SlideShare ist ein Scribd-Unternehmen logo
1 von 95
Downloaden Sie, um offline zu lesen
WHAT IF IDENTITY WERE
PASS-BY-REFERENCE?
WHAT IF IDENTITY WERE
PASS-BY-REFERENCE?
A drama in text messages
HI, I'M BOB
I'M INTHE DRAMA
DEPARTMENT
I'M INTHE DRAMA
DEPARTMENT
At Citibank
WATCH THIS.
SHORT ATTENTION SPAN
SUMMARY
SHORT ATTENTION SPAN
SUMMARY
Passing a pointer to your identity
is a better idea
than passing your identity
TELL ME MORE...
TELL ME MORE...
I hear you cry
TEXTINGTHE CAR
DEALER
I'd like a car
I'd like a car
I have a Cadillac STS for
$32,000
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I can do that
TEXTINGTHE CAR DEALER
TEXTINGTHE CAR DEALER
If Identity Architects sold cars
I'd like a car
I'd like a car
That will be $52,000
I'd like a car
That will be $52,000
Here you go
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
It comes with a vinyl wrap
advertisingThe Gap.
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
It comes with a vinyl wrap
advertisingThe Gap.
And the radio plays Fox
News
YOUTHINK I'M BEING MEAN
YOUTHINK I'M BEING MEAN
DON'TYOU?
I'd like a social media
account
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
But you didn't hear that
from me. Tell them
Snowden told you.
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
But you didn't hear that
from me. Tell them
Snowden told you.
Seriously.
WHAT DOESTHE CAR DEALER KNOW...
WHAT DOESTHE CAR DEALER KNOW...
THATTHE IDENTITY ARCHITECT DOESN'T?
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I can do that
WHAT DOESTHE CAR DEALER KNOW...
THATTHE IDENTITY ARCHITECT DOESN'T?
The car dealer knows how to deal with counteroffers
TEXTINGTHE SERVICE PROVIDER
TEXTINGTHE SERVICE PROVIDER
If Identity Architects understood counteroffers
Identify me. Use this
@address and this #token
Identify me. Use this
@address and this #token
OK. Hang on
Identify me. Use this
@address and this #token
OK. Hang on
...
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
WAIT, WHAT?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
LIKE, ZOMG, RIGHT?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
MIND. BLOWN.
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Deal. Stephen Falken,Tiny
Island, Oregon
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Deal. Stephen Falken,Tiny
Island, Oregon
OK, but...
How do I know the guy who
sent me the token is really
Falken?
Send him this #challenge.
if he replies with this
#response, it's him.
How do I know the guy who
sent me the token is really
Falken?
Send him this #challenge.
if he replies with this
#response, it's him.
How do I know the guy who
sent me the token is really
Falken?
KTHXBAI
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
Greetings, Professor Falken.
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
Greetings, Professor Falken.
...
Would you like to play a
game?
API
IDENTITY
CONSUMER
identify_me()
IDENTITY
CONSUMER
identify_me()
IDENTITY
PRODUCER
identify_subject()
IDENTITY
CONSUMER
identify_me()
IDENTITY
PRODUCER
identify_subject()
SUBJECT
challenge()
PROTOCOL
IDC.identify_me
(*IDP, subject_token)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
response_token
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
response_token
RINSE AND REPEAT FOR NEGOTIATION
USE CASES
IDP =
subject
IDC
FIRST-PARTY REGISTRATION
IDP =
subject
IDC
FIRST-PARTY AUTHENTICATION
subject IDC
THIRD-PARTY REGISTRATION
IDP
subject IDC
THIRD-PARTY AUTHENTICATION
IDP
BENEFITS
No identity information is exchanged
until terms of use are negotiated
Both users and Identity Consumers
can state terms and negotiate
Phishing defense
via authentication of Identity Consumers
Simple, minimal "webdevified" API and protocol
Anonymity, pseudonymity, and "real names"
are supported using a single API and protocol
First- and third-party identity producers
are supported using a single API and protocol
Registration and authentication
are supported using a single API and protocol
BOB.BLAKLEY @ CITI.COM
THANK YOU
I'LL BE HAPPYTO ANSWERYOUR QUESTIONS

Weitere ähnliche Inhalte

Andere mochten auch

CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CloudIDSummit
 
CIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCloudIDSummit
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCloudIDSummit
 
Strings and common operations
Strings and common operationsStrings and common operations
Strings and common operationsTurnToTech
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed AccessCloudIDSummit
 
Pass by value and pass by reference
Pass by value and pass by reference Pass by value and pass by reference
Pass by value and pass by reference TurnToTech
 
CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CloudIDSummit
 
Why C is Called Structured Programming Language
Why C is Called Structured Programming LanguageWhy C is Called Structured Programming Language
Why C is Called Structured Programming LanguageSinbad Konick
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCloudIDSummit
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in ActionCloudIDSummit
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCloudIDSummit
 
CIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCloudIDSummit
 

Andere mochten auch (14)

CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
 
CIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about It
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
 
Strings and common operations
Strings and common operationsStrings and common operations
Strings and common operations
 
CIS14: Id.me
CIS14: Id.meCIS14: Id.me
CIS14: Id.me
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed Access
 
Pass by value and pass by reference
Pass by value and pass by reference Pass by value and pass by reference
Pass by value and pass by reference
 
CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)
 
Why C is Called Structured Programming Language
Why C is Called Structured Programming LanguageWhy C is Called Structured Programming Language
Why C is Called Structured Programming Language
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
MFT_SOASuite_Pass_by_reference
MFT_SOASuite_Pass_by_referenceMFT_SOASuite_Pass_by_reference
MFT_SOASuite_Pass_by_reference
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
CIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCIS14: Google's Identity Toolkit
CIS14: Google's Identity Toolkit
 

Ähnlich wie CIS13 - What if Identity Was Pass-By-Reference?

Ten Things
Ten ThingsTen Things
Ten Thingslotrom
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't AskBillen
 
Skip the date quick start
Skip the date quick startSkip the date quick start
Skip the date quick startskipthedate
 
No One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNo One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNanaYaw1234
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointjehovahroi
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointcccbasel
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome PowerpointKay Antoine
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontaskkeji
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't Asknath
 
Ten Things
Ten ThingsTen Things
Ten Thingstabeer
 
Ten Things GOD won't ask on that day
Ten Things GOD won't ask on that dayTen Things GOD won't ask on that day
Ten Things GOD won't ask on that daykashif Anwer
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointguestc1633a3
 
10 THINGS GOD WON\'T ASK...
10 THINGS GOD WON\'T ASK...10 THINGS GOD WON\'T ASK...
10 THINGS GOD WON\'T ASK...FIREMONKEY44
 
Awesome powerpoint
Awesome powerpointAwesome powerpoint
Awesome powerpointapril45
 

Ähnlich wie CIS13 - What if Identity Was Pass-By-Reference? (20)

Ten Things (Extd)
Ten Things (Extd)Ten Things (Extd)
Ten Things (Extd)
 
Ten Things
Ten ThingsTen Things
Ten Things
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't Ask
 
God Wldnt Ask
God Wldnt AskGod Wldnt Ask
God Wldnt Ask
 
Skip the date quick start
Skip the date quick startSkip the date quick start
Skip the date quick start
 
No One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNo One Can Make You Serve Customers Well
No One Can Make You Serve Customers Well
 
What god will not ask u about
What god will not ask u aboutWhat god will not ask u about
What god will not ask u about
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontask
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontask
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't Ask
 
Ten Things
Ten ThingsTen Things
Ten Things
 
Ten Things GOD won't ask on that day
Ten Things GOD won't ask on that dayTen Things GOD won't ask on that day
Ten Things GOD won't ask on that day
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
10 THINGS GOD WON\'T ASK...
10 THINGS GOD WON\'T ASK...10 THINGS GOD WON\'T ASK...
10 THINGS GOD WON\'T ASK...
 
Awesome
AwesomeAwesome
Awesome
 
Awesome powerpoint
Awesome powerpointAwesome powerpoint
Awesome powerpoint
 
Awesome powerpoint
Awesome powerpointAwesome powerpoint
Awesome powerpoint
 

Mehr von CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Mehr von CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

CIS13 - What if Identity Was Pass-By-Reference?