Best Practices IV
- TYPE: Track START DATE: Thursday, May 06, 2010 START TIME: 14:00 LOCATION: IMAX
Date: Thursday, May 06, 2010 Time: 14:00-15:00
Login for the Mobile Internet - What new Challenges arise from Mobile Internet Usage?
Michael Gärtner, Deutsche Telekom AG
The steadily growing demand to use internet services also "on the move" pushes the market penetration of mobile devices (such as iPhone, Nexus One) as well as of mobile applications. All service offerings require a user identifcation to be offered in personalized form. A main success factor for the mobile usage is the usability, as the user just wants to use the services "on the move" without special login effort and without any additional registration need. In many...
Bridging Mobile Networks IP Multimedia Subsystem (IMS) and Internet Identity
Jonas Hogberg, Ericsson
Digital Identity has grown separately in IMS and Internet. While the one offers walled garden services the other is focused on openness and third party integration. However, for future Telco-business an inter-working of IMS and Internet is needed. A methodology where real use cases are used shows the benefits for operators, SPs and end-users by bridging these two worlds. These use cases cover the exposure of IMS authentication to Web services, exposure of Web federations to IMS networks and...
Date: Thursday, May 06, 2010 Time: 15:00-16:00
Best Practices for Identity Management from the Annals of Private Banking
In the ever evolving virtual world it is a challenge to define "identity", leave apart managing identities. I will start with the most accepted definition "Identity management is a broad or rather evolving administrative area that deals with identifying individuals in a system (such as a country, a network or an organization) and controlling the access to the resources in that system by placing restrictions on the established identities" . Coming from the private wealth business needless to...
Integration of SAP in a Comprehensive Identity Management Solution for Access and Authorization Control with Enterprise Roles
Rüdiger Berndt, Oxford Computer Group Deutschland • Dr. Uwe Vehlies, Hannover Re
Use of Enterprise roles for SAP and non-SAP applications User provisioning and role assignment via the Identity Management System – connected to Active Directory Identity management Framework for the reduction of management effort for user creation and role assignment Application roles from SAP and in-house developed non-SAP systems can be consolidated within the scope of an Identity management Framework to generate Enterprise roles. The effort involved in provisioning...
Date: Thursday, May 06, 2010 Time: 16:30-17:30
Online Services and Identity Management – Driving Innovations through a Cross Sector Vision
Olivier Maas, Atos Worldline • Vincent Etchebarne, Orange Labs / France Telecom
The FC² project is a French cross-sector initiative formed by private companies (Gemalto, Atos, EADS, Orange…), government and academic actors. The purpose is to implement a comprehensive platform that allows new secure electronic services based on transparent and interoperable Identity Management. During this session, we will share our vision on how digital identity management technologies can boost high value online services for a thriving digital economy and administration....
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 04 - 07, 2010 Munich
The European Identity Conference 2010 is proud to present a large number of partners
How can we help you