SlideShare uma empresa Scribd logo
1 de 5
We get requests for POC’s quite often. In an attempt to
provide tactical guidance to organizations developing
an identity and web access management system, the
following are our top recommended criteria for
evaluation.
By adding some or all of these requirements to your
POC, your organization can limit vendor lock-in and
ensure that the solutions considered will satisfy both
current and future identity and access management
challenges.
1.Published results for OpenID Connect Provider (OP)
and Relying Party (RP) software in InterOp 5 that
indicate the vendor has at least 80% coverage of both
the RP and OP defined inter-op use cases. For example,
here are Gluu’s InterOp results.
2. Support for UMA 0.9 Authorization Server endpoints, Resource Server endpoints, and
supported client code. Include details on how the policy mapping is made to UMA
scopes.
3. Support for adaptive authentication: i.e. the ability to make changes to the business
logic of authentication at run time. Or how to use a 1 or 2 step authentication workflow
depending on the person (i.e. the IT group has to use two-factor authentication, normal
users can use passwords…)
4. Support for the publication of SAML Multi-party federation management, including a
workflow tool for vetting SAML IDPs and SPs to join the federation, and other federation
administrator operational tools.
5. Support for public user registration.
6. Support for invitation code based user registration.
7. IDP must be able to specify authentication type on a per SP basis. For example, use
passwords for Google, but tokens for Sales force.
8. Support for SAML persistent non-correlatable identifiers
9. Support for per SP attribute release policies in SAML.
10Native mobile client application for strong authentication, along with mobile device
enrollment and management features.
11. Support for the SCIM user management API’s to enable your organization to
interface with the IDM system to send updates about users.
12. Supported SAML client API for Java.
13. Supported OpenID Connect client API for Java.
14. Supported UMA client API for Java.
15. Supported SCIM Client code.
16. Support for open standards based API access control using headless API’s and a
mobile client (i.e. no browser).
17. Free open source license for binaries for major Linux operating systems so your
organization can easily take over operation and provide a reasonable free open source
option to partners who do not want to purchase expensive enterprise software.
Article resource:-http://thegluuserver.wordpress.com/2014/08/04/17-recommended-
requirements-for-an-identity-and-access-management-poc/
9. Manta ray night dive
Diving at night is a thrill in itself, but once you turn on your lights and attract a corps de
ballet of
Pacific manta rays, with wing spans of 10ft or more and tails like javelins, your life
becomes segmented:
Before diving with mantas and after.
10.'Akaka Falls State Park
Like all waterfalls on this part of the coast, 'But Akaka Falls are most impressive during
seasonal rains, when
They spill violently over the verdant cliffs. Don’t miss poking around the little town of
Honolulu once you’re
Done ogling these towering falls.

Mais conteúdo relacionado

Mais procurados

Applying UX principles and methods to APIs
Applying UX principles and methods to APIs Applying UX principles and methods to APIs
Applying UX principles and methods to APIs MuleSoft
 
INTERFACE, by apidays - A cloud-native approach for open banking in action b...
INTERFACE, by apidays  - A cloud-native approach for open banking in action b...INTERFACE, by apidays  - A cloud-native approach for open banking in action b...
INTERFACE, by apidays - A cloud-native approach for open banking in action b...apidays
 
Sharing APIs at Scale for a Great Developer Experience
Sharing APIs at Scale for a Great Developer ExperienceSharing APIs at Scale for a Great Developer Experience
Sharing APIs at Scale for a Great Developer ExperiencePostman
 
Anypoint platform for API's glossary
Anypoint platform for API's glossaryAnypoint platform for API's glossary
Anypoint platform for API's glossaryAchyuta Lakshmi
 
Modernizing Customer Messaging at T-Mobile
Modernizing Customer Messaging at T-MobileModernizing Customer Messaging at T-Mobile
Modernizing Customer Messaging at T-MobileVMware Tanzu
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointCA API Management
 
Deep Dive into OAuth for Connected Apps
Deep Dive into OAuth for Connected AppsDeep Dive into OAuth for Connected Apps
Deep Dive into OAuth for Connected AppsSalesforce Developers
 
BDD Approach with Karate Framework in Service Tests
BDD Approach with Karate Framework in Service TestsBDD Approach with Karate Framework in Service Tests
BDD Approach with Karate Framework in Service Testskloia
 
Authentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsAuthentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsSalesforce Developers
 
Gravitee API Management - Ahmet AYDIN
 Gravitee API Management  -  Ahmet AYDIN Gravitee API Management  -  Ahmet AYDIN
Gravitee API Management - Ahmet AYDINkloia
 
Webcast: AWS Sticker Shock? How can containers and automation help?
Webcast: AWS Sticker Shock?  How can containers and automation help?Webcast: AWS Sticker Shock?  How can containers and automation help?
Webcast: AWS Sticker Shock? How can containers and automation help?Applatix
 
Open Banking via API Connect & DataPower
Open Banking via API Connect & DataPowerOpen Banking via API Connect & DataPower
Open Banking via API Connect & DataPowerIBM DataPower Gateway
 
What's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform ManagementWhat's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform ManagementMuleSoft
 
Object Store V2 Workshop
Object Store V2 WorkshopObject Store V2 Workshop
Object Store V2 WorkshopMuleSoft
 
Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSecure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSalesforce Developers
 
.Net architecture with mule soft
.Net architecture with mule soft.Net architecture with mule soft
.Net architecture with mule softD.Rajesh Kumar
 
Unified Security for Mobile, APIs and the Web
Unified Security for Mobile, APIs and the WebUnified Security for Mobile, APIs and the Web
Unified Security for Mobile, APIs and the WebAkana
 

Mais procurados (20)

Applying UX principles and methods to APIs
Applying UX principles and methods to APIs Applying UX principles and methods to APIs
Applying UX principles and methods to APIs
 
INTERFACE, by apidays - A cloud-native approach for open banking in action b...
INTERFACE, by apidays  - A cloud-native approach for open banking in action b...INTERFACE, by apidays  - A cloud-native approach for open banking in action b...
INTERFACE, by apidays - A cloud-native approach for open banking in action b...
 
Sharing APIs at Scale for a Great Developer Experience
Sharing APIs at Scale for a Great Developer ExperienceSharing APIs at Scale for a Great Developer Experience
Sharing APIs at Scale for a Great Developer Experience
 
6 ways ACAEngine is different
6 ways ACAEngine is different6 ways ACAEngine is different
6 ways ACAEngine is different
 
Anypoint platform for API's glossary
Anypoint platform for API's glossaryAnypoint platform for API's glossary
Anypoint platform for API's glossary
 
Modernizing Customer Messaging at T-Mobile
Modernizing Customer Messaging at T-MobileModernizing Customer Messaging at T-Mobile
Modernizing Customer Messaging at T-Mobile
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
 
Deep Dive into OAuth for Connected Apps
Deep Dive into OAuth for Connected AppsDeep Dive into OAuth for Connected Apps
Deep Dive into OAuth for Connected Apps
 
BDD Approach with Karate Framework in Service Tests
BDD Approach with Karate Framework in Service TestsBDD Approach with Karate Framework in Service Tests
BDD Approach with Karate Framework in Service Tests
 
Authentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsAuthentication with OAuth and Connected Apps
Authentication with OAuth and Connected Apps
 
API management with GraphQL
API management with GraphQLAPI management with GraphQL
API management with GraphQL
 
Gravitee API Management - Ahmet AYDIN
 Gravitee API Management  -  Ahmet AYDIN Gravitee API Management  -  Ahmet AYDIN
Gravitee API Management - Ahmet AYDIN
 
Webcast: AWS Sticker Shock? How can containers and automation help?
Webcast: AWS Sticker Shock?  How can containers and automation help?Webcast: AWS Sticker Shock?  How can containers and automation help?
Webcast: AWS Sticker Shock? How can containers and automation help?
 
Open Banking via API Connect & DataPower
Open Banking via API Connect & DataPowerOpen Banking via API Connect & DataPower
Open Banking via API Connect & DataPower
 
What's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform ManagementWhat's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform Management
 
Object Store V2 Workshop
Object Store V2 WorkshopObject Store V2 Workshop
Object Store V2 Workshop
 
Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSecure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce Instance
 
.Net architecture with mule soft
.Net architecture with mule soft.Net architecture with mule soft
.Net architecture with mule soft
 
Unified Security for Mobile, APIs and the Web
Unified Security for Mobile, APIs and the WebUnified Security for Mobile, APIs and the Web
Unified Security for Mobile, APIs and the Web
 
Bigger, Better Business With OAuth
Bigger, Better Business With OAuthBigger, Better Business With OAuth
Bigger, Better Business With OAuth
 

Destaque (20)

6870
68706870
6870
 
2°mcsl de cuestión social a cuestión política
2°mcsl de cuestión social a cuestión política2°mcsl de cuestión social a cuestión política
2°mcsl de cuestión social a cuestión política
 
Marco antonio 1 b
Marco antonio 1 bMarco antonio 1 b
Marco antonio 1 b
 
Educar Vida
Educar VidaEducar Vida
Educar Vida
 
Pharmacy magazine .. 1
Pharmacy magazine .. 1Pharmacy magazine .. 1
Pharmacy magazine .. 1
 
Document elaborat per Conxita Mayós
Document elaborat per Conxita MayósDocument elaborat per Conxita Mayós
Document elaborat per Conxita Mayós
 
BBB Brasil um Programa Imbecil
BBB Brasil um Programa ImbecilBBB Brasil um Programa Imbecil
BBB Brasil um Programa Imbecil
 
Grupo "Malukitas"
Grupo "Malukitas"Grupo "Malukitas"
Grupo "Malukitas"
 
Dia dels drets humans
Dia dels drets humansDia dels drets humans
Dia dels drets humans
 
Photos 4 Villas in Cabarete on Sale Commercial Opportunity
Photos 4 Villas in Cabarete on Sale Commercial OpportunityPhotos 4 Villas in Cabarete on Sale Commercial Opportunity
Photos 4 Villas in Cabarete on Sale Commercial Opportunity
 
Marketing Cultural
Marketing CulturalMarketing Cultural
Marketing Cultural
 
Arabic e book 365 success quotes - nov 08
Arabic e book   365 success quotes - nov 08Arabic e book   365 success quotes - nov 08
Arabic e book 365 success quotes - nov 08
 
Leonardo Da Vinci
Leonardo Da VinciLeonardo Da Vinci
Leonardo Da Vinci
 
Css nite in ginza adps
Css nite in ginza adps Css nite in ginza adps
Css nite in ginza adps
 
Photos House for Rent Pueto Plata Dominican Republic.ref.rctapop101
Photos House for Rent Pueto Plata Dominican Republic.ref.rctapop101Photos House for Rent Pueto Plata Dominican Republic.ref.rctapop101
Photos House for Rent Pueto Plata Dominican Republic.ref.rctapop101
 
OMExpo latino 2010
OMExpo latino 2010OMExpo latino 2010
OMExpo latino 2010
 
2014
20142014
2014
 
Glagolitic Souvenirs
Glagolitic SouvenirsGlagolitic Souvenirs
Glagolitic Souvenirs
 
Ppt2 B [Recuperado]
Ppt2 B [Recuperado]Ppt2 B [Recuperado]
Ppt2 B [Recuperado]
 
democracy-ditto tb
democracy-ditto tbdemocracy-ditto tb
democracy-ditto tb
 

Semelhante a 17 recommended requirements for an identity and access management poc

Meetup 2022 - API Gateway landscape.pdf
Meetup 2022 - API Gateway landscape.pdfMeetup 2022 - API Gateway landscape.pdf
Meetup 2022 - API Gateway landscape.pdfRed Hat
 
ChannelEyes Technical Whitepaper
ChannelEyes Technical WhitepaperChannelEyes Technical Whitepaper
ChannelEyes Technical WhitepaperJay McBain
 
Anypoint platform architecture and components
Anypoint platform architecture and componentsAnypoint platform architecture and components
Anypoint platform architecture and componentsD.Rajesh Kumar
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2
 
Securely expose protected resources as ap is with app42 api gateway
Securely expose protected resources as ap is with app42 api gatewaySecurely expose protected resources as ap is with app42 api gateway
Securely expose protected resources as ap is with app42 api gatewayZuaib
 
Uncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfUncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfPankaj Goyal
 
Uncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfUncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfPankajGoyal164048
 
IBM API management Philip Little
IBM API management Philip LittleIBM API management Philip Little
IBM API management Philip LittleValeri Illescas
 
Mule esb api layer
Mule esb api layerMule esb api layer
Mule esb api layerirfan1008
 
Mule esb–api layer
Mule esb–api layerMule esb–api layer
Mule esb–api layercharan teja R
 
Mule esb–api layer
Mule esb–api layerMule esb–api layer
Mule esb–api layerhimajareddys
 
Mule esb api layer
Mule esb api layer Mule esb api layer
Mule esb api layer javeed_mhd
 

Semelhante a 17 recommended requirements for an identity and access management poc (20)

Meetup 2022 - API Gateway landscape.pdf
Meetup 2022 - API Gateway landscape.pdfMeetup 2022 - API Gateway landscape.pdf
Meetup 2022 - API Gateway landscape.pdf
 
ChannelEyes Technical Whitepaper
ChannelEyes Technical WhitepaperChannelEyes Technical Whitepaper
ChannelEyes Technical Whitepaper
 
Anypoint platform architecture and components
Anypoint platform architecture and componentsAnypoint platform architecture and components
Anypoint platform architecture and components
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 
Mule api
Mule  apiMule  api
Mule api
 
Mule api
Mule  apiMule  api
Mule api
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
 
Securely expose protected resources as ap is with app42 api gateway
Securely expose protected resources as ap is with app42 api gatewaySecurely expose protected resources as ap is with app42 api gateway
Securely expose protected resources as ap is with app42 api gateway
 
5 pillars of API Management
5 pillars of API Management5 pillars of API Management
5 pillars of API Management
 
Uncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfUncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdf
 
Uncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfUncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdf
 
IBM API management Philip Little
IBM API management Philip LittleIBM API management Philip Little
IBM API management Philip Little
 
Mule esb api layer
Mule esb api layerMule esb api layer
Mule esb api layer
 
Mule esb–api layer
Mule esb–api layerMule esb–api layer
Mule esb–api layer
 
Mule esb api layer
Mule esb api layerMule esb api layer
Mule esb api layer
 
API Layer
API LayerAPI Layer
API Layer
 
Mule esb–api layer
Mule esb–api layerMule esb–api layer
Mule esb–api layer
 
Mule esb–api layer
Mule esb–api layerMule esb–api layer
Mule esb–api layer
 
Mule esb api layer
Mule esb api layer Mule esb api layer
Mule esb api layer
 
Mule esb api layer
Mule esb api layerMule esb api layer
Mule esb api layer
 

Mais de Gluu

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutionsGluu
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot awardGluu
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiersGluu
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationGluu
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuGluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for artGluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s visionGluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers iiGluu
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Gluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxGluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Gluu
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementGluu
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submissionGluu
 
Go west young federation
Go west young federationGo west young federation
Go west young federationGluu
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxyGluu
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013Gluu
 

Mais de Gluu (20)

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
 

17 recommended requirements for an identity and access management poc

  • 1. We get requests for POC’s quite often. In an attempt to provide tactical guidance to organizations developing an identity and web access management system, the following are our top recommended criteria for evaluation. By adding some or all of these requirements to your POC, your organization can limit vendor lock-in and ensure that the solutions considered will satisfy both current and future identity and access management challenges. 1.Published results for OpenID Connect Provider (OP) and Relying Party (RP) software in InterOp 5 that indicate the vendor has at least 80% coverage of both the RP and OP defined inter-op use cases. For example, here are Gluu’s InterOp results.
  • 2. 2. Support for UMA 0.9 Authorization Server endpoints, Resource Server endpoints, and supported client code. Include details on how the policy mapping is made to UMA scopes. 3. Support for adaptive authentication: i.e. the ability to make changes to the business logic of authentication at run time. Or how to use a 1 or 2 step authentication workflow depending on the person (i.e. the IT group has to use two-factor authentication, normal users can use passwords…) 4. Support for the publication of SAML Multi-party federation management, including a workflow tool for vetting SAML IDPs and SPs to join the federation, and other federation administrator operational tools. 5. Support for public user registration. 6. Support for invitation code based user registration. 7. IDP must be able to specify authentication type on a per SP basis. For example, use passwords for Google, but tokens for Sales force. 8. Support for SAML persistent non-correlatable identifiers
  • 3. 9. Support for per SP attribute release policies in SAML. 10Native mobile client application for strong authentication, along with mobile device enrollment and management features. 11. Support for the SCIM user management API’s to enable your organization to interface with the IDM system to send updates about users. 12. Supported SAML client API for Java. 13. Supported OpenID Connect client API for Java. 14. Supported UMA client API for Java.
  • 4. 15. Supported SCIM Client code. 16. Support for open standards based API access control using headless API’s and a mobile client (i.e. no browser). 17. Free open source license for binaries for major Linux operating systems so your organization can easily take over operation and provide a reasonable free open source option to partners who do not want to purchase expensive enterprise software. Article resource:-http://thegluuserver.wordpress.com/2014/08/04/17-recommended- requirements-for-an-identity-and-access-management-poc/
  • 5. 9. Manta ray night dive Diving at night is a thrill in itself, but once you turn on your lights and attract a corps de ballet of Pacific manta rays, with wing spans of 10ft or more and tails like javelins, your life becomes segmented: Before diving with mantas and after. 10.'Akaka Falls State Park Like all waterfalls on this part of the coast, 'But Akaka Falls are most impressive during seasonal rains, when They spill violently over the verdant cliffs. Don’t miss poking around the little town of Honolulu once you’re Done ogling these towering falls.