SlideShare una empresa de Scribd logo
1 de 24
Scaling Identity, Access, and Audit Controls
To Internet Proportions
Mike Neuenschwander
Important Notices


• I’m now at
         • Buy me a drink sometime and I’ll tell you about it!


• We’re doing some cool stuff at Oracle
         • So you should definitely buy more Oracle products
         • </commercial>




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   2
A Modern Instance…


• Talking about scale in the Internet
  age: a good problem to have!




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   3
Questions of Scale
When the coefficient of management overhead can’t be ignored
• How does an organization connect 70,000 partners in a year?
         • And maintain them?
• How can an organization manage 200 million users?
         • With a turn-over rate >20% annually?
• How much hardware is required to support 10 million entitlements?
         • And 1 million roles?
         • How can I provide auditors evidence of compliance at this scale?
• For Internet scale, how efficient do admins need to be?
         • How many admins are needed?


• Bottom line: Today’s I&AM tooling isn’t up to the task

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   4
Relativity & Scale
• Einstein’s theory of Special Relativity
         • Showed how relativistic effects applied to objects at very high
           speeds


• Similar thinking is needed
  for scaling identity
         • Classical model breaks down
           at high scale




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   5
Relativistic Effects are Costly at High Scale
Cost model for identity management
         • Successful system = more users 
         • But you’ll need more resources, too 
                    • Administrators, help desks, auditors, infrastructure, money, etc.
         • At scale, complexity amplifies costs
                    • And sends quality to the brink of chaos
                                                                                                                Cost per user




                                     Quality of service                                                         Number of users


                                                            Complexity
                                                                                                           = chaos!


Copyright © 2012, Oracle and/or its affiliates. All right
                                                                 Oracle Confidential – Do Not Distribute                          6
Relativistic Effects are Costly at High Scale
Software development is a function of user count, too
         • Cost justification of administration, security, controls
            • Too expensive and constraining to build strong controls at beginning
            • Only go back to fix the system after it breaks
                               •      Which is the worst time to attempt fixing the problem



                                                                                                      Risk

                                                                                                         Cost of security features



                                                                           Revenue
                                        Beta                    1.0           2.0
Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                                  7
Relativistic Effects are Costly at High Scale
Can systems become more resilient and secure with scale?
         • In dynamically resilient systems,
             • Each additional user introduces a net benefit (rather than a cost) to the system
             • Cohesion improves with the addition of each node
             • Resilience is built-in and scales from 10 users to billions of users


                                                                                                                      Number of users


                                                                                               Resilience



                                                                                                      Cost per user



Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                                     8
Relativistic Effects are Costly at High Scale
• Precedents for dynamically resilient systems
         • Examples include
            • BitTorrent
            • SETI@home
            • Social networks
            • E-mail
            • The WWW
• No perfect systems
         • No single system exhibits all characteristics of dynamic resilience


• To meet high scale requirements, we need a new approach
Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   9
The Role of Administrator
@ Internet Scale
• Enterprise I&AM market today
         • Focused on making administrators more
           efficient
         • That is to say, I&AM enshrines the
           administrative role
• Administrators should manage the
  infrastructure, not the population
         • Prevalence of administrators indicates
           something went wrong
• Ergo: If adding users requires more
  admins, it’s broke already!



Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   10
A Word on Chaotic Expansion


 ―As networks become more interconnected and complex, they
 simply cannot be centrally controlled…. In the case of
   the Net, it is designed to grow arbitrarily large and diverse
 because all of the components are not dependenton
 one another. Every new user or new device does not have
 to have the permission of other devices to be added to the
                             network.‖

                                                                                      — John Clippinger, A Crowd of One
Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                       11
Relying on Pro-Sociality


   Appropriators are active participants in creating the
dilemmas that they face, and under certain conditions, if
  given the opportunity, active participants in resolving
 them. They are not inevitably or hopelessly trapped in
  untenable situations from which only external agents
                   can extricate them.

                                                                                                                       — EdellaSchlager
                                                                                          from ―Collective Cooperation in Common Pool Resources‖


Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                                                12
Security isn’t always structural
Other forces at play

• Just because something can be stolen doesn’t mean
  it will be
         • Mikey’s law
• In defense of weak security
         • Maybe this security is sufficient
           for the society in which it’s used
         • It’s a place I’d like to live in!




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   13
Why isn’t defection rampant?
Betrayal doesn’t occur as much as it could


• What keeps people from ―defecting‖ in relationships?
         •      Locks and security systems?
         •      Identification programs?
         •      Police?
         •      Contracts?
• These things can help, but don’t entirely explain
  human behavior
         • They can also cause blowback

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   14
What forces bridle self-interest?
Why do bad things not happen when they easily could?


         • Altruism and Brownian motion
            • You will see a multitude of tiny particles mingling in a multitude
               of ways... their dancing is an actual indication of underlying
               movements of matter that are hidden from our sight...
                                   • From Lucretius's On the Nature of Things

         • Why are people altruistic?
            • Or at least social?
            • Or at least peaceful?
         • Why do people cooperate?

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   15
Let’s agree to call it “trust”
Short for “multilateral, durable collaborative action”


• Trust is not synonymous with hope
         … Or faith or belief
         … Or voodoo
         … Or touchy-feely
         … Or, for that matter, cryptographic algorithms
• A multilateral, durable collaborative action
         • A relationship in which participants are cooperatively working for a
           benefit, even when the roles, risks, and rewards differ
• If trust regulates defections in relations…
         • Can trust be cultivated?

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   16
What Model Scales Best:
Hub and spoke or mesh?




                                Distrust                                                              Trust

Copyright © 2011, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute           17
Trust and Distrust: Not Polar Opposites
Approaches with vastly different methods
Distrustful                                                                Trustful
Command-control                                                            Roles and shared duties distributed among participants
Emphasis on security                                                       Emphasis on transparency to parties
Dependency on a provider                                                   Each party assesses the others’ capabilities
1 big player (alpha player)                                                Distributed roles and responsibilities
Explicit contracts, frequent checkpoints,                                  Transparency among participants
vigilance
Broad swath                                                                Fine grained and nuanced
Hierarchical                                                               Matrixed
Formal                                                                     Informal
Regulation                                                                 Informal rules, agreements
Coercion                                                                   Cooperation
Structural solutions                                                       Collaborative solutions

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute                                 18
Instruments of Cooperation
     The tools in use affect the relationship

Tools of distrust                                             Tools of trust
• Identification card, identity assurance, encryption,        • Reputation, reciprocity, empathy, signaling,
  rights, management, access control, policy                    collaborative action, recognition, shared
                                                                experience, social interactions, ceremony,
                                                                connection




                                      Oracle Confidential – Do Not Distribute                                  19
Interaction of Trust and Distrust
Harmonic Resonance and Interference

• Resonance                                       • Interference
  • A system of distrust may                            • A system of distrust may
    improve systems of trust when                         interfere with trust when
     • It defines a boundary within                            • It cultivates an environment of
       which laws are enforced                                   suspicion and negative social
     • It systematically defines process                         emotions
       for arbitration




                         Oracle Confidential – Do Not Distribute                                   20
Can Trust be Trusted?
While not always feasible, the trustful model is stable

• Highly trustful relationships
         • Are inherently more resilient and secure than distrustful
           relationships
         • Are better at problem solving than distrustful relationships
• Nevertheless, our industry is over-invested in distrust
         • Which makes us look a bit funny




Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   21
A theory of trust
Principles for cultivating trust

• ElinorOstrom observed that governance of a shared resource is
  sustainable if the following design principles are adhered to:

         • Exclusion – The group must be able to guard the resource from free loading,
           theft, or vandalism.
         • Rationality – The agreed upon rules must be attuned to the context of the
           resource
         • Involvement – Members have avenues to participate in modifying operational
           rules
         • Monitoring – Effective monitoring and auditing or policies
         • Enforcement – Sanctions can be imposed on violators of the rules
         • Arbitration – Appropriators have access to low cost, but effective conflict
           resolution
         • Autonomy – The rights of appropriators to devise their own institutions are not
           challenged by external governmental authorities

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   22
The Proposal: Trust as a Protocol
Rules of engagement for the modern era
• The new Trust Anchor: ―Trust Protocol‖
         • Don’t need to trust the other party (human or not)
            • Just need to reliably believe that if you conduct your relationship according to
               the trust protocol, you’re less likely to get screwed over
         • The role of the trust protocol is to promote collaborative outcomes
            • Incentives to cooperate
            • Demonstrably lower defection rates compared with distrust & no-trust models
         • Not just out-of-band documents, agreements, standards, and specifications
            • Built right into the very fabric of the Internet
• The new Actors: Personas
         • All actors are personas,
            • NOT natural persons, companies, governments, viruses, or malware
         • Personas must be registered

Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   23
References
• Sources to find other sources
         • My blogs (past and current)
            • http://hybridvigor.org/author/mike/
            • identityblog.burtongroup.com
            • https://blogs.oracle.com/OracleIDM/
         • My reports & presentations
            • http://www.cloudidentitysummit.com/Presentations-2010.cfm

         • Bruce Schneier’s new book
            • Liars & Outliers: Enabling the Trust that Society Needs to
              Thrive



Copyright © 2012, Oracle and/or its affiliates. All right
                                                            Oracle Confidential – Do Not Distribute   24

Más contenido relacionado

La actualidad más candente

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copyOracleIDM
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementNishant Kaushik
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-extOracleIDM
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0debbanerjee
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst WaltherCardinaleWay Mazda
 

La actualidad más candente (17)

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
 

Destacado

Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)Miguel Rosario
 
Upload.ppt
Upload.pptUpload.ppt
Upload.pptMay Mei
 
Аюрведические комплексы ТРАДО
Аюрведические комплексы ТРАДОАюрведические комплексы ТРАДО
Аюрведические комплексы ТРАДОЕлена Шальнова
 
Assignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute ManagementAssignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute ManagementJyotpreet Kaur
 
Thoughts for 365 days
Thoughts for 365 daysThoughts for 365 days
Thoughts for 365 daysMb Narayanan
 
Global hotel market sentiment survey 2012
Global hotel market sentiment survey 2012Global hotel market sentiment survey 2012
Global hotel market sentiment survey 2012evisionturism
 
Access PA and interlibrary loans
Access PA and interlibrary loansAccess PA and interlibrary loans
Access PA and interlibrary loansFrances Vita
 
Java peresentation new soft
Java peresentation new softJava peresentation new soft
Java peresentation new softMohamed Refaat
 
Lashou's Roadshow Presentation
Lashou's Roadshow PresentationLashou's Roadshow Presentation
Lashou's Roadshow PresentationF. Steven Ogunro
 
Не все базы данных одинаково полезны
Не все базы данных одинаково полезныНе все базы данных одинаково полезны
Не все базы данных одинаково полезныSergey Xek
 
Hmatrixchinavsindia phpapp01
Hmatrixchinavsindia phpapp01Hmatrixchinavsindia phpapp01
Hmatrixchinavsindia phpapp01Shantilal Hajeri
 

Destacado (20)

Респиблисс сироп
Респиблисс сиропРеспиблисс сироп
Респиблисс сироп
 
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
Voto de Gilmar Mendes - 2005 (arquivo completo - todos os votos)
 
Upload.ppt
Upload.pptUpload.ppt
Upload.ppt
 
Аюрведические комплексы ТРАДО
Аюрведические комплексы ТРАДОАюрведические комплексы ТРАДО
Аюрведические комплексы ТРАДО
 
Assignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute ManagementAssignment 1 - Certification in Dispute Management
Assignment 1 - Certification in Dispute Management
 
Para_Laura
Para_LauraPara_Laura
Para_Laura
 
Thoughts for 365 days
Thoughts for 365 daysThoughts for 365 days
Thoughts for 365 days
 
Global hotel market sentiment survey 2012
Global hotel market sentiment survey 2012Global hotel market sentiment survey 2012
Global hotel market sentiment survey 2012
 
Fails!
Fails!Fails!
Fails!
 
市長直轄プロジェクトの設置 2013.11.20.
市長直轄プロジェクトの設置 2013.11.20.市長直轄プロジェクトの設置 2013.11.20.
市長直轄プロジェクトの設置 2013.11.20.
 
Access PA and interlibrary loans
Access PA and interlibrary loansAccess PA and interlibrary loans
Access PA and interlibrary loans
 
Java peresentation new soft
Java peresentation new softJava peresentation new soft
Java peresentation new soft
 
Asw feb13 low
Asw feb13 lowAsw feb13 low
Asw feb13 low
 
Lashou's Roadshow Presentation
Lashou's Roadshow PresentationLashou's Roadshow Presentation
Lashou's Roadshow Presentation
 
Не все базы данных одинаково полезны
Не все базы данных одинаково полезныНе все базы данных одинаково полезны
Не все базы данных одинаково полезны
 
Ch04
Ch04Ch04
Ch04
 
What is your story
What is your storyWhat is your story
What is your story
 
Paganini
PaganiniPaganini
Paganini
 
Deep Dive Into Quantum
Deep Dive Into QuantumDeep Dive Into Quantum
Deep Dive Into Quantum
 
Hmatrixchinavsindia phpapp01
Hmatrixchinavsindia phpapp01Hmatrixchinavsindia phpapp01
Hmatrixchinavsindia phpapp01
 

Similar a Scaling identity to internet proportions

Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder ConcernsWhose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder Concernssferoz
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...Janine Anthony Bowen, Esq.
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssRex Wang
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...eurocloud
 
New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!Khazret Sapenov
 
New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!Tri Tuns
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012Warpcare
 
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...InSync2011
 
Migrating from Java EE to cloud-native Reactive systems
Migrating from Java EE to cloud-native Reactive systemsMigrating from Java EE to cloud-native Reactive systems
Migrating from Java EE to cloud-native Reactive systemsMarkus Eisele
 
Migrating From Java EE To Cloud-Native Reactive Systems
Migrating From Java EE To Cloud-Native Reactive SystemsMigrating From Java EE To Cloud-Native Reactive Systems
Migrating From Java EE To Cloud-Native Reactive SystemsLightbend
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoPowered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoGeneXus
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
MySQL HA Solutions
MySQL HA SolutionsMySQL HA Solutions
MySQL HA SolutionsMat Keep
 
Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014Tech Summit PR 2014
 
Scaling unstable systems velocity 2015
Scaling unstable systems   velocity 2015Scaling unstable systems   velocity 2015
Scaling unstable systems velocity 2015Siddharth Ram
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013Moshe Ferber
 

Similar a Scaling identity to internet proportions (20)

Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder ConcernsWhose View is it Anyway: Addressing Multiple Stakeholder Concerns
Whose View is it Anyway: Addressing Multiple Stakeholder Concerns
 
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
The Business Case for Cloud: Critical Legal, Business, & Diligence Considerat...
 
Cloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ssCloud expo 10 myths rex wang oracle ss
Cloud expo 10 myths rex wang oracle ss
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...Congress 2012:  Enterprise Cloud Adoption – an Evolution from Infrastructure ...
Congress 2012: Enterprise Cloud Adoption – an Evolution from Infrastructure ...
 
New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!New Challenges in Cloud Adoption - The Users!
New Challenges in Cloud Adoption - The Users!
 
New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!New Challenges in Could Adoption - The Users!
New Challenges in Could Adoption - The Users!
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
 
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
JDE & Peoplesoft 1 _ Roland Slee & Doug Hughes _ Oracle's Cloud Computing Str...
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
 
Migrating from Java EE to cloud-native Reactive systems
Migrating from Java EE to cloud-native Reactive systemsMigrating from Java EE to cloud-native Reactive systems
Migrating from Java EE to cloud-native Reactive systems
 
Migrating From Java EE To Cloud-Native Reactive Systems
Migrating From Java EE To Cloud-Native Reactive SystemsMigrating From Java EE To Cloud-Native Reactive Systems
Migrating From Java EE To Cloud-Native Reactive Systems
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundoPowered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
Powered by Oracle! Te ayudamos a distribuir tu aplicación en todo el mundo
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
MySQL HA Solutions
MySQL HA SolutionsMySQL HA Solutions
MySQL HA Solutions
 
Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014Oracle presentation at Tech Summit PR 2014
Oracle presentation at Tech Summit PR 2014
 
Scaling unstable systems velocity 2015
Scaling unstable systems   velocity 2015Scaling unstable systems   velocity 2015
Scaling unstable systems velocity 2015
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 

Más de OracleIDM

Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 

Más de OracleIDM (20)

Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Scaling identity to internet proportions

  • 1. Scaling Identity, Access, and Audit Controls To Internet Proportions Mike Neuenschwander
  • 2. Important Notices • I’m now at • Buy me a drink sometime and I’ll tell you about it! • We’re doing some cool stuff at Oracle • So you should definitely buy more Oracle products • </commercial> Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 2
  • 3. A Modern Instance… • Talking about scale in the Internet age: a good problem to have! Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 3
  • 4. Questions of Scale When the coefficient of management overhead can’t be ignored • How does an organization connect 70,000 partners in a year? • And maintain them? • How can an organization manage 200 million users? • With a turn-over rate >20% annually? • How much hardware is required to support 10 million entitlements? • And 1 million roles? • How can I provide auditors evidence of compliance at this scale? • For Internet scale, how efficient do admins need to be? • How many admins are needed? • Bottom line: Today’s I&AM tooling isn’t up to the task Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 4
  • 5. Relativity & Scale • Einstein’s theory of Special Relativity • Showed how relativistic effects applied to objects at very high speeds • Similar thinking is needed for scaling identity • Classical model breaks down at high scale Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 5
  • 6. Relativistic Effects are Costly at High Scale Cost model for identity management • Successful system = more users  • But you’ll need more resources, too  • Administrators, help desks, auditors, infrastructure, money, etc. • At scale, complexity amplifies costs • And sends quality to the brink of chaos Cost per user Quality of service Number of users Complexity = chaos! Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 6
  • 7. Relativistic Effects are Costly at High Scale Software development is a function of user count, too • Cost justification of administration, security, controls • Too expensive and constraining to build strong controls at beginning • Only go back to fix the system after it breaks • Which is the worst time to attempt fixing the problem Risk Cost of security features Revenue Beta 1.0 2.0 Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 7
  • 8. Relativistic Effects are Costly at High Scale Can systems become more resilient and secure with scale? • In dynamically resilient systems, • Each additional user introduces a net benefit (rather than a cost) to the system • Cohesion improves with the addition of each node • Resilience is built-in and scales from 10 users to billions of users Number of users Resilience Cost per user Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 8
  • 9. Relativistic Effects are Costly at High Scale • Precedents for dynamically resilient systems • Examples include • BitTorrent • SETI@home • Social networks • E-mail • The WWW • No perfect systems • No single system exhibits all characteristics of dynamic resilience • To meet high scale requirements, we need a new approach Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 9
  • 10. The Role of Administrator @ Internet Scale • Enterprise I&AM market today • Focused on making administrators more efficient • That is to say, I&AM enshrines the administrative role • Administrators should manage the infrastructure, not the population • Prevalence of administrators indicates something went wrong • Ergo: If adding users requires more admins, it’s broke already! Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 10
  • 11. A Word on Chaotic Expansion ―As networks become more interconnected and complex, they simply cannot be centrally controlled…. In the case of the Net, it is designed to grow arbitrarily large and diverse because all of the components are not dependenton one another. Every new user or new device does not have to have the permission of other devices to be added to the network.‖ — John Clippinger, A Crowd of One Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 11
  • 12. Relying on Pro-Sociality Appropriators are active participants in creating the dilemmas that they face, and under certain conditions, if given the opportunity, active participants in resolving them. They are not inevitably or hopelessly trapped in untenable situations from which only external agents can extricate them. — EdellaSchlager from ―Collective Cooperation in Common Pool Resources‖ Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 12
  • 13. Security isn’t always structural Other forces at play • Just because something can be stolen doesn’t mean it will be • Mikey’s law • In defense of weak security • Maybe this security is sufficient for the society in which it’s used • It’s a place I’d like to live in! Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 13
  • 14. Why isn’t defection rampant? Betrayal doesn’t occur as much as it could • What keeps people from ―defecting‖ in relationships? • Locks and security systems? • Identification programs? • Police? • Contracts? • These things can help, but don’t entirely explain human behavior • They can also cause blowback Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 14
  • 15. What forces bridle self-interest? Why do bad things not happen when they easily could? • Altruism and Brownian motion • You will see a multitude of tiny particles mingling in a multitude of ways... their dancing is an actual indication of underlying movements of matter that are hidden from our sight... • From Lucretius's On the Nature of Things • Why are people altruistic? • Or at least social? • Or at least peaceful? • Why do people cooperate? Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 15
  • 16. Let’s agree to call it “trust” Short for “multilateral, durable collaborative action” • Trust is not synonymous with hope … Or faith or belief … Or voodoo … Or touchy-feely … Or, for that matter, cryptographic algorithms • A multilateral, durable collaborative action • A relationship in which participants are cooperatively working for a benefit, even when the roles, risks, and rewards differ • If trust regulates defections in relations… • Can trust be cultivated? Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 16
  • 17. What Model Scales Best: Hub and spoke or mesh? Distrust Trust Copyright © 2011, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 17
  • 18. Trust and Distrust: Not Polar Opposites Approaches with vastly different methods Distrustful Trustful Command-control Roles and shared duties distributed among participants Emphasis on security Emphasis on transparency to parties Dependency on a provider Each party assesses the others’ capabilities 1 big player (alpha player) Distributed roles and responsibilities Explicit contracts, frequent checkpoints, Transparency among participants vigilance Broad swath Fine grained and nuanced Hierarchical Matrixed Formal Informal Regulation Informal rules, agreements Coercion Cooperation Structural solutions Collaborative solutions Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 18
  • 19. Instruments of Cooperation The tools in use affect the relationship Tools of distrust Tools of trust • Identification card, identity assurance, encryption, • Reputation, reciprocity, empathy, signaling, rights, management, access control, policy collaborative action, recognition, shared experience, social interactions, ceremony, connection Oracle Confidential – Do Not Distribute 19
  • 20. Interaction of Trust and Distrust Harmonic Resonance and Interference • Resonance • Interference • A system of distrust may • A system of distrust may improve systems of trust when interfere with trust when • It defines a boundary within • It cultivates an environment of which laws are enforced suspicion and negative social • It systematically defines process emotions for arbitration Oracle Confidential – Do Not Distribute 20
  • 21. Can Trust be Trusted? While not always feasible, the trustful model is stable • Highly trustful relationships • Are inherently more resilient and secure than distrustful relationships • Are better at problem solving than distrustful relationships • Nevertheless, our industry is over-invested in distrust • Which makes us look a bit funny Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 21
  • 22. A theory of trust Principles for cultivating trust • ElinorOstrom observed that governance of a shared resource is sustainable if the following design principles are adhered to: • Exclusion – The group must be able to guard the resource from free loading, theft, or vandalism. • Rationality – The agreed upon rules must be attuned to the context of the resource • Involvement – Members have avenues to participate in modifying operational rules • Monitoring – Effective monitoring and auditing or policies • Enforcement – Sanctions can be imposed on violators of the rules • Arbitration – Appropriators have access to low cost, but effective conflict resolution • Autonomy – The rights of appropriators to devise their own institutions are not challenged by external governmental authorities Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 22
  • 23. The Proposal: Trust as a Protocol Rules of engagement for the modern era • The new Trust Anchor: ―Trust Protocol‖ • Don’t need to trust the other party (human or not) • Just need to reliably believe that if you conduct your relationship according to the trust protocol, you’re less likely to get screwed over • The role of the trust protocol is to promote collaborative outcomes • Incentives to cooperate • Demonstrably lower defection rates compared with distrust & no-trust models • Not just out-of-band documents, agreements, standards, and specifications • Built right into the very fabric of the Internet • The new Actors: Personas • All actors are personas, • NOT natural persons, companies, governments, viruses, or malware • Personas must be registered Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 23
  • 24. References • Sources to find other sources • My blogs (past and current) • http://hybridvigor.org/author/mike/ • identityblog.burtongroup.com • https://blogs.oracle.com/OracleIDM/ • My reports & presentations • http://www.cloudidentitysummit.com/Presentations-2010.cfm • Bruce Schneier’s new book • Liars & Outliers: Enabling the Trust that Society Needs to Thrive Copyright © 2012, Oracle and/or its affiliates. All right Oracle Confidential – Do Not Distribute 24