SlideShare una empresa de Scribd logo
1 de 95
Descargar para leer sin conexión
WHAT IF IDENTITY WERE
PASS-BY-REFERENCE?
WHAT IF IDENTITY WERE
PASS-BY-REFERENCE?
A drama in text messages
HI, I'M BOB
I'M INTHE DRAMA
DEPARTMENT
I'M INTHE DRAMA
DEPARTMENT
At Citibank
WATCH THIS.
SHORT ATTENTION SPAN
SUMMARY
SHORT ATTENTION SPAN
SUMMARY
Passing a pointer to your identity
is a better idea
than passing your identity
TELL ME MORE...
TELL ME MORE...
I hear you cry
TEXTINGTHE CAR
DEALER
I'd like a car
I'd like a car
I have a Cadillac STS for
$32,000
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I can do that
TEXTINGTHE CAR DEALER
TEXTINGTHE CAR DEALER
If Identity Architects sold cars
I'd like a car
I'd like a car
That will be $52,000
I'd like a car
That will be $52,000
Here you go
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
It comes with a vinyl wrap
advertisingThe Gap.
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
It comes with a vinyl wrap
advertisingThe Gap.
And the radio plays Fox
News
YOUTHINK I'M BEING MEAN
YOUTHINK I'M BEING MEAN
DON'TYOU?
I'd like a social media
account
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
But you didn't hear that
from me. Tell them
Snowden told you.
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
But you didn't hear that
from me. Tell them
Snowden told you.
Seriously.
WHAT DOESTHE CAR DEALER KNOW...
WHAT DOESTHE CAR DEALER KNOW...
THATTHE IDENTITY ARCHITECT DOESN'T?
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I can do that
WHAT DOESTHE CAR DEALER KNOW...
THATTHE IDENTITY ARCHITECT DOESN'T?
The car dealer knows how to deal with counteroffers
TEXTINGTHE SERVICE PROVIDER
TEXTINGTHE SERVICE PROVIDER
If Identity Architects understood counteroffers
Identify me. Use this
@address and this #token
Identify me. Use this
@address and this #token
OK. Hang on
Identify me. Use this
@address and this #token
OK. Hang on
...
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
WAIT, WHAT?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
LIKE, ZOMG, RIGHT?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
MIND. BLOWN.
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Deal. Stephen Falken,Tiny
Island, Oregon
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Deal. Stephen Falken,Tiny
Island, Oregon
OK, but...
How do I know the guy who
sent me the token is really
Falken?
Send him this #challenge.
if he replies with this
#response, it's him.
How do I know the guy who
sent me the token is really
Falken?
Send him this #challenge.
if he replies with this
#response, it's him.
How do I know the guy who
sent me the token is really
Falken?
KTHXBAI
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
Greetings, Professor Falken.
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
Greetings, Professor Falken.
...
Would you like to play a
game?
API
IDENTITY
CONSUMER
identify_me()
IDENTITY
CONSUMER
identify_me()
IDENTITY
PRODUCER
identify_subject()
IDENTITY
CONSUMER
identify_me()
IDENTITY
PRODUCER
identify_subject()
SUBJECT
challenge()
PROTOCOL
IDC.identify_me
(*IDP, subject_token)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
response_token
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
response_token
RINSE AND REPEAT FOR NEGOTIATION
USE CASES
IDP =
subject
IDC
FIRST-PARTY REGISTRATION
IDP =
subject
IDC
FIRST-PARTY AUTHENTICATION
subject IDC
THIRD-PARTY REGISTRATION
IDP
subject IDC
THIRD-PARTY AUTHENTICATION
IDP
BENEFITS
No identity information is exchanged
until terms of use are negotiated
Both users and Identity Consumers
can state terms and negotiate
Phishing defense
via authentication of Identity Consumers
Simple, minimal "webdevified" API and protocol
Anonymity, pseudonymity, and "real names"
are supported using a single API and protocol
First- and third-party identity producers
are supported using a single API and protocol
Registration and authentication
are supported using a single API and protocol
BOB.BLAKLEY @ CITI.COM
THANK YOU
I'LL BE HAPPYTO ANSWERYOUR QUESTIONS

Más contenido relacionado

Destacado

CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CloudIDSummit
 
CIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCloudIDSummit
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCloudIDSummit
 
Strings and common operations
Strings and common operationsStrings and common operations
Strings and common operationsTurnToTech
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed AccessCloudIDSummit
 
Pass by value and pass by reference
Pass by value and pass by reference Pass by value and pass by reference
Pass by value and pass by reference TurnToTech
 
CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CloudIDSummit
 
Why C is Called Structured Programming Language
Why C is Called Structured Programming LanguageWhy C is Called Structured Programming Language
Why C is Called Structured Programming LanguageSinbad Konick
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCloudIDSummit
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in ActionCloudIDSummit
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCloudIDSummit
 
CIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCloudIDSummit
 

Destacado (14)

CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
 
CIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about It
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
 
Strings and common operations
Strings and common operationsStrings and common operations
Strings and common operations
 
CIS14: Id.me
CIS14: Id.meCIS14: Id.me
CIS14: Id.me
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed Access
 
Pass by value and pass by reference
Pass by value and pass by reference Pass by value and pass by reference
Pass by value and pass by reference
 
CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)
 
Why C is Called Structured Programming Language
Why C is Called Structured Programming LanguageWhy C is Called Structured Programming Language
Why C is Called Structured Programming Language
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
MFT_SOASuite_Pass_by_reference
MFT_SOASuite_Pass_by_referenceMFT_SOASuite_Pass_by_reference
MFT_SOASuite_Pass_by_reference
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
CIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCIS14: Google's Identity Toolkit
CIS14: Google's Identity Toolkit
 

Similar a CIS13 - What if Identity Was Pass-By-Reference?

Ten Things
Ten ThingsTen Things
Ten Thingslotrom
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't AskBillen
 
Skip the date quick start
Skip the date quick startSkip the date quick start
Skip the date quick startskipthedate
 
No One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNo One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNanaYaw1234
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointjehovahroi
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointcccbasel
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome PowerpointKay Antoine
 
Ten things god won't ask on that day
Ten things god won't ask on that dayTen things god won't ask on that day
Ten things god won't ask on that dayAjay Kumar Gupta
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontaskkeji
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't Asknath
 
Ten Things
Ten ThingsTen Things
Ten Thingstabeer
 
Ten Things GOD won't ask on that day
Ten Things GOD won't ask on that dayTen Things GOD won't ask on that day
Ten Things GOD won't ask on that daykashif Anwer
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointguestc1633a3
 
10 THINGS GOD WON\'T ASK...
10 THINGS GOD WON\'T ASK...10 THINGS GOD WON\'T ASK...
10 THINGS GOD WON\'T ASK...FIREMONKEY44
 
Awesome powerpoint
Awesome powerpointAwesome powerpoint
Awesome powerpointapril45
 

Similar a CIS13 - What if Identity Was Pass-By-Reference? (20)

Ten Things (Extd)
Ten Things (Extd)Ten Things (Extd)
Ten Things (Extd)
 
Ten Things
Ten ThingsTen Things
Ten Things
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't Ask
 
God Wldnt Ask
God Wldnt AskGod Wldnt Ask
God Wldnt Ask
 
Skip the date quick start
Skip the date quick startSkip the date quick start
Skip the date quick start
 
No One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNo One Can Make You Serve Customers Well
No One Can Make You Serve Customers Well
 
What god will not ask u about
What god will not ask u aboutWhat god will not ask u about
What god will not ask u about
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontask
 
Ten things god won't ask on that day
Ten things god won't ask on that dayTen things god won't ask on that day
Ten things god won't ask on that day
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontask
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't Ask
 
Ten Things
Ten ThingsTen Things
Ten Things
 
Ten Things GOD won't ask on that day
Ten Things GOD won't ask on that dayTen Things GOD won't ask on that day
Ten Things GOD won't ask on that day
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
10 THINGS GOD WON\'T ASK...
10 THINGS GOD WON\'T ASK...10 THINGS GOD WON\'T ASK...
10 THINGS GOD WON\'T ASK...
 
Awesome
AwesomeAwesome
Awesome
 
Awesome powerpoint
Awesome powerpointAwesome powerpoint
Awesome powerpoint
 

Más de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Último (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

CIS13 - What if Identity Was Pass-By-Reference?