Context Based Authentication
- TYPE: Track START DATE: Wednesday, April 23, 2008 START TIME: 14:00 LOCATION: Antares
Date: Wednesday, April 23, 2008 Time: 14:00-15:00
Putting Context in Identity: Authentication, Authorization and Risk Management
Michel Prompt, Radiant Logic • John Aisien, Oracle Corporation • Steve Neville, Entrust
Gathering context data at the point of authorization helps to minimize risk while allowing fine-grained authorization to occur. Maintaining context state data, and viewing it from different “angles” allows further refinement of the authentication ceremony including steps towards self-service provisioning and authorizations.
Date: Wednesday, April 23, 2008 Time: 15:00-16:00
Putting Context in Identity: Governance, Compliance, Entitlement and Roles
Paul Heiden, BHOLD COMPANY BV • Deepak Taneja, Aveksa • Kevin Cunningham, SailPoint • Chris Sullivan, Courion
Governance facilitates Compliance just as Role management facilitates Entitlement. But context eases the management of both Governance and Roles. Context is key to more automated, less expensive, GRC solutions.
Date: Wednesday, April 23, 2008 Time: 16:30-17:30
Putting Context in Identity: User-Centric Context
Dale Olds, Novell • Johannes Ernst, NetMesh • Robin Wilton, Internet Society
While the context of authentication is also important in the User-centric identity sphere, the added use of context by the user - the choosing of the right persona as evidenced by the multiplicity of user-centric identity devices any one user might have – is an area just beginning to be explored by not only technologists but also sociologists, privacy advocates and legal scholars.
- Registration fee:
- Contact person:
Ms. Bettina Buthmann
+49 211 23 70 77 23
- Apr 22 - 25, 2008 Munich