Preview

Federated Identity Management Paper

Good Essays
Open Document
Open Document
479 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Federated Identity Management Paper
In both private and public sectors, organisations are building Information Technology infrastructure to improve their business capacity. There is a notable growth in the integration of organisations and forming of federations. This integration however is accompanied by some overhead for managing identities of employees, business partners, and customers, as the cost for dealing with the life cycle of user identities is very great. This is true because the relationship between an organisation and users can change often, and each change that occurs requires administration to act. This is also cumbersome for the individual if they are required to register a separate account for all the organisations that they access.
The intent of this paper is
…show more content…
Federated Identity Management
A federation is defined as a group of business partner who work together (Axel Buecker et al, 2008) and according to (CERN OPEN, 2013), Federated Identity Management (FIM) is an arrangement that can be made by multiple organisations that lets subscribers use the same identifications data to get access to the secured resources of all organisations in the
…show more content…
These trust relationships are forged using informal and legal agreements between the members of the federation. Before a federation can begin to operate, the agreements need to be in place (Axel Buecker et al, 2008).
According to Axel Buecker (2008), once all the federation and business agreements are put in place, the federation members can begin to operate together using suitable technology that supports the arrangements made by the federation. The technology provides the federation with trust management capabilities, cryptography support and protocol functions that make it possible for a secure partnership to take place in a distributed setting.
To manage all identities throughout a federation, FIM provides a uniform system for making identity management across company boundaries simple. This system allows organisations to unload identity access management costs to the organisations partners in the federation. This makes it possible for an organisation to receive trusted data about a user without registering that user and without the user being required to provide identity more than once.
Moritz Platt (2005) provides a perfect illustration of a federated identity management system in figure

You May Also Find These Documents Helpful

  • Good Essays

    Kudler Fine Foods is a growing local upscale fine food store in San Diego. Kudler Fine Foods has three locations and specializes in bakery and pastry products, fresh produce, fresh meat, seafood, condiments, package foods, cheeses, and dairy products. Kudler Fine Foods mission is to “offer each customer a delightful and pleasing shopping outing.” With a mission statement, such as theirs Kudler Fine Foods wants to partner up with a loyalty rewards program company. This loyalty rewards program will allow customers to earn points for airfare upgrades, gifts, and other specialty foods. Kudler Fine Foods also plans on using customer data from the rewards program to help with the way the company does business. The type of data that will be collected is customer shopping habits.…

    • 806 Words
    • 4 Pages
    Good Essays
  • Better Essays

    POS421 Week 5 Individual

    • 1789 Words
    • 5 Pages

    In the Week 4, a domain model was created for Company Beta. When the domain model was created, it was thought to cover all the security concerns associated with the information contained on the network. Unfortunately, this is not the case. Recently, there has been some compromising activity to allow sensitive information to possibly get into the wrong hands. To help aid in eliminating the possibility of this occurring again, the entire domain model will be re-evaluated. This will provide security enhancements that are not present in the current domain model. In order to re-evaluate the current domain model, there are several aspects that we will have to discuss. These aspects include the type of domain model used for current domain model, the affects subnets may or may not have, how a new domain model can provide better security, how to improve the domain name system, the Internet domain name and its effect on the DNS name-resolution process, and can ISDN be improved. In addition, it will also be noted how domain controllers can be utilized to provide the company with adequate expansion in the future due to user population increase.…

    • 1789 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    34. Kerberos is an example of a single sign-on system providing enterprises with scalability and flexibility.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    The LDAP server will be utilized as the central authentication server so that the involved users have a login that is unified and covers all console logins (LDAP NExt, 2010).…

    • 295 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Sample 1

    • 456 Words
    • 2 Pages

    The physical protection of Finman’s data will need to be protected by proper configuration and setup of data network infrastructure. Both thirds parties will need to ensure ACL systems are set and configured to ensure access and data flow is running properly. There is to be granted access to only privilege user’s assigned and agreed upon. Authentication and authorization is to be set in place to ensure protection with Finman’s data resources along with network resources. Authentication and authorization can be applied by enforcing Group Polices. Each third party will need to have proper verification set in place otherwise known as Third Party Verification (TPV). TPV will provide both parties to meet industry standards such as Federal Communication Commission and Federal Trade Commission. Backup solutions for data storage will need to be set in place to ensure integrity of Finman’s data and meets industry standards.…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper 502

    • 1305 Words
    • 5 Pages

    Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.…

    • 1305 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    What is federation?Federation is a form of government in which powers and functions are divided between a central government and a number of political subdivisions that have a significant degree of political autonomy. It was the unification of Australian colonies which formed the commonwealth of Australia on 1st January 1901.…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    centralized control of authentication and security policies on Windows systems and form the foundation for…

    • 364 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Which of the following terms refers to working partnerships between MNCs across national boundaries and often across industries?…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The genuine trick for the integration is the free flow of information, cooperation and respecting each business’s independence (Andersen, 2008: 30).…

    • 3079 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    In large companies it becomes a task to authenticate every single system since it involves many workgroup switches. Having a centralized authenticating server reduces the cost by simplifying heavy authenticating…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Work In Partnership

    • 1804 Words
    • 6 Pages

    and experience of care. This includes the relationships between individuals with long term conditions, their…

    • 1804 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Royal Dutch and Shell Case

    • 1960 Words
    • 6 Pages

    Its distinguished feature from most of the other companies is the joint operation of two companies which they represent two different countries.…

    • 1960 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Business Proposal

    • 1052 Words
    • 5 Pages

    Whether it’s Consumer banking or Commercial banking, specialized software applications can save any financial institution a lot of money by investing in a single system, and customer and employees alike would also benefit. Many banking institutions currently house several banking applications depending on the type of products, each application houses different products. If a customer is a sole proprietor, he or she may have personal accounts and well as business accounts. Not only will the customer have consumer and commercial products but the products will also vary. Commercial products can include commercial lines of credit for their business, a corporate card, and a commercial real estate term loan if they own the building location where their business operates out of. Consumer products may include a personal checking account, savings accounts, credit cards, and residential mortgages and home equities. Most banking systems house personal and business accounts separately and customers have to log into different systems in order to access the information. In addition, employees then have to log into an entirely different system than the customer therefore employee and customer are viewing different systems. This proposal is for one specialized application to house both consumer and business accounts for customers and for employees and customers to use one system as well with employees allowed different access. This will assist employees with customer service needs if they are able to view the same thing the customer is viewing.…

    • 1052 Words
    • 5 Pages
    Good Essays
  • Good Essays

    awesome research

    • 7892 Words
    • 39 Pages

    ISACA offers the Business Model for Information Security™ (BMIS™) and the IT Assurance Framework™ (ITAF™). It also developed…

    • 7892 Words
    • 39 Pages
    Good Essays