I've been railing on this for years - the tooling side of identity is really bad. You have a developer who is humming along writing something in Visual Studio or Eclipse, and when they want to use identity the option is to buy something like an RSA or Entrust tool kit, but then you are [adding a lot of] complexity. So we shouldn't be surprised that developers are not using identity. |
The ability for the directory to describe itself is important. These vendors will never agree on standardized schema, but they have agreed on how they describe their schema. |
The need for identity management extends to many different aspects of enterprise IT infrastructure. Given the heterogeneous nature of today's IT environments, partnerships between enterprise applications suppliers and identity management vendors are an important component of enterprise integration solutions. The partnership between Siemens and SAP demonstrates this trend and will be especially valuable where the two companies share common customers. |
They've taken the crucial parts of user management - the directory, public-key infrastructure, authentication and access control - and put them together . . . in an effort to ensure they work together. |
They've taken the crucial parts of user management - the directory, public-key infrastructure, authentication and access control - and put them together . . . in an effort to ensure they work together. |
Today's enterprise IT architecture is about integrating systems to meet business needs. Consequently, IT architects can't -- and don't -- live in a vacuum. To address that reality, Catalyst Conference 2006 will delve into strategic infrastructure technologies with the depth to which our clients have grown accustomed. With the larger number of Cross-Cutting Concerns sessions, we'll also clearly illustrate how these technologies relate to each other, and how roles, geographies, and business processes intersect within an enterprise. |