups of accounts and entitlements based on real data
(3) an analytical approach for combining a top-down and bottom-up approach in role mining


Thomas has a master in Computer Science and has many years of experience implementing Identity Management (IdM) and Access Management (AM) as well as ERP systems. The work covers design, data modelling, data migration, data quality assurance and project management. The variety in the projects...

Log in to download presentations:  


Session Links

Munich, Germany


European Identity & Cloud Conference 2019

Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2019 Munich, Germany