SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Domestication of Applications
Use carrots or sticks?

Harold Teunissen et al. – SURFnet
I2FMM10 – 3 November 2010
2
3
Domestication
    -  Domestication fits nicely in the Service Oriented
       Architecture paradigm where a platform is created
       for reusable services and service components
    -  Domestication can be described as the process of
       externalizing authentication, authorization and
       group management from services
    -  It becomes easier to share (generic) information
       among services and to replace similar services
    -  It is only useful in multi-domain collaboration or
       enterprise environments à hence (delegation of)
       trust is a point of concern




4   Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
Domestication (2)
    -  Domesticated applications enable single sign-on
       features for users, as well as the ability to share
       group context between multiple applications
    -  Main Candidates
        -  Identity and access control
        -  Group management
        -  Events like presence and activities
        -  Perhaps Monitoring and Reporting and
           messaging?




5   Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
Strategies
    -  Create economy of scale to create a valid business
       case for Service Providers
    -  Do it yourself
    -  Need for standardized interfaces, APIs and
       availability of libraries
    -  Need to deal with trust




6   Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
End User Perpective
    -  Pro
        -  Single Sign On
        -  One password (and identity) for multiple
           services
    -  Cons
        -  WAYF – where are you from
        -  Service might ask again and again your profile
           information etc.




7   Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
Service Provider Perspective
    -  Pros
        -  Validated and up-to-date (user) information
        -  Focus on core business
        -  Reduction of administrative overhead – no more “I
           lost my password”
        -  Economy of scale (after initial investment – adding
           new organisations is easy
    -  Cons
        -  Most services already provide a solution for the
           generic functionality (needs to combined with legacy
           generic functionality)
        -  Invest in APIs in an unknown technology territory



8   Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
Organsational Perspective
    -  Pros
        -  In control – one set of credentials for all services
        -  Happy and secure users
    -  Cons
        -  None?
    -  Prerequisites
        -  Get your Identity Management on track
        -  Get organized – convince service providers to
           become domesticated




9   Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
Get more here
     -  Outline:             surfnet.nl/coin
     -  Wiki:                wiki.surfnetlabs.nl
     -  Blog:                projectcoin.surfnet.nl


     -  Twitter:             #projectcoin


     -  OpenSocial enterprise whitepaper: opensocial.org




10   Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta

Weitere ähnliche Inhalte

Ähnlich wie Domestication of Apps: SSO and Group Sharing

Jvg Media An Insight Into Intranet
Jvg Media   An Insight Into IntranetJvg Media   An Insight Into Intranet
Jvg Media An Insight Into IntranetPartha Roy Chowdhury
 
Private Cloud Platform as a Service
Private Cloud Platform as a ServicePrivate Cloud Platform as a Service
Private Cloud Platform as a ServiceJim Kaskade
 
Fiorano ESB: Integration Solution for Banks
Fiorano ESB: Integration Solution for BanksFiorano ESB: Integration Solution for Banks
Fiorano ESB: Integration Solution for BanksAshraf Imran
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET Journal
 
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...CA Technologies
 
Cisco Domain Ten solution overview
Cisco Domain Ten solution overviewCisco Domain Ten solution overview
Cisco Domain Ten solution overviewCharles Malkiel
 
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...mfrancis
 
Tech Leaders of DFW presentation by Mirza Chughtai, April 2018
Tech Leaders of DFW presentation by Mirza Chughtai, April 2018Tech Leaders of DFW presentation by Mirza Chughtai, April 2018
Tech Leaders of DFW presentation by Mirza Chughtai, April 2018Rob McIntosh
 
IOT Paris Seminar 2015 - Connected Objects makers, How to deal with Data?
IOT Paris Seminar 2015 - Connected Objects makers, How to deal with Data?IOT Paris Seminar 2015 - Connected Objects makers, How to deal with Data?
IOT Paris Seminar 2015 - Connected Objects makers, How to deal with Data?MongoDB
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
PortHand Overview August 2013
PortHand Overview August 2013PortHand Overview August 2013
PortHand Overview August 2013PortHand
 
Private Social & Computing Platform
Private Social & Computing PlatformPrivate Social & Computing Platform
Private Social & Computing PlatformSampurna Lahiri
 
Domino/Notes 9.0 upgrade to take advantage of NFL, WFL and CORS technologies
Domino/Notes 9.0 upgrade to take advantage of NFL, WFL and CORS technologiesDomino/Notes 9.0 upgrade to take advantage of NFL, WFL and CORS technologies
Domino/Notes 9.0 upgrade to take advantage of NFL, WFL and CORS technologiesAndrew Luder
 

Ähnlich wie Domestication of Apps: SSO and Group Sharing (20)

Jvg Media An Insight Into Intranet
Jvg Media   An Insight Into IntranetJvg Media   An Insight Into Intranet
Jvg Media An Insight Into Intranet
 
Private Cloud Platform as a Service
Private Cloud Platform as a ServicePrivate Cloud Platform as a Service
Private Cloud Platform as a Service
 
Fiorano ESB: Integration Solution for Banks
Fiorano ESB: Integration Solution for BanksFiorano ESB: Integration Solution for Banks
Fiorano ESB: Integration Solution for Banks
 
What is IHAN® project all about in technical matter?
What is IHAN® project all about in technical matter?What is IHAN® project all about in technical matter?
What is IHAN® project all about in technical matter?
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud Services
 
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
 
FIRE and FI-PPP
FIRE and FI-PPPFIRE and FI-PPP
FIRE and FI-PPP
 
Cisco Domain Ten solution overview
Cisco Domain Ten solution overviewCisco Domain Ten solution overview
Cisco Domain Ten solution overview
 
ICC Data and Device management
ICC Data and Device managementICC Data and Device management
ICC Data and Device management
 
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
Keynote - The Benefits of an Open Service Oriented Architecture in the Enterpr...
 
Tech Leaders of DFW presentation by Mirza Chughtai, April 2018
Tech Leaders of DFW presentation by Mirza Chughtai, April 2018Tech Leaders of DFW presentation by Mirza Chughtai, April 2018
Tech Leaders of DFW presentation by Mirza Chughtai, April 2018
 
SSEIIF SA
SSEIIF SASSEIIF SA
SSEIIF SA
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 
59
5959
59
 
59
5959
59
 
IOT Paris Seminar 2015 - Connected Objects makers, How to deal with Data?
IOT Paris Seminar 2015 - Connected Objects makers, How to deal with Data?IOT Paris Seminar 2015 - Connected Objects makers, How to deal with Data?
IOT Paris Seminar 2015 - Connected Objects makers, How to deal with Data?
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
PortHand Overview August 2013
PortHand Overview August 2013PortHand Overview August 2013
PortHand Overview August 2013
 
Private Social & Computing Platform
Private Social & Computing PlatformPrivate Social & Computing Platform
Private Social & Computing Platform
 
Domino/Notes 9.0 upgrade to take advantage of NFL, WFL and CORS technologies
Domino/Notes 9.0 upgrade to take advantage of NFL, WFL and CORS technologiesDomino/Notes 9.0 upgrade to take advantage of NFL, WFL and CORS technologies
Domino/Notes 9.0 upgrade to take advantage of NFL, WFL and CORS technologies
 

Mehr von Harold Teunissen

Transformation in Higher Education using ICT
Transformation in Higher Education using ICTTransformation in Higher Education using ICT
Transformation in Higher Education using ICTHarold Teunissen
 
In de wolken - dat mag wat kosten?
In de wolken - dat mag wat kosten?In de wolken - dat mag wat kosten?
In de wolken - dat mag wat kosten?Harold Teunissen
 
From Cubes to Spheres — The transition of higher education towards the cloud.
From Cubes to Spheres — The transition of higher education towards the cloud.From Cubes to Spheres — The transition of higher education towards the cloud.
From Cubes to Spheres — The transition of higher education towards the cloud.Harold Teunissen
 
DDOS – a Nuisance or Threat?
DDOS – a Nuisance or Threat?DDOS – a Nuisance or Threat?
DDOS – a Nuisance or Threat?Harold Teunissen
 
The chasm of cyberinfrastructures
The chasm of cyberinfrastructuresThe chasm of cyberinfrastructures
The chasm of cyberinfrastructuresHarold Teunissen
 
Collaboration is Happening
Collaboration is HappeningCollaboration is Happening
Collaboration is HappeningHarold Teunissen
 
Quantum Leap in Open Source Collaboration
Quantum Leap in Open Source CollaborationQuantum Leap in Open Source Collaboration
Quantum Leap in Open Source CollaborationHarold Teunissen
 
Fusion of bandwidth on demand and virtual organizations
Fusion of bandwidth on demand and virtual organizationsFusion of bandwidth on demand and virtual organizations
Fusion of bandwidth on demand and virtual organizationsHarold Teunissen
 
Enabling Dynamic Services with SURFconext
Enabling Dynamic Services with SURFconextEnabling Dynamic Services with SURFconext
Enabling Dynamic Services with SURFconextHarold Teunissen
 
SURFconext - Collaboration without limit
SURFconext - Collaboration without limitSURFconext - Collaboration without limit
SURFconext - Collaboration without limitHarold Teunissen
 
Community Clouds - Shared Infrastructure as a Service
Community Clouds - Shared Infrastructure as a ServiceCommunity Clouds - Shared Infrastructure as a Service
Community Clouds - Shared Infrastructure as a ServiceHarold Teunissen
 
Cloud computing for dummies
Cloud computing for dummiesCloud computing for dummies
Cloud computing for dummiesHarold Teunissen
 

Mehr von Harold Teunissen (20)

Surfing the data wave
Surfing the data waveSurfing the data wave
Surfing the data wave
 
Transformation in Higher Education using ICT
Transformation in Higher Education using ICTTransformation in Higher Education using ICT
Transformation in Higher Education using ICT
 
In de wolken - dat mag wat kosten?
In de wolken - dat mag wat kosten?In de wolken - dat mag wat kosten?
In de wolken - dat mag wat kosten?
 
Ontsourcing -
Ontsourcing -Ontsourcing -
Ontsourcing -
 
From Cubes to Spheres — The transition of higher education towards the cloud.
From Cubes to Spheres — The transition of higher education towards the cloud.From Cubes to Spheres — The transition of higher education towards the cloud.
From Cubes to Spheres — The transition of higher education towards the cloud.
 
Federations on the rise
Federations on the rise Federations on the rise
Federations on the rise
 
DDOS – a Nuisance or Threat?
DDOS – a Nuisance or Threat?DDOS – a Nuisance or Threat?
DDOS – a Nuisance or Threat?
 
Open access and beyond
Open access and beyondOpen access and beyond
Open access and beyond
 
The chasm of cyberinfrastructures
The chasm of cyberinfrastructuresThe chasm of cyberinfrastructures
The chasm of cyberinfrastructures
 
Dutch Cyberinfrastructure
Dutch CyberinfrastructureDutch Cyberinfrastructure
Dutch Cyberinfrastructure
 
Collaborations Unleashed
Collaborations UnleashedCollaborations Unleashed
Collaborations Unleashed
 
Collaboration is Happening
Collaboration is HappeningCollaboration is Happening
Collaboration is Happening
 
Quantum Leap in Open Source Collaboration
Quantum Leap in Open Source CollaborationQuantum Leap in Open Source Collaboration
Quantum Leap in Open Source Collaboration
 
Fusion of bandwidth on demand and virtual organizations
Fusion of bandwidth on demand and virtual organizationsFusion of bandwidth on demand and virtual organizations
Fusion of bandwidth on demand and virtual organizations
 
Enabling Dynamic Services with SURFconext
Enabling Dynamic Services with SURFconextEnabling Dynamic Services with SURFconext
Enabling Dynamic Services with SURFconext
 
SURFconext - Collaboration without limit
SURFconext - Collaboration without limitSURFconext - Collaboration without limit
SURFconext - Collaboration without limit
 
Community Clouds - Shared Infrastructure as a Service
Community Clouds - Shared Infrastructure as a ServiceCommunity Clouds - Shared Infrastructure as a Service
Community Clouds - Shared Infrastructure as a Service
 
Federaties in de praktijk
Federaties in de praktijkFederaties in de praktijk
Federaties in de praktijk
 
Federaties in de praktijk
Federaties in de praktijkFederaties in de praktijk
Federaties in de praktijk
 
Cloud computing for dummies
Cloud computing for dummiesCloud computing for dummies
Cloud computing for dummies
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Domestication of Apps: SSO and Group Sharing

  • 1. Domestication of Applications Use carrots or sticks? Harold Teunissen et al. – SURFnet I2FMM10 – 3 November 2010
  • 2. 2
  • 3. 3
  • 4. Domestication -  Domestication fits nicely in the Service Oriented Architecture paradigm where a platform is created for reusable services and service components -  Domestication can be described as the process of externalizing authentication, authorization and group management from services -  It becomes easier to share (generic) information among services and to replace similar services -  It is only useful in multi-domain collaboration or enterprise environments à hence (delegation of) trust is a point of concern 4 Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
  • 5. Domestication (2) -  Domesticated applications enable single sign-on features for users, as well as the ability to share group context between multiple applications -  Main Candidates -  Identity and access control -  Group management -  Events like presence and activities -  Perhaps Monitoring and Reporting and messaging? 5 Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
  • 6. Strategies -  Create economy of scale to create a valid business case for Service Providers -  Do it yourself -  Need for standardized interfaces, APIs and availability of libraries -  Need to deal with trust 6 Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
  • 7. End User Perpective -  Pro -  Single Sign On -  One password (and identity) for multiple services -  Cons -  WAYF – where are you from -  Service might ask again and again your profile information etc. 7 Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
  • 8. Service Provider Perspective -  Pros -  Validated and up-to-date (user) information -  Focus on core business -  Reduction of administrative overhead – no more “I lost my password” -  Economy of scale (after initial investment – adding new organisations is easy -  Cons -  Most services already provide a solution for the generic functionality (needs to combined with legacy generic functionality) -  Invest in APIs in an unknown technology territory 8 Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
  • 9. Organsational Perspective -  Pros -  In control – one set of credentials for all services -  Happy and secure users -  Cons -  None? -  Prerequisites -  Get your Identity Management on track -  Get organized – convince service providers to become domesticated 9 Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta
  • 10. Get more here -  Outline: surfnet.nl/coin -  Wiki: wiki.surfnetlabs.nl -  Blog: projectcoin.surfnet.nl -  Twitter: #projectcoin -  OpenSocial enterprise whitepaper: opensocial.org 10 Domestication of Applications - I2FMM10 - 3 November 2010 - Atlanta