I gave this talk a few months ago. I had just finished writing our 2013 Identity and Privacy Planning Guide and was trying to think of a different way to express what I had written. What I came up with was this very very different way to express what I had written. I’d love your feedback. Also, no commas were harmed in the filming of this presentation.
by Ian Glazer | February 8, 2013 | 23 Comments
by Ian Glazer | November 26, 2012 | Comments Off
Next week is our Identity and Access Summit in Las Vegas. I am excited to announce that we’ll have nearly all of our full team there, including our newest teammates! I just wanted to share what sessions I’ll be involved with next week as well a provide links to those sessions in our Agenda Builder tool to help you fill out your agenda.
A Magic 8 Ball in the Sky: Federated, Distributed, and Cloud Externalized Authorization – Agenda Builder
- To what extent is externalized authorization becoming mainstream?
- What are the deployment patterns for externalized authorization with respect to cloud services?
- What are the challenges of federated authorization?
Panel: New-School Identity Protocols Fight for Your Love – Agenda Builder
|OpenID Connect||Nat Sakimura|
Panel: National Strategy for Trusted Identities in Cyberspace – Agenda Builder
Closing Keynote: Putting Strategy Into Action – Agenda Builder
Lastly, I’ve got a few one on one sessions available. Use the Agenda Builder tool and get some of my time.
See you in Vegas!
by Ian Glazer | November 1, 2012 | 3 Comments
No, faithful readers, this isn’t a repeat of my last post. The Identity and Privacy Strategies has hired once again… well actually twice again. We snagged two more industry luminaries: Mary Ruddy and Nick Nikols.
You likely know Mary as a keeper of the Identity Commons flame, tireless participant in IIWs, and major contributor to open identity initiatives. Mary joins us from Meristic, a software services company providing strategy and implementation services in “user-centric” identity management and distributed networks. She’s been involved with the Higgins project, FICAM, and NSTIC. I met Mary at the first IIW and am incredibly excited for her to join our family. Mary will be covering federation, WAM, eSSO, authentication, mobility, open identity, and whatever else we can throw at her.
Burton Group, Novell, and Quest customers will know Nick and his long history in identity. Prior to joining the Burton Group in 2003, Nick was the DirXML Architect and Engineering Manager at Novell. Nick held various software engineering positions throughout his decade plus career at Novell. Nick was a Senior Analyst/Senior Consultant with Burton Group from 2003-2006. After leavening Burton Group, Nick returned to Novell as CTO of Security and VP of Product Management. He then joined Quest Corporation where he was most recently the Chief Technology Officer, but he also served as VP and General Manager over the Identity, Security, and Windows Management team. On a personal level, I have always wanted to work with Nick, and Lori and I bolted at the chance to do so.
With Mary and Nick coming aboard, and Heidi having joined us last month, Gartner for Technical Professionals Identity and Privacy Strategies Team is at full strength. I know we’ve been a tad quiet lately, but with a fully staffed team, expect us to be loud in 2013.
P.S.: If you want to meet the team, come to Las Vegas and join us for our IAM Summit in December.
P.P.S: If you can’t make the IAM Summit, you can catch Heidi at EDUCAUSE next week, me at Defrag the week after, and Mary on a webinar at the end of the month.
by Ian Glazer | September 25, 2012 | Comments Off
As I mentioned at Catalyst, the Identity and Privacy Strategies team is growing. I am excited to announce that Heidi Wachs has joined the team effective yesterday. Heidi joins from Georgetown University where she was the University Chief Privacy Officer and Director of IT Policy. At Georgetown, Heidi worked to establish and manage University-wide data privacy initiatives for information technology operations and data breach response. Heidi has an extensive knowledge of the higher education market: in addition to Georgetown Heidi has worked with EDUCAUSE helping to establish policies and practices. Obviously, Heidi will be covering privacy with me, but we are also going to turn her into an identity geek as well.
Not only is Heidi a Jersey girl who has serious operational privacy chops, she’s a lawyer to boot. You might be thinking “why hire a lawyer on a team of technical professionals?” Heidi’s operational know-how is exactly the kind that our constituents need access to. Talking about privacy (or identity for that matter) in the abstract is fun but not necessarily practical. And as identity management professionals up their game and start to become a larger part of information protection conversations, the kind of guidance Heidi can provide will be incredibly useful.
Category: Uncategorized Tags:
by Ian Glazer | September 19, 2012 | 8 Comments
Today salesforce.com unveiled its entrance into the identity market, with a set of identity capabilities, and the market may never be the same. Salesforce.com’s identity capabilities include a federation identity and service provider as well as some user provisioning services. These capabilities use the existing Salesforce user store (and associated schema) as its identity repository that can then be referenced and leveraged via the other identity services. Furthermore, these identity services are not just available in classic salesforce.com, but in Force.com and Heroku applications as well.
You’re likely asking, “Federation and user provisioning – how is that a glimpse of the future?” Taken in isolation, you are right; federation and user provisioning aren’t futuristic or anything special to crow about. But the crucial thing to note is that salesforce.com isn’t thinking about identity in isolation, and isn’t deploying identity in isolation. Salesforce.com isn’t offering identity by itself but instead offering identity within the context of PaaS, delivered, managed, and licensed as such. Become a Salesforce customer and you get identity, not as a side dish added in for free, but something baked right into the applications. It is also crucial to note that salesforce.com went well beyond just integrating its own bits, but instead is offering identity services to help integrate and manage non-Salesforce services and identities.
These identity services, with undoubtedly more to come, are woven into not only crucial business applications (like CRM) but into salesforce.com’s PaaS infrastructure. Identity just happens! This is the future of identity services. Identity gets delivered in the context of something the business and IT as a whole cares about.
From a market perspective, this is a huge deal. Cloud-delivered federation and web SSO providers are going to feel salesforce.com’s presence in a major way. New market battlelines are being drawn. The old fight between identity suite vendors will give way to the new fights between salesforce.com, Microsoft Office365 + Azure, and Oracle Public Cloud. This changes the balance of the identity ecosystem and it is too early to tell how smaller identity vendors will fit in this coming world.
I know full well that an announcement does not happily deployed customer make, and salesforce.com will have to prove to the market it can deliver all of this magically identity goodness. But I will give them credit for taking a standards-based approach by not only supporting SAML 1.1 and 2.0 but also OAuth, OpenID Connect, and SCIM. Not only does standards support facilitate identity services, they also will make integrating Salesforce Identity to your identity bridge and on-premise identity infrastructure far easier than if salesforce.com took a proprietary approach. Furthermore, as our upcoming “2013 Planning for Identity and Privacy” will point out, this sort of delivery of identity services can only happen when those services are standards based.
If announcements like this are any indicate, next 18 months are shaping up to be some of the most interesting in the history of identity management.