IAM Infrastructure Trends & Concepts

  •  TYPE: Track    START DATE: Wednesday, May 14, 2014     START TIME: 11:00    LOCATION:  AMMERSEE II
Parent Track


IAM has come of age and is now branching out in some very interesting ways.  As organisations strive to provide better control to their protected resources they are increasingly relying on their identity management infrastructure.  SharePoint should rely on AD groups to control access to documents, applications should externalise their authorisation to a central decision point and network devices should dynamically check a user’s permissions before granting access to a sub-net.  This track will explore the ways in which infrastructure is developing to accommodate these trends: how we ensure we collect sufficient identity information to service relying applications, how we grant access to the appropriate identity repositories and how we manage the required interfaces.  We will look at the impact that increased reliance on identity services has on organisations and the changes that we need to anticipate in our infrastructure planning.

Continuing Education Credits

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

After attending this block of sessions you will be able to:

  • Explain how IAM needs to adapt in order to satisfy the needs of the modern business.
  • Explain how identity needs to be woven into the fabric of business services.
  • Describe the state of the market for dynamic authorization standards and technology.
  • Explain the relevance of RBAC and ABAC and how to make Dynamic Authorization Management a success.
  • Describe the Open Source implementation of RBAC – OpenRBAC, and the related LDAP standardisation work.

This block qualifies for up to 2 Group Learning based CPEs depending on the number of sessions you attend.


Killing Identity Management in Order to Save It

Date: Wednesday, May 14, 2014 Time: 11:00-12:00

Killing Identity Management in Order to Save It
Ian Glazer, IDPro

IAM has not kept up with the time and has become less than optimal for modern business. In order to be invaluable, IAM has to radically adapt. This session will discuss: How current IAM is not well suited for the modern business What a truly modern IAM system would include What we as an industry can do to evolve.

Weaving Identity into Business Services - Is this the Future of Identity & Access Management?
Christian Patrascu, Symantec • Kim Cameron, Convergence.tech • Pamela Dingle, Microsoft • Mike Neuenschwander, iC Consult Americas • Ian Glazer, IDPro

The future of IAM is unwritten. Industry leaders will discuss, debate, and debunk potential approaches for IAM to evolve and its new relationship to business.

Dynamic Authorization Management: The Market and its Future

Date: Wednesday, May 14, 2014 Time: 12:00-13:00

Dynamic Authorization Management: The Market and its Future
Graham Williamson, KuppingerCole

In this session, Graham Williamson of KuppingerCole will present on the current state of the Dynamic Authorization Management market based on the brand-new KuppingerCole Leadership Compass document on the subject.  The session will discuss the direction of IAM solutions to externalise their authentication and authorisation decisions to a centrally managed decision point.  The presentation will advise on the direction various vendors have taken and the degree to which standards such...

RBAC, ABAC, or Both?
Finn Frisch, Axiomatics • Patrick Parker, EmpowerID • Allan Foster, Chief Evangelist • Peter Gietz, DAASI International GmbH • Geoff Webb, NetIQ • Ian Glazer, IDPro

There is an ongoing discussion about terms such as RBAC (Role Based Access Control) and ABAC (Attribute Based Access Control). However, is it really about either-or? Or isn’t it that most role concepts take other attributes such as the Organizational Unit into account, while the role is a major attribute for most ABAC concepts? Shouldn’t the discussion be more about the question on how to make the shift from Static Access Management, based on pre-determined ACLs (Access Control...

OpenRBAC: Why using an LDAP based Backend for Role Based Access Control Information
Peter Gietz, DAASI International GmbH

OpenRBAC is an open source implementation of the ANSI standard RBAC. It uses OpenLDAP as backend for storing information on user, roles, resources, priviledges, etc. This has a number of advantages and only very few limitations. Access decisions can be retrieved by simple ldap searches so that a OpenRBAC based Policy Decison Point can answer ten thousands of such queries per seconds. Since two other RBAC software products use LDAP, currently work is being done...


European Identity & Cloud Conference 2014

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 13 - 16, 2014 Munich, Germany