Consumer Identity III
- TYPE: Track START DATE: Thursday, May 17, 2018 START TIME: 11:00 LOCATION: AMMERSEE II
Date: Thursday, May 17, 2018 Time: 11:00-12:00
Identity Systems at Scale: The Value of Standards, Certification, Trust Frameworks & Registration
Don Thibeau, OpenID Foundation
Open standards like HTTP, OAuth, and OpenID Connect allow competing organizations to add value to their services, platforms, and products by ensuring interoperability across commercial, banking and government ecosystems. Open standards can be a powerful tool set for developers. But identity systems require rules that address liability as well as ensure technical conformance. This presentation is a pragmatic look at ensuring conformance to open standards via self-certification using the...
When Standards don't Suffice
George Fletcher, Verizon Media Group
Implementing or moving to standards is rarely a straight forward effort; rather, the specific use cases of an organization require often more than current standards address. In the face of this gap, it's important to have a process for evaluating when and how to extend existing standards. In this talk we will cover this process in the context of real life examples. Key Takeaways: process to evaluate a use case's applicability to existing standards method/principles for...
Improving Security and User Experience Using Open Standards
Alex Simons, Microsoft Identity Division
Date: Thursday, May 17, 2018 Time: 12:00-13:00
Inferring User Identity
Dr. Mitchell Wyle, eBay Inc.
The outdated myth that a single human being controls a single account on your Internet service is no longer adequate to understand who is using your system for which purpose. We model identity in three tiers. The "group" tier includes households, families, companies, and other social circles of people who are connected in some way. The "human being" tier is our best-guess, frequently-changing approximation of the human being that may be using our system at the moment. The "account" tier is...
Adopting BYOID through CIAM Technologies
Naohiro Fujie, Itochu Techno-Solutions Corporation
By recent identity flood, end-users in organizations do not wish to have additional identities(especially username and password) for their companies or universities anymore. This makes them to reduce their end-user satisfactions and royalities and sometimes make them to use shadow IT which may have security risk for the organizations. In addition, for many organizations e-mail is not suitable communicating tool anymore especially for younger age, because they are used to use social...
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 15 - 18, 2018 Munich, Germany