[Log In] []

Exploring the science and magic of Identity and Access Management
Monday, October 7, 2024
 

Identity Trends – Take Two

root
Author: Mark Dixon
Thursday, February 1, 2007
9:12 pm

Thank you all who responded with suggestions for this project. I appreciate you taking the time to share your ideas. One very positive outcome of this little experiment is that I have been asked to share the results of this project at the JavaOne conference in May. I will include anyone who shares insight on this subject with me in the bibliography of my presentation at that conference, and will publish the paper on this blog.

So now, in the participatory nature of this project, here is the second draft of my list of Identity Trends. Based on feedback, I have separated the trends into three categories. As before, I’d welcome any and all feedback.

Market Drivers

  1. Enterprises will increasingly seek to leverage digital identities to delivery highly personalized services to increase revenue and increase customer loyalty
  2. Governments will increasingly use digital identity methods to enable citizen-government interaction and to track citizen location and behavior
  3. The rising rate and severity of identity theft, coupled with accelerating concern over privacy rights, will cause consumers to demand stronger control over their own identities.
  4. Governments will increasingly impose regulatory controls on the use and protection of digital identities
  5. Enterprises and government agencies will increasingly seek to leverage digital identity methods to increase regulatory compliance, reduce operational costs and improve information security

Technology Trends

  1. User centric identity will grow in prominence for both consumer and enterprise applications
  2. Customer-focused commerce models, including VRM, will emerge
  3. Identity federation among disparate organizations will be implemented on a broad scale
  4. Components in Identity product and service suites will become more strongly integrated
  5. Identity functionality is increasingly delivered as sets of services, rather than monolithic applications
  6. Standards-based interoperability among multiple products from different vendors will be increasingly demanded by customers
  7. Policy driven methods will be increasingly used to govern the entire Digital Identity lifecycle
  8. Physical or virtual consolidation of customer Identities will increasingly enable vendors to have a single view of their customers
  9. Identity-enabled access control at the network and device layer will increasingly complement access control at the operating system or application layer

Deployment Trends

  1. The scope of Identity Management strategies will increasingly expand beyond operating systems, applications, directories and databases to integrate network access control and physical access control
  2. Autonomous organizations offering Identity services, both within and outside the enterprise, will become more prominent
  3. More template-driven rapid implementation methods are being used to reduce Identity Management implementation time
  4. Business processes will increasingly be engineered to integrate Identity from the start, rather than attaching Identity after the fact

As always, thanks for your valuable assistance.

Technorati Tags: ,
,
,

 

2 Responses to “Identity Trends – Take Two”

    Could you in a future blog entry comment on WS-XACML and how it can help make user-centric identity better?

    Comment by James on February 4, 2007 at 3:56 am

    Will do.

    Comment by Anonymous on February 5, 2007 at 7:29 pm

Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.