User Managed Identity & Access

  •  TYPE: Track    START DATE: Wednesday, May 06, 2015     START TIME: 14:30    LOCATION:  AMMERSEE II
Parent Track


On the other side of the rising digital business transformation, there are the individuals in many different roles, like consumers, patients, citizens, clients etc., and their also rising need for privacy and security. Putting humans into full control of their resources and personally identifiable data, which today are scattered across the whole internet, is a fundamental request for privacy in a connected world and already is or sooner or later will be a vital element of most privacy legislations around the world . User empowerment is counterbalancing the digital business and therefore requiring businesses to implement privacy into the fundamental design of their services.   

In this track, we will evaluate all available privacy standards and practices, look at early adopters and put together the building blocks of a user managed digital business world where privacy is integrated by design.  

After attending this block of sessions you will be able to

  • Evaluate all available privacy standards and practices
  • Describe early adopters when it comes to privacy and security
  • Put together building blocks of a user managed digital business world where privacy is integrated by design

This block qualifies for up to  2 Group Learning based CPEs depending on the number of sessions you attended.


Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform

Date: Wednesday, May 06, 2015 Time: 14:30-15:30

Protocol meets Architecture: Patterns for Construction of an OAuth Identity Platform
Pamela Dingle, Microsoft

For the most part, OAuth 2.0 and other REST-based protocols for identity transactions are ratified and ready to use.  But how can they be combined to solve the actual business problem of operating in an identity infrastructure?    This session will cover the top 20 patterns of interaction for SSO, mobile, API, and provisioning use cases, showing how a practical combination of clients and scopes can result in a tightly secured identity architecture that leverages...

OpenID Connect Certification
Dr. Michael B. Jones, Microsoft • Roland Hedberg, ICT Services and System Development (ITS), Umeå University

The OpenID Connect protocol has quickly gained widespread adoption, enabling easy-to-use login and API access for both Web and native applications.  During its development, extensive interoperability testing was performed on a voluntary basis to ensure that different implementations would actually work together.  Now that the OpenID Connect protocol is final, the OpenID Foundation is working to ensure even better interoperation between implementations by creating a...

The Security Stack for Modern Applications: OpenID Connect and OAuth 2.0
Dominick Baier, Thinktecture

We need a modern, mobile first and API friendly security stack for building the current and next generation of applications and services. This includes authentication, authorization and delegated API access. OpenID Connect and OAuth2 provide an unprecedented alignment in providing one unified solution for the above problems and have reached excellent true cross-platform and –vendor adoption in very short time. This talk walks you through the mechanics of the protocols and how they...

Securing Sensitive Data While Enhancing Privacy

Date: Wednesday, May 06, 2015 Time: 15:30-16:30

Securing Sensitive Data While Enhancing Privacy
Daniel Raskin, ForgeRock • Gerry Gebel, Strata Identity, Inc • John Tolbert, KuppingerCole • Karyn Higa-Smith, U.S. Department of Homeland Security • Soren Peter Nielsen, NineConsult • Dr. Michael Garcia, National Institute of Standards and Technology (NIST)

This session will begin with an outline of the common technical elements of privacy regulations. The speakers will provide a high level overview of the OASIS SAML and XACML standards to elucidate how they're used to secure sensitive data, such as government data and intellectual property. The group will describe how standards-based technologies are solving privacy issues through current use cases. The audience will hear about the U.S. Department of Homeland Security's objectives to improve...

Identity Strategy for Innovation

Date: Wednesday, May 06, 2015 Time: 17:30-18:30

Identity Strategy for Innovation
Chema Alonso, Eleven Paths, Telefonica

Facing The Future: Identity Opportunities for Telco Operators
John Bradley, Yubico • Jörg Connotte, Deutsche Telekom AG • Maarten Louman, Qiy • Marco Dütsch, Swisscom • Dr. Adriana Nugter, Independent Senior Consultant • Chema Alonso, Eleven Paths, Telefonica • Philippe Clement, Orange

With the advent of 4G/LTE, mobile operators are facing challenges and opportunities that will shape the future direction of communications for at least the next five to ten years.  Faced with the erosion of revenues from the rapid encroachment of the so-called OTT (over the top) players, such as Apple, Google and many others, into their traditional market strongholds, operators are coming to the increasing realisation that data – ‘big data’ – represents their...


European Identity & Cloud Conference 2015

Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 05 - 08, 2015 Munich, Germany