Cloud Based Identity Management

Karri Huhtanen
Karri HuhtanenManaging Director em Radiator Software Oy (Arch Red Oy+Open System Consultants Pty Ltd)
Cloud based identity
   management
    Karri Huhtanen
     Arch Red Oy
       20.2.2012
Cloud based identity
            management
user/guest user accounts,              cloud =
 user profiles, user roles,   outside your own network
   access control, rules,
policies, roaming control,     service / cloud service
  identity federation and      provider, private cloud
 policy control, customer     network, but managed by
 service usernames etc.        someone else than you

  your own network,               their network,
   your own effort,                 their effort,
  your own problem,               their problem,
   your own costs                service contract
Benefits for
 identity service customers
• Managing, configuring, securing, developing and
    problem solving, even end customer support is identity
    service provider’s problem

•   Contracts to handle security, service levels and
    availability

•   Makes it easier to concentrate into own service and
    product development or production, not the
    infrastructure configuration

•   When the applications and services you use are already
    in the cloud, should not your identity be there too?
Benefits for (cloud)
identity service providers
• One place, one interface, one infrastructure and
    one service to be developed and maintained to
    customers.

•   Multiple customers utilising and paying for the
    same service (without even additional work per
    customer).

•   Lower needs for customisation. A customisation,
    which can be generalised can be turned to a
    revenue creating service also for other customers.

•   Stronger relationship with customer
Markets
• Gartner estimates Network Access Control
  market size 221M$ (2008) with 51% growth
  from 2007 due to weak economy (100%
  predicted earlier)
• Forrester estimates more than 20% growth in
  IdM market annually from about $2.6 billion
  worldwide in 2006 to more than $12.3 billion
  by 2014.
Arch Red Oy
• We have been designing, building and
  running access control and roaming
  infrastructure services over Internet (in
  cloud) for service providers since 2004.
• We are a small Internet engineering
  company with big customers.
• We are here to help you to get a slice of that
  business or help you to utilise these services.
Thank you. Questions?

 my contact information:

   Karri Huhtanen
   firstname.surname@archred.com


  khuhtanen in Twitter

http://www.archred.com/
1 de 7

Mais conteúdo relacionado

Mais procurados

TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityRobb Boyd
443 visualizações21 slides
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
5.7K visualizações47 slides
Brocade/VMware Customer Presentation Brocade/VMware Customer Presentation
Brocade/VMware Customer Presentation Brocade
1.5K visualizações18 slides
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WANADVA
4.1K visualizações21 slides

Mais procurados(20)

TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
Robb Boyd443 visualizações
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
Sleek International1.6K visualizações
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
Cisco Canada5.7K visualizações
Brocade/VMware Customer Presentation Brocade/VMware Customer Presentation
Brocade/VMware Customer Presentation
Brocade1.5K visualizações
Unravelling Managed SD-WAN ServicesUnravelling Managed SD-WAN Services
Unravelling Managed SD-WAN Services
Ralph Santitoro248 visualizações
SD-WAN 2.0: Building a Better SD-WANSD-WAN 2.0: Building a Better SD-WAN
SD-WAN 2.0: Building a Better SD-WAN
ADVA4.1K visualizações
China Telecom Americas:  SD-WAN OverviewChina Telecom Americas:  SD-WAN Overview
China Telecom Americas: SD-WAN Overview
Vlad Sinayuk814 visualizações
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik3.4K visualizações
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
sangusajjan412 visualizações
SD-WAN for Service Providers - VeloCloudSD-WAN for Service Providers - VeloCloud
SD-WAN for Service Providers - VeloCloud
VeloCloud Networks, Inc.5.8K visualizações
SD WANSD WAN
SD WAN
Nithin Babu108 visualizações
Virtual private network Virtual private network
Virtual private network
Parth Akbari3.6K visualizações
Virtual private network 03Virtual private network 03
Virtual private network 03
Noman khan384 visualizações
WiFi – Mobile BNG Offload DeploymentsWiFi – Mobile BNG Offload Deployments
WiFi – Mobile BNG Offload Deployments
Cisco Canada3.2K visualizações
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
Cisco Canada10K visualizações
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
Laurent Daudré-Vignier3.9K visualizações
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
Abhinav Dwivedi256 visualizações
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
Toshal Dudhwala2.5K visualizações

Similar a Cloud Based Identity Management

Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
1.5K visualizações42 slides
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptxnada542773
5 visualizações30 slides
Cloud ComputingCloud Computing
Cloud ComputingMerisCon ARTDesign
404 visualizações40 slides
Microsoft Azure Cloud fundamentalsMicrosoft Azure Cloud fundamentals
Microsoft Azure Cloud fundamentalsANURAG SINGH
153 visualizações32 slides
CC UNIT-2.pptxCC UNIT-2.pptx
CC UNIT-2.pptxkarthik930637
10 visualizações37 slides

Similar a Cloud Based Identity Management(20)

Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
Arun Ganesh1.5K visualizações
IT4651w-CC-1b-Introduction.pptxIT4651w-CC-1b-Introduction.pptx
IT4651w-CC-1b-Introduction.pptx
nada5427735 visualizações
Cloud ComputingCloud Computing
Cloud Computing
MerisCon ARTDesign404 visualizações
Microsoft Azure Cloud fundamentalsMicrosoft Azure Cloud fundamentals
Microsoft Azure Cloud fundamentals
ANURAG SINGH153 visualizações
CC UNIT-2.pptxCC UNIT-2.pptx
CC UNIT-2.pptx
karthik93063710 visualizações
Hybrid IT Operations and the Hybrid CloudHybrid IT Operations and the Hybrid Cloud
Hybrid IT Operations and the Hybrid Cloud
Vistara1.9K visualizações
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
AFCOM297 visualizações
Leveraging Cloud Service Brokers ITEXPOLeveraging Cloud Service Brokers ITEXPO
Leveraging Cloud Service Brokers ITEXPO
RAD-INFO, Inc.653 visualizações
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK375 visualizações
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
Anne Starr87 visualizações
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
Ajay84495 visualizações
Cloud computing v3 mar 2016Cloud computing v3 mar 2016
Cloud computing v3 mar 2016
Roshan Goolaup212 visualizações
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
Brandon Dunlap2.4K visualizações
Cloud computingCloud computing
Cloud computing
Razib M3.7K visualizações
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Standards Customer Council662 visualizações
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
Anne Starr155 visualizações
Cloud computing explained Cloud computing explained
Cloud computing explained
Juan Pablo 981 visualizações

Mais de Karri Huhtanen(20)

Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and Privacy
Karri Huhtanen63 visualizações
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPort
Karri Huhtanen100 visualizações
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistukset
Karri Huhtanen14 visualizações
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for All
Karri Huhtanen30 visualizações
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroam
Karri Huhtanen170 visualizações
Cooperative labs, testbeds and networksCooperative labs, testbeds and networks
Cooperative labs, testbeds and networks
Karri Huhtanen190 visualizações
Privacy and traceability in Wi-Fi networksPrivacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networks
Karri Huhtanen164 visualizações
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)
Karri Huhtanen262 visualizações
EAP-TLSEAP-TLS
EAP-TLS
Karri Huhtanen435 visualizações
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAA
Karri Huhtanen702 visualizações
TLS and CertificatesTLS and Certificates
TLS and Certificates
Karri Huhtanen692 visualizações
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
Karri Huhtanen512 visualizações
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
Karri Huhtanen2.5K visualizações
Using NoSQL databases to store RADIUS and Syslog dataUsing NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog data
Karri Huhtanen10.6K visualizações
Open WiFi or Broken WiFi?Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?
Karri Huhtanen1.1K visualizações
eduroam ennen, nyt ja tulevaisuudessaeduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessa
Karri Huhtanen772 visualizações

Último(20)

Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver23 visualizações
Micron CXL product and architecture updateMicron CXL product and architecture update
Micron CXL product and architecture update
CXL Forum23 visualizações
MemVerge: Memory Viewer SoftwareMemVerge: Memory Viewer Software
MemVerge: Memory Viewer Software
CXL Forum115 visualizações
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya51 visualizações
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman20 visualizações
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman152 visualizações
TE Connectivity: Card Edge InterconnectsTE Connectivity: Card Edge Interconnects
TE Connectivity: Card Edge Interconnects
CXL Forum93 visualizações
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang34 visualizações
PyCon ID 2023 - Ridwan Fadjar Septian.pdfPyCon ID 2023 - Ridwan Fadjar Septian.pdf
PyCon ID 2023 - Ridwan Fadjar Septian.pdf
Ridwan Fadjar163 visualizações

Cloud Based Identity Management

  • 1. Cloud based identity management Karri Huhtanen Arch Red Oy 20.2.2012
  • 2. Cloud based identity management user/guest user accounts, cloud = user profiles, user roles, outside your own network access control, rules, policies, roaming control, service / cloud service identity federation and provider, private cloud policy control, customer network, but managed by service usernames etc. someone else than you your own network, their network, your own effort, their effort, your own problem, their problem, your own costs service contract
  • 3. Benefits for identity service customers • Managing, configuring, securing, developing and problem solving, even end customer support is identity service provider’s problem • Contracts to handle security, service levels and availability • Makes it easier to concentrate into own service and product development or production, not the infrastructure configuration • When the applications and services you use are already in the cloud, should not your identity be there too?
  • 4. Benefits for (cloud) identity service providers • One place, one interface, one infrastructure and one service to be developed and maintained to customers. • Multiple customers utilising and paying for the same service (without even additional work per customer). • Lower needs for customisation. A customisation, which can be generalised can be turned to a revenue creating service also for other customers. • Stronger relationship with customer
  • 5. Markets • Gartner estimates Network Access Control market size 221M$ (2008) with 51% growth from 2007 due to weak economy (100% predicted earlier) • Forrester estimates more than 20% growth in IdM market annually from about $2.6 billion worldwide in 2006 to more than $12.3 billion by 2014.
  • 6. Arch Red Oy • We have been designing, building and running access control and roaming infrastructure services over Internet (in cloud) for service providers since 2004. • We are a small Internet engineering company with big customers. • We are here to help you to get a slice of that business or help you to utilise these services.
  • 7. Thank you. Questions? my contact information: Karri Huhtanen firstname.surname@archred.com khuhtanen in Twitter http://www.archred.com/