SlideShare a Scribd company logo
WHAT IF IDENTITY WERE
PASS-BY-REFERENCE?
WHAT IF IDENTITY WERE
PASS-BY-REFERENCE?
A drama in text messages
HI, I'M BOB
I'M INTHE DRAMA
DEPARTMENT
I'M INTHE DRAMA
DEPARTMENT
At Citibank
WATCH THIS.
SHORT ATTENTION SPAN
SUMMARY
SHORT ATTENTION SPAN
SUMMARY
Passing a pointer to your identity
is a better idea
than passing your identity
TELL ME MORE...
TELL ME MORE...
I hear you cry
TEXTINGTHE CAR
DEALER
I'd like a car
I'd like a car
I have a Cadillac STS for
$32,000
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I can do that
TEXTINGTHE CAR DEALER
TEXTINGTHE CAR DEALER
If Identity Architects sold cars
I'd like a car
I'd like a car
That will be $52,000
I'd like a car
That will be $52,000
Here you go
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
It comes with a vinyl wrap
advertisingThe Gap.
I'd like a car
That will be $52,000
Here you go
Here's your white Ford
Escort.
It comes with a vinyl wrap
advertisingThe Gap.
And the radio plays Fox
News
YOUTHINK I'M BEING MEAN
YOUTHINK I'M BEING MEAN
DON'TYOU?
I'd like a social media
account
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
But you didn't hear that
from me. Tell them
Snowden told you.
I'd like a social media
account
Send me your name, email,
SSN, Credit Card, and phone
Here you go
Here's your account.
You want cheapViagra?
You'll be hearing from the
FISA Court
But you didn't hear that
from me. Tell them
Snowden told you.
Seriously.
WHAT DOESTHE CAR DEALER KNOW...
WHAT DOESTHE CAR DEALER KNOW...
THATTHE IDENTITY ARCHITECT DOESN'T?
I'd like a car
I have a Cadillac STS for
$32,000
I like the STS, but I'm only
willing to pay $27,000
OK, but you'll have to get
the LE package with 4
cylinders
OK. I'll take the red one. I'd
like to finance over 4 years
That loan is at 6.25%
I want 5.5%
I can do that
WHAT DOESTHE CAR DEALER KNOW...
THATTHE IDENTITY ARCHITECT DOESN'T?
The car dealer knows how to deal with counteroffers
TEXTINGTHE SERVICE PROVIDER
TEXTINGTHE SERVICE PROVIDER
If Identity Architects understood counteroffers
Identify me. Use this
@address and this #token
Identify me. Use this
@address and this #token
OK. Hang on
Identify me. Use this
@address and this #token
OK. Hang on
...
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
WAIT, WHAT?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
LIKE, ZOMG, RIGHT?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
MIND. BLOWN.
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Deal. Stephen Falken,Tiny
Island, Oregon
Maybe. Who are you?
Hey @address! Some dude
says you can identify him
using this #token
My name is @WOPR
What do you want to know?
#name and #address
What will you use it for?
FedEx. AndViagra ads.
That'll be $50
Whoa. Just FedEx?
Deal. Stephen Falken,Tiny
Island, Oregon
OK, but...
How do I know the guy who
sent me the token is really
Falken?
Send him this #challenge.
if he replies with this
#response, it's him.
How do I know the guy who
sent me the token is really
Falken?
Send him this #challenge.
if he replies with this
#response, it's him.
How do I know the guy who
sent me the token is really
Falken?
KTHXBAI
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
Greetings, Professor Falken.
...
Identify me. Use this
@address and this #token
OK. Hang on
Answer this #challenge
#response
Greetings, Professor Falken.
...
Would you like to play a
game?
API
IDENTITY
CONSUMER
identify_me()
IDENTITY
CONSUMER
identify_me()
IDENTITY
PRODUCER
identify_subject()
IDENTITY
CONSUMER
identify_me()
IDENTITY
PRODUCER
identify_subject()
SUBJECT
challenge()
PROTOCOL
IDC.identify_me
(*IDP, subject_token)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
response_token
IDC.identify_me
(*IDP, subject_token)
IDP.identify_subject
(subject_token, IDPname,
requested_subject_attrs,
requested_uses)
subject_attrs, restrictions,
challenge_token,
response_token
subject.challenge
(challenge_token)
response_token
RINSE AND REPEAT FOR NEGOTIATION
USE CASES
IDP =
subject
IDC
FIRST-PARTY REGISTRATION
IDP =
subject
IDC
FIRST-PARTY AUTHENTICATION
subject IDC
THIRD-PARTY REGISTRATION
IDP
subject IDC
THIRD-PARTY AUTHENTICATION
IDP
BENEFITS
No identity information is exchanged
until terms of use are negotiated
Both users and Identity Consumers
can state terms and negotiate
Phishing defense
via authentication of Identity Consumers
Simple, minimal "webdevified" API and protocol
Anonymity, pseudonymity, and "real names"
are supported using a single API and protocol
First- and third-party identity producers
are supported using a single API and protocol
Registration and authentication
are supported using a single API and protocol
BOB.BLAKLEY @ CITI.COM
THANK YOU
I'LL BE HAPPYTO ANSWERYOUR QUESTIONS

More Related Content

Viewers also liked

CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CloudIDSummit
 
CIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCloudIDSummit
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCloudIDSummit
 
Strings and common operations
Strings and common operationsStrings and common operations
Strings and common operationsTurnToTech
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed AccessCloudIDSummit
 
Pass by value and pass by reference
Pass by value and pass by reference Pass by value and pass by reference
Pass by value and pass by reference TurnToTech
 
CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CloudIDSummit
 
Why C is Called Structured Programming Language
Why C is Called Structured Programming LanguageWhy C is Called Structured Programming Language
Why C is Called Structured Programming LanguageSinbad Konick
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCloudIDSummit
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in ActionCloudIDSummit
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCloudIDSummit
 
CIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCloudIDSummit
 

Viewers also liked (14)

CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
CIS14: Baking Fine-Grained Authorization Into Your Apps and APIs using ALFA, ...
 
CIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about ItCIS14: Continuous Authentication: Don’t Even Think about It
CIS14: Continuous Authentication: Don’t Even Think about It
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
 
Strings and common operations
Strings and common operationsStrings and common operations
Strings and common operations
 
CIS14: Id.me
CIS14: Id.meCIS14: Id.me
CIS14: Id.me
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed Access
 
Pass by value and pass by reference
Pass by value and pass by reference Pass by value and pass by reference
Pass by value and pass by reference
 
CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)CIS 2014: Azure Active Directory (Sean Deuby)
CIS 2014: Azure Active Directory (Sean Deuby)
 
Why C is Called Structured Programming Language
Why C is Called Structured Programming LanguageWhy C is Called Structured Programming Language
Why C is Called Structured Programming Language
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
MFT_SOASuite_Pass_by_reference
MFT_SOASuite_Pass_by_referenceMFT_SOASuite_Pass_by_reference
MFT_SOASuite_Pass_by_reference
 
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity LifecycleCIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle
 
CIS14: Google's Identity Toolkit
CIS14: Google's Identity ToolkitCIS14: Google's Identity Toolkit
CIS14: Google's Identity Toolkit
 

Similar to CIS13 - What if Identity Was Pass-By-Reference?

Ten Things
Ten ThingsTen Things
Ten Thingslotrom
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't AskBillen
 
Skip the date quick start
Skip the date quick startSkip the date quick start
Skip the date quick startskipthedate
 
No One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNo One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNanaYaw1234
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointjehovahroi
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointcccbasel
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome PowerpointKay Antoine
 
Awesome powerpoint
Awesome powerpointAwesome powerpoint
Awesome powerpointblacksense
 
Awesome power point
Awesome power pointAwesome power point
Awesome power pointFatema Misri
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontaskmardak2
 
Ten Things God won't ask that Day!
Ten Things God won't ask that Day!Ten Things God won't ask that Day!
Ten Things God won't ask that Day!islamstar786
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpointguest0d2cd1
 
Ten things god won't ask on that day
Ten things god won't ask on that dayTen things god won't ask on that day
Ten things god won't ask on that dayAjay Kumar Gupta
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontaskkeji
 

Similar to CIS13 - What if Identity Was Pass-By-Reference? (20)

Ten Things (Extd)
Ten Things (Extd)Ten Things (Extd)
Ten Things (Extd)
 
Ten Things
Ten ThingsTen Things
Ten Things
 
Ten Things God Won't Ask
Ten Things God Won't AskTen Things God Won't Ask
Ten Things God Won't Ask
 
God Wldnt Ask
God Wldnt AskGod Wldnt Ask
God Wldnt Ask
 
Skip the date quick start
Skip the date quick startSkip the date quick start
Skip the date quick start
 
No One Can Make You Serve Customers Well
No One Can Make You Serve Customers WellNo One Can Make You Serve Customers Well
No One Can Make You Serve Customers Well
 
What god will not ask u about
What god will not ask u aboutWhat god will not ask u about
What god will not ask u about
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontask
 
Awesome powerpoint
Awesome powerpointAwesome powerpoint
Awesome powerpoint
 
Awesome power point
Awesome power pointAwesome power point
Awesome power point
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontask
 
God Will Ask
God Will AskGod Will Ask
God Will Ask
 
Ten Things God won't ask that Day!
Ten Things God won't ask that Day!Ten Things God won't ask that Day!
Ten Things God won't ask that Day!
 
Awesome
AwesomeAwesome
Awesome
 
Awesome Powerpoint
Awesome PowerpointAwesome Powerpoint
Awesome Powerpoint
 
Ten things god won't ask on that day
Ten things god won't ask on that dayTen things god won't ask on that day
Ten things god won't ask on that day
 
Tenthingsgodwontask
TenthingsgodwontaskTenthingsgodwontask
Tenthingsgodwontask
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 

Recently uploaded (20)

Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 

CIS13 - What if Identity Was Pass-By-Reference?