Gluu Web Authentication / SSO Protocol Adoption Predictions
Its hard to make accurate predictions about adoption for SSO protocols. Its impossible to make a detailed model when the known inputs are so vast. With that inherent disclaimer about the difficulty of...
View ArticleRole with Attributes but Permission with UMA Scopes
Advocates for ABAC (attribute based access control) have a new pun up their sleeve, “Role with Attributes”… haha… as in express the person’s role using an attribute. This pun continues an age old...
View Article17 Recommended Requirements for an Identity and Access Management POC
We get requests for POC’s quite often. In an attempt to provide tactical guidance to organizations developing an identity and access management POC, the following are our top recommended criteria for...
View Article
More Pages to Explore .....