50 likes | 133 Views
Published results for OpenID Connect Provider (OP) and Relying Party (RP) software in InterOp 5 that indicate the vendor has at least 80% coverage of both the RP and OP defined inter-op use cases. For example, here are Gluu’s InterOp results.
E N D
17 Recommended Requirements for an Identity and Access Management POC We get requests for POC’s quite often. In an attempt to provide tactical guidance to organizations developing an identity and web access management system, the following are our top recommended criteria for evaluation. By adding some or all of these requirements to your POC, your organization can limit vendor lock-in and ensure that the solutions considered will satisfy both current and future identity and access management challenges. 1.Published results for OpenID Connect Provider (OP) and Relying Party (RP) software in InterOp 5 that indicate the vendor has at least 80% coverage of both the RP and OP defined inter-op use cases. For example, here are Gluu’s InterOp results.
2. Support for UMA 0.9 Authorization Server endpoints, Resource Server endpoints, and supported client code. Include details on how the policy mapping is made to UMA scopes. 3. Support for adaptive authentication: i.e. the ability to make changes to the business logic of authentication at run time. Or how to use a 1 or 2 step authentication workflow depending on the person (i.e. the IT group has to use two-factor authentication, normal users can use passwords…) 4. Support for the publication of SAML Multi-party federation management, including a workflow tool for vetting SAML IDPs and SPs to join the federation, and other federation administrator operational tools. 5. Support for public user registration. 6. Support for invitation code based user registration. 7. IDP must be able to specify authentication type on a per SP basis. For example, use passwords for Google, but tokens for Sales force. 8. Support for SAML persistent non-correlatable identifiers
9. Support for per SP attribute release policies in SAML. 10Native mobile client application for strong authentication, along with mobile device enrollment and management features. 11. Support for the SCIM user management API’s to enable your organization to interface with the IDM system to send updates about users. 12. Supported SAML client API for Java. 13. Supported OpenID Connect client API for Java. 14. Supported UMA client API for Java.
15. Supported SCIM Client code. 16. Support for open standards based API access control using headless API’s and a mobile client (i.e. no browser). 17. Free open source license for binaries for major Linux operating systems so your organization can easily take over operation and provide a reasonable free open source option to partners who do not want to purchase expensive enterprise software. Article resource:-http://thegluuserver.wordpress.com/2014/08/04/17-recommended-requirements-for-an-identity-and-access-management-poc/
9. Manta ray night dive Diving at night is a thrill in itself, but once you turn on your lights and attract a corps de ballet of Pacific manta rays, with wing spans of 10ft or more and tails like javelins, your life becomes segmented: Before diving with mantas and after. 10.'Akaka Falls State Park Like all waterfalls on this part of the coast, 'But Akaka Falls are most impressive during seasonal rains, when They spill violently over the verdant cliffs. Don’t miss poking around the little town of Honolulu once you’re Done ogling these towering falls.