Gluu SXSW 2015 Interactive Picks
49 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by TraceyNathan
Scoop.it!

Gluu SXSW 2015 Interactive Picks

Gluu SXSW 2015 Interactive Picks | Gluu SXSW 2015 Interactive Picks | Scoop.it
Voting for SXSW 2015 interactive sessions is NOW OPEN! Approximately every day until voting ends we’ll highlight a new proposal that seems worthy of inclusion in SXSWi 2015, with a bias towards security related topics. Click on any of the below session titles to be taken to the voting page.…
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

SXSW 2015: How API access control = monetization + freedom | Gluu | Blog

SXSW 2015: How API access control = monetization + freedom | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
Control access to your APIs, and you can charge for them. Large companies see API access management at scale as a competitive advantage and a way to lock in
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu and Shibboleth Consortium finalize partnership; offer Universities an easy way to contribute back to open source Shibboleth project | Gluu | Blog

Gluu and Shibboleth Consortium finalize partnership; offer Universities an easy way to contribute back to open source Shibboleth project | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
Gluu and the Shibboleth Foundation finalize a partnership to help increase funding for development and marketing of the open source Shibboleth project. Austin,
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu Cloud Identity Appliance 1.0 Released · gluu · Storify

Gluu Cloud Identity Appliance 1.0 Released · gluu · Storify | Gluu SXSW 2015 Interactive Picks | Scoop.it
Gluu announced version 1.0 of its Cloud Identity Appliance, a solution that enables organizations to quickly deploy a single-sign on service (SSO) that standardizes how users access both internal and external websites.
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Shibboleth Identity Provider (IdP): What it is, and why you should consider a Managed Service | Gluu | Blog

Shibboleth Identity Provider (IdP): What it is, and why you should consider a Managed Service | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
Shibboleth is among the world's most widely deployed federated identity solutions, connecting users to applications both within and between organizations. Many
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

OpenID Connect… Call me crazy!

OpenID Connect… Call me crazy! | Gluu SXSW 2015 Interactive Picks | Scoop.it
OpenID Connect has reached the quorum of votes needed for approval! Check out the launch press release. This under-appreciated event will have a profound effect on the Internet. I believe that it will not just be another can single sign-on (SSO) standard, but will be as essential an infrastructure for the Internet as IP, HTTP and DNS. Call me crazy, but here are the top ten reasons I think we’ve finally got it right: Learn more about the differences between OpenID 1 and 2, and OpenID Connect.  1.Easy for developers  Ease of use for developers was one of the primary goals. The feedback from the community is that OAuth2 is ok! The basic ideas are well understood now. And there is plenty of sample code, sessions at programming conferences, and tools for developers to use. OAuth2 is built on JSON / REST, so it’s aligned with this shift in development best practices. 2.Easy for domain administrators  If you are the system administrator for your domain, managing an authentication service for internal people and customers can be a challenge. Especially if multiple applications rely on this service. System administrators have a mantra: “Stay Calm and automate all the things.” In this regard, OpenID Connect automates some of the manual work that authentication services of times past have relied on the admin to manage by hand. For example, discovery and client registration enable the web developers to do some of the legwork. Its better for everyone: the developer gets instant results (no waiting for the XYZ team to provision the agent…). And the system admin can review and modify as needed. With coming improvements in inter-domain federation, many more mundane tasks will be the target of even greater automation, making ecosystems of partners more secure, and saving money. 3.Supports better privacy controls for people  The client in OpenID Connect has a connection to the person. Connect defines a way for the client to ask the person to authorize the release of information to a third party. While more work needs to be done in this area, Connect is a good start, and paves the way for more complex authorization flows that can be defined in other OAuth2 profiles like UMA. 4.Authentication-technology neutral Never say secure web access is an authentication protocol to an OpenID Connect expert… the knee jerk response is that OpenID Connect does not define the protocol for authentication (look to FIDO to do this…). And it’s true… OpenID Connect defines everything around the authentication except the authentication itself. For example, how does the website look up where to send the person for authentication. And how to register with the OpenID Provider, which is required to get information about the person who has been authenticated. And how to to end the person’s session so that other apps will know that they need to re-authenticate the person. The great thing about this is that OpenID Connect supports any kind of authentication technology. In oxAuth, Gluu’s open source OpenID Connect Provider (OP), we support multi-step, strong authentication. Each domain can make a decision about the best authentication mechanisms to offer. With the plethora of authentication hardware, software, and SaaS services… having this kind of flexibility is awesome! 5.Extendable by complimentary profiles OpenID Connect does a few things well, but it’s not the answer to everything. In fact, one of the goals of the effort was to achieve not the largest possible standard, but the smallest. Many efforts are underway to build on the strong foundation of OpenID Connect. How devices share sessions, how OpenID Providers and relying parties can collaborate using multi-party federation metadata, how OpenID Connect can be leveraged by an authorization protocol like UMA… all of these are examples of how well OpenID Connect can address challenges still unresolved in the industry. 6.Automates client registration I’ve already mentioned how great this is for domain administrators. In fact, automating client registration is a requirement to scale. Many organizations today have a handful of SAML relationships. The difficulty in provisioning new SAML clients has been one of the barriers to adoption of SAML. 7.Provides an easy HTTP interface for discover y This is one of those subtle details that might be missed. OpenID Connect discovery is darn useful. It enables a client to find out what URI’s the domain uses to publish the OpenID Connect APIs–where to register and where to request information about the person (user claims). It also sets a clear standard for other OAuth2 profiles. For example, in UMA, we use ./well-known/uma-configuration. All I can say is… nice work… it’s great when the simplest design is adopted! 8.Supports serious crypto There are many trust models between domains on the Internet. Defense contractors need a high level of assurance. Your local sports club needs a very low level of assurance. It is great that OpenID Connect supports a range of trust requirements. 9.Supports the complexity of today’s mobile / API ecosystem Native applications–including not only mobile, but some incredibly powerful desktop applications–needed a better authentication infrastructure than previous web-centric SSO solutions provided. OpenID Connect has better support for a client collecting the credentials of a person. In some cases, if you are using a native application, and the browser pops up and asks you for your credentials… it’s a weird user experience. In some cases, the native app is collecting biometric data, generating a key, or providing other important contextual data that can be used to figure out if it’s necessary to authenticate the person. Interactive web authentication–where the person’s browser is re-directed to the home identity provider–is great for many use cases. But thankfully, OpenID Connect didn’t stop there in its core set of guidelines. 10.People are finally ready for change It’s very hard to change user behavior. Everyone knows passwords are bad. A recent Verizon study indicated that 80% of IT security breaches were the result of bad passwords. It took 9/11 for people to accept airline security. While thankfully nothing as horrible in the electronic security world has occurred, people experience death by a thousand paper cuts. I think if we offer a better alternative, people are finally ready to change their behavior to take advantage of it.
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu partners with Duo Security; Embeds Two-Factor Authentication | Gluu | Blog

Gluu partners with Duo Security; Embeds Two-Factor Authentication | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
September 14, 2012 – Austin, TX – Gluu today announced a partnership with Duo Security to embed support for Duo’s Two-Factor Authentication in the OX open sourc
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Shibboleth IDP: What it is, and why to consider a Managed Shib Services, like Gluu | Gluu

What is Shibboleth for SAML? How does it work? Why to consider a managed service.
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

17 Recommended Requirements for an Identity and Access Management POC

17 Recommended Requirements for an Identity and Access Management POC | Gluu SXSW 2015 Interactive Picks | Scoop.it
We get requests for POC’s quite often. In an attempt to provide tactical guidance to organizations developing an identity and access management POC, the following are our top recommended criteria f...
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Top 10 Applications for Multi-Factor Authentication in Higher Education

Top 10 Applications for Multi-Factor Authentication in Higher Education | Gluu SXSW 2015 Interactive Picks | Scoop.it
Strong, multi-factor authentication is one of the most cost efficient ways to reduce security threats within an organization. Although many organizations are hesitant to introduce strong authentication due to on-boarding and integration issues, we regularly advise existing and prospective customers to at the very least consider adding it to their developmental roadmaps. 




Watch how to use OX open source for strong, mutli-step, multi-factor authentication.




With the newest release of OX now available, implementing organization wide, strong authentication has never been more flexible. Not only is the OX platform vendor neutral, but it also supports multiple authentication providers if necessary and customizable business logic.





So without further ado, here are the 10 +1 most common applications for Multi-Factor Authentication in Higher ED:





1. Privileged Access (“root”, “Admin,” “System,” or similar privileged access) to large or critical system: examples of such systems include campus ERP systems with financial data or student records; identity management systems ; centralized backup systems; DNS servers; DHCP servers; campus web cache boxes, etc.




Typical job titles of MFA user: system administrator, database administrator, DNS administrator




2. Core Network Devices: “Enable” access to core routers and similar privileged access to other key network devices (including firewalls and other network security appliances with traffic visibility)




Typical job titles of MFA user: network engineer, network security engineer




3. Physical access to critical facilities[e.g., machine rooms, telecom switch rooms, colo facilities, other high value assets]




Typical job titles of MFA user: facilities engineer, computer operator, etc.




4. Access to institutional financial accounts (commercial bank accounts, institutional brokerage access, etc.); note that this will typically use a credential specified by the bank, brokerage, etc., not by campus




Typical job titles of MFA user: campus business officer, portfolio administrator, financial manager




5. Access to HIPAA covered health data (teaching hospital patient records, on campus health center records, testing center records, etc.)




Typical job titles of MFA user: doctor, hospital/health center administrator, insurance billing specialist, etc.




6. Financial Aid data: because of the Department of Education special push in this area, Financial Aid administrators get a special call out (e.g., Department of Education is pushing 2FA hard tokens to all financial aid admins)




7. High Performance Computing Resources: many so-called supercomputer centers require 2FA after the unfortunate Stakato attacks.




8. VPN access from off campus (punching through a campus perimeter firewall, or accessing a specially sensitive internal network)




9. Campus Messaging (e.g., in an effort to preventing phishing and subsequent spam runs, resulting in widespread phishing)




10. Google (pushed by Google, rather than the campus)




Plus one more (not strictly two factor, think more “alternative factor to traditional passwords”):




Bonus:




11. Automated (machine-to-machine) connections (e.g., for things like scheduled bulk data transfers) [think ssh pre-shared key access]
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu integrates YubiKey for secure hard token USB and NFC Two-Factor Authentication - 2FA for every site on the Internet?

more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Independent research firm cites Gluu as OpenID Connect Vendor | Gluu | Blog

Independent research firm cites Gluu as OpenID Connect Vendor | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
An October 24, 2012 independent research report on Identity Standards cites Austin, TX startup, Gluu, as one  vendor that provides productized support for
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu Launches OpenXDI project to implement OASIS standard for semantic web stack | Gluu | Blog

Gluu Launches OpenXDI project to implement OASIS standard for semantic web stack | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
Gluu announced today the launch of the OpenXDI project (abbreviated OX) to develop open source software that implements the design of the OASIS XDI technical
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu SXSW 2015 Interactive Picks | Gluu | Blog

Gluu SXSW 2015 Interactive Picks | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
Gluu's top picks for proposed SXSW 2015 panels.
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu and Shibboleth Consortium finalize partnership; offer Universities an easy way to contribute · gluu · Storify

Gluu Inc., a leader in open source cloud identity, today announced a strategic partnership with the Shibboleth Consortium to help fund continuing development and marketing of Shibboleth open source software. The partnership agreement will add a suggested donation of $1,200 to the sale of all Gluu E
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu’s OpenID Connect platform to support multi-party federations

Gluu’s OpenID Connect platform to support multi-party federations | Gluu SXSW 2015 Interactive Picks | Scoop.it
Gluu, a leading open source cloud identity provider saml, today unveiled its plan for multi-party federations based on OpenID Connect. Details of the proposed design have been published on the Open...
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

OpenID Connect | Gluu

An overview of the new OAuth2 proposed protocol for authentication, OpenID Connect, and how it differs from OpenID 1 & OpenID 2.
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

10 Reasons Why OpenID Connect will be Ubiquitous | Gluu | Blog

10 Reasons Why OpenID Connect will be Ubiquitous | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
OpenID Connect has reached the quorum of votes needed for approval! This under-appreciated event will have a profound effect on the Internet.
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu partners with Duo Security; Embeds Two-Factor Authentication

Gluu partners with Duo Security; Embeds Two-Factor Authentication | Gluu SXSW 2015 Interactive Picks | Scoop.it
Gluu today announced a partnership with Duo Security to embed support for Duo’s Two-Factor Authentication in the OX open source cloud identity platform. Now organizations that use the OX platform to...
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Shibboleth IDP: What it is, and why to consider a Managed Shib Services, like Gluu - The Gluu Server

more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

The Intersection of SaaS, Enterprise Software, and Open Source | Gluu

The Gluu Server offers the security of enterprise software, the operational advantages of SaaS, and the low total cost of ownership of open source software.
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

17 Recommendedations for an Identity and Access Management POC | Gluu | Blog

17 Recommendedations for an Identity and Access Management POC | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
Tactical guidance for organizations developing an identity and access management POC.
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Top 10 Applications for Multi-Factor Authentication in Higher Education | Gluu | Blog

Top 10 Applications for Multi-Factor Authentication in Higher Education | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
Strong, multi-factor authentication is one of the most cost efficient ways to reduce security threats within an organization. Although many organizations are
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Independent research firm cites Gluu as OpenID Connect Vendor

Independent research firm cites Gluu as OpenID Connect Vendor | Gluu SXSW 2015 Interactive Picks | Scoop.it
Gluu was cited as one vendor that currently provides productized support for OpenID Connect, a set of specifications that rests on a foundation of OAuth 2.0 to provide authentication single sign on,...
more...
No comment yet.
Scooped by TraceyNathan
Scoop.it!

Gluu integrates YubiKey for secure hard token USB and NFC Two-Factor Authentication | Gluu | Blog

Gluu integrates YubiKey for secure hard token USB and NFC Two-Factor Authentication | Gluu | Blog | Gluu SXSW 2015 Interactive Picks | Scoop.it
Gluu Cloud Identity platform announces support for Yubikey, a USB and NFC hard token strong authentication device, enabling two-factor access to both wifi and
more...
No comment yet.