How to Build your IAM/IAG Infrastructure the Right Way – and Support Business Today

  •  TYPE: Track    START DATE: Wednesday, May 15, 2013     START TIME: 14:00    LOCATION:  AMMERSEE 2
Conference Agenda


Many organizations currently are in the situation that they, on one hand, still have to do some homework in building their underlying IAM/IAG (Identity and Access Management/Governance) infrastructure. Implementing directories for internals and externals, implementing Identity Provisioning and Access Governance, Single Sign-On, etc. are things which frequently still need to be done. On the other hand there is the need to support new business requirements for instance for on-boarding of externals or managing access to cloud services today. This leads to the art of supporting business needs and agility today without losing focus.

Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block you will be able to:

  • List the Four P´s of IAM/IAG in the Extended Enterprise and explain why these are important to success
  • Explain how to move forward with IAM/IAG to support the enterprise requirements and to deal with all types of third parties in a consistent way
  • Describe how and organization created customer portals with sensitive personal data without compromising security
  • Describe specific ways in which organizations can improve their DLP practices in order to help prevent both accidental and malicious losses of sensitive information
  • Describe the important old and new ID protocols and explain the pros and cons of each of them
  • Explain whether, how, and with which systems to integrate Privilege Management from both a technical and process perspective
  • List the major Open Source products that are useful in IdM projects and describe their functionality
  • Describe a system used for the Federation of non-Web-based Services in the State of Baden-Württemberg

This block qualifies for up to 5 Group Learning based CPEs depending on the number of sessions you attend.


OASIS Panel: ID Protocols – Out with the Old and in with the New?

Date: Wednesday, May 15, 2013 Time: 14:00-15:00

OASIS Panel: ID Protocols – Out with the Old and in with the New?
Darran Rolls, KuppingerCole / Cloud 10 • Dr. Michael B. Jones, Microsoft • David Brossard, Axiomatics AB • Craig Burton, KuppingerCole • Dr. Paul Madsen, Ping Identity

Have you ever wondered whether old ID Protocols should coexist with new ones or simply get out of their way?  Familiarizing yourself with the ins and outs of cloud identity and the use of different sets of protocols is a huge challenge.  Confusion seems to be elevated because the technologies are evolving, and do overlap in some cases, and maybe even fit together in a few different ways.  There is debate over the pros and cons of overlapping technologies such as Security...

It is not only about Root – Integrating Privilege Management with the Rest of IAM

Date: Wednesday, May 15, 2013 Time: 15:00-16:00

It is not only about Root – Integrating Privilege Management with the Rest of IAM
Philip Lieberman, Lieberman Software • Jonathan Cogley, Thycotic Software • Dr. Ravindar Bindra, Novartis AG

Privilege Management, also called PxM (with the x for Access, Account, Identity, or User) is a key discipline within IAM. It is about protecting information and system against accidental and willingly abuse by privileged users. This is about high-privilege users like administrators and operators, but also about shared accounts including the technical and functional accounts. On the other hand, there are highly privileged business users which are typically managed by Access Governance...

Open Source Identity Management

Date: Wednesday, May 15, 2013 Time: 17:00-18:00

Open Source Identity Management
Peter Gietz, DAASI International GmbH

Since Identity Management Systems have always to be integrated into existing IT landscapes the flexibility provided by Open Source products has proven to be very useful in IdM projects. The presentation will highlight such Open Source advantages and will then showcase some products: ForgeRock´s OpenAM for securing mobile applications, OpenLDAP for setting up highly scalable Metadirectories and authentication services, Shibboleth for federated SSO based on the SAML standard, and some...

Next-Gen IAM with Commercial Open Source
Daniel Raskin, ForgeRock

Now SAML takes it all: Federation of non Web-based Services in the State of Baden-Württemberg
Sebastian Labitzke, Karlsruhe Institute of Technology (KIT)

Today, the Security Assertion Markup Language (SAML) is widely used to implement identity and service providers (for instance, Shibboleth and OpenSAMLphp), which provide organizational and cross-organizational service access, as well as, single sign-on. From the perspective of a service provider, the main reasons for the extensive use of SAML-based authentication and attribute delivery are probably the simple integration of web-based services and the increased quality of identity information...


European Identity & Cloud Conference 2013

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2013 Munich/Germany