[Log In] []

Exploring the science and magic of Identity and Access Management
Wednesday, February 4, 2026

Web 2.0 and Open Source Identity

Identity
Author: Mark Dixon
Wednesday, November 29, 2006
10:37 pm

This morning I enjoyed listening to and watching Pat Patterson give a Webex presentation about how a PHP application can easily be modified to use SAML 2.0 to authenticate through a 3rd party Identity provider. I was pleasantly surprised to see how four small PHP code snippets could be inserted into the application to make this possible.

Pat was at his finest, slinging source code around in real time as we watched the whole process unfold before our eyes. And it really worked the first time – well, almost. He quickly fixed one small problem to complete the demonstration.

It was also encouraging to hear Pat’s comments about the progress of the OpenSSO project. A strong community seems to be building with participation from around the world. Kudos to all who are driving this important project forward.

Technorati Tags: ,
,
,
,
,

Comments Off on Web 2.0 and Open Source Identity . Permalink . Trackback URL
 

Open Federation – Open for Business

Identity
Author: Mark Dixon
Wednesday, November 15, 2006
3:34 am

With none of the fanfare that accompanied that Open Source Java announcement earlier this week, Sun Microsystems’ OpenSSO project quietly announced the Open Federation effort, including, “the availabilty of the Java source code for the identity federation and web services framework of the Sun Java System Access Manager and Sun Java System Federation Manager.”

The Open Federation architecture document states, “Open Federation provides a robust framework for implementing federated identity infrastructures and for deploying web services. Multiple industry standards, such as OASIS SAML, Liberty ID-FF, ID-SIS, IDWSF, are supported in the Open Federation system.”

This is another step forward in Sun’s effort to expand the federation software developer community and accelerate the implementation of federation systems in the world.

Technorati Tags: ,
,
,
,
,

Comments Off on Open Federation – Open for Business . Permalink . Trackback URL
 

The WOW Factor

Identity
Author: Mark Dixon
Tuesday, November 14, 2006
9:15 pm

Have you ever purchased something that really delighted you, not just at the time of purchase, but for days afterwards? I remember the first Toyota car I bought – a 1981 Corolla station wagon. It was a wonderful little car with many neat features that I didn’t even know about when I bought the car. Days after the purchase, I’d discover something new and think, “Wow! I’m glad I bought this car!”

This week, I visited a customer that is committed to launching ‘Wow’ personal network products. What a great way to describe the challenge faced by mobile carriers today! Services can’t just be good – they must be great. Services can’t just be functional – they be delightful – they must have the “Wow” factor.

In 1981, Toyota made tens of thousands white Corolla station wagons – all alike. Back then, it was good enough to make people like me say, “Wow!” That won’t work today. Consumers demand much more choice and fine-grained personalization – both in cars and network services. Carriers can’t just serve a mass audience, they must create services that delight individuals.

And that, my friends, demands Identity-enabled network services. It can’t happen any other way.

PS. I searched all over to find a photo of a 1981 Corolla Station wagon, and finally found a 1982 model on eBay. The owner is trying to sell it for $3.500. Wow! That is almost as much as I paid for my much-less-used model in 1983.

Technorati Tags: ,
,
,
,

Comments Off on The WOW Factor . Permalink . Trackback URL
 

Rationalize and Transform

Identity
Author: Mark Dixon
Friday, November 10, 2006
2:27 am

Rationalize: to bring into accord with reason or cause something to seem reasonable.

Transform: to change in composition or structure.

Earlier this week, I participated in a discussion about Identity Management issues with a customer who spoke of two related strategies in his business:

Rationalization – taking cost and complexity out of the business as they proceed with the merger of two large companies.

Transformation – realigning people, processes and technology in order to accelerate the creation of new and compelling customer services that increase revenue and enhance customer satisfaction.

He felt that technology was readily available for both rationalization and transformation. The bigger challenge is realigning corporate culture away from the traditional siloed organizational model and toward a more process-driven model that crosses multiple organizational boundaries to enable rapid creation of new products and services.

Our challenge as technology providers is to help our customers not only upgrade technology, but to transform their business models to really take advantage of new technology.

Technorati Tags: ,
,

Comments Off on Rationalize and Transform . Permalink . Trackback URL
 

Personalized Convergent Blended Composite Mashups

Identity
Author: Mark Dixon
Friday, October 20, 2006
3:32 am

I recently reviewed a proposal to one of our telecom customers that highlighted a major trend in the communications industry. May I paraphrase one important point: “Service providers are pursuing initiatives to personalize services to their subscribers. Convergence of traditional wireless and wireline networks holds the promise of creating a broad array of new services, many of which will be based on useful blends of more basic services.”

These are interesting buzzwords, particularly when you add “composite applications” and “mashups” that I addressed recently.

Consider the definitions, focusing first on the concept of combining many things into one:

Convergent: tending to move toward one point or to approach each other. The communications industry has talked for many years about bringing together divergent technologies and services into one. Of particular importance to this discussion is the goal of combining all the communications industry has to offer (e.g. wireline, wireless, VOIP, IPTV, entertainment, online services) for the benefit of individuals. It is a process of focusing many things into one.

Blended: combined or associated so that the separate constituents or the line of demarcation cannot be distinguished. Although the many services a carrier has to offer may come from many sources, the key goal is to present those services to a user in a seamless fashion.

Composite Application: an application built by combining multiple services. A favorite term in Service Oriented Architecture circles, “Composite Application” implies an integration of multiple services into one. This functional integration is essential in delivering blended services.

Mashup: a web application that seamlessly combines content from more than one source into an integrated experience. A mashup is an example of a composite application. However, all composite applications are not mashups. The term “mashup” implies a Web 2.0 look and feel, an “integrated experience” in cyberspace.

I propose that all this blending and convergence and mashing up is irrelevant without personalization.

Personalize: to make personal or individual. The key is to blending services is to meet the particular needs of individual subscribers, not the amorphous needs of the masses. This requires Identity to govern the blend. It is as if I were to walk to our kitchen and blend up a smoothie with strawberries, bananas, yogurt, ice, sugar and a few drops of vanilla. My recipe, my blend, my mashup so to speak. Yours will be different. I think that is what communications carriers want to deliver. Why should they care? Because we demand it – and probably deserve it. And because we’ll move on to the next carrier if we don’t get what we want. People are funny that way.

Technorati Tags: ,
,
,
,
,
,

Comments Off on Personalized Convergent Blended Composite Mashups . Permalink . Trackback URL
 

Battling the Compliance Project Death Spiral

Identity
Author: Mark Dixon
Wednesday, October 18, 2006
1:53 am

In a recent post, my colleague Sean (aka Desmond) O’Neil addressed the challenge of Identity Management Projects being caught in a “Compliance Project Death Spiral.” It reminded me of the Burton Group Catalyst Conference in May 2005. A panel discussion was addressing the strong opportunities for using Identity Management tools to improve compliance with government regulation. In my naive way, I raised my hand and asked how much money companies were spending to fund these compliance projects instead of funding growth or efficiency initiatives. The response was something like, “Well, the companies are spending money for things they should have been doing all along. It is worth the investment.”

Perhaps that has some truth, but Sean adroitly points out, “By being classified as a compliance project, it [an identity management project] will be looked at by senior management as overhead and a non-revenue generating activity.”

There are really only two sustainable motivations for spending money on IT – to reduce business cost or enable business growth. All other business drivers can usually be grouped under those two headings. Unless a project is firmly linked to those two business expectations, it may flourish for a time, but will eventually dwindle away. It happened for Y2K; it is happening for Sarbanes Oxley.

The trick is to make sure that a project that may have taken root in a compliance budget is also firmly recognized and nurtured as a growth-enabler or cost-reducer. Fortunately, Identity Management can deliver both.

Technorati Tags: ,
,

Comments Off on Battling the Compliance Project Death Spiral . Permalink . Trackback URL
 

Personal Identity Protection Tips

Identity
Author: Mark Dixon
Wednesday, October 18, 2006
1:21 am

Thanks to Jimmy Atkinson for pointing out his useful summary of personal identity protection tips on his blog, Your Credit Advisor. I also enjoyed his top 10 list of credit card reward programs.

Technorati Tags: ,
,
,
,

Comments Off on Personal Identity Protection Tips . Permalink . Trackback URL
 

400 LinkedIn Connections

Identity
Author: Mark Dixon
Friday, October 13, 2006
5:03 pm

This afternoon I had a minor celebration as I reached the threshold of 400 direct connections on LinkedIn. My Sun Microsystems colleague Rory Laiho was number 400. Thanks, Rory for being number 400!

Technorati Tags:

Comments Off on 400 LinkedIn Connections . Permalink . Trackback URL
 

Mashup – Cattle or Sheep vs. People

Identity
Author: Mark Dixon
Thursday, October 12, 2006
12:59 pm

My colleague Jonathan Gershater responded to my recent blog about sheep in New Zealand by sending me a link that claims Botswana has twice as many cattle as humans.

Since I have recently been obsessed with mashups, here’s the challenge to all you mashup developers out there – produce a mashup that shows the ratio of sheep to humans and cattle to humans in each nation of the world. It may not have a lot of commercial value (like many other mashups), but it would be kind of fun to see.

If you can find a way to Identity Enable the mashup, that would be a plus!

Technorati Tags: ,
,
,
,

Comments Off on Mashup – Cattle or Sheep vs. People . Permalink . Trackback URL
 

Welcome Mike Wyatt!

Identity
Author: Mark Dixon
Tuesday, October 10, 2006
3:28 am

Please join me in welcoming Mike Wyatt to the blogosphere. He launched his blog with a thought-provoking article entitled “Identity Implementations and the Cone of Uncertainty.” I’m sure we will all benefit from Mike’s insight from his vantage point as an experienced veteran in the implementation of enterprise software. One of the key contributors who came to Sun through the Waveset aquisition, Mike is now Director of Architecture and Enablement Services for Sun’s US Software Practice.

Mike, sorry that I don’t have a good photo of you. That will have to come later!

Technorati Tags: ,
,
,
,

Comments Off on Welcome Mike Wyatt! . Permalink . Trackback URL
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.