Within a span of a couple of days I saw an interesting contradiction
regarding the adoption rate of Identity related technologies, particularly in
Europe. This contradiction came through a couple of articles I found on
Identity Management through my trusty Google Search agent.
The first article, basically states that adoption rates have not been as high
as they should be since everyone is acknowledging their importance.
Additionally the prevalence of cloud technology brings about a new wrinkle in
managing Identity which has yet to be properly addressed and might be a way
of pushing acceptance of IdM. It also states that the inherent complexity in
IdM creates additional acceptance and execution barriers.
The second article, takes a more positive approach to the acceptance of IdM
technologies. Particularly when considering Privileged User Management.
Interestingly enough... (more)
One of the coolest things about NetWeaver Identity Manager is that there are
always new tricks to learn. The development team keeps finding new and
interesting ways to extend the functionality of the product. This, in turn,
allows us to further extend what we can offer to our customers. Sometimes
what I learn for a particular customer is brand-new, sometimes it's
functionality that's been around for years, but either way, it's usually of
use to someone, so I like to share when I can.
Recently I was asked by a client how we could link two fields together so
that for a given value ... (more)
Whether working on user provisioning, password management, compliance,
directory virtualization or meta-directory projects, the first step has
always been about checking the data and making sure that it is clean.
What constitutes clean data, and how do we get it that way? This is almost
certainly the most important question that should be addressed when
considering an Identity Management project.
When considering User Provisioning project, there are a few basic things to
Is the data authoritative? It’s important that the data going into the
provisioning solution comes f... (more)
Darmstadt, December 11, 2009 - Multiple login procedures with different user
name/password combinations are often productivity-sapping inconvenience for
employees. Corporate regulations on password complexity do not provide
sufficient security. Users just write down complex passwords instead of
memorizing them. Such practices are a great security risk making vital data
easily accessible to unauthorized personal.
Secure SignOn for Enterprise Single Sign-On (E-SSO) ensures high user
acceptance, high user productivity, and efficiency by significantly reducing
helpdesk calls and by ... (more)
Security Journal on Ulitzer
The need for an easy single, yet secure, login procedure has always been an
elusive issue for many big organizations. Multiple user names and passwords,
multiple logins, and the ensuing confusion and frustration consume much of a
user's productivity in terms of time and energy.
Secure Login provides secure Single Sign-On and total landscape encryption
for SAP supporting a variety of different authentication mechanisms including
Active Directory, LDAP, SAP-ID, RADIUS, RSA SecurID®, SQL DB, and even smart
Secure Login is tightly inte... (more)