40 likes | 339 Views
A subscription to the Gluu Server, Gluu’s flagship service, enables an organization to quickly deploy one or more OX instances for their Internet domain, on the IAAS platform of their choice, to enable single sign-on, multi-factor authentication, and web access management.
E N D
Gluu announced today that new deployments of the Gluu Server will include the open source Asimba SAML platform. Gluu’s main use case for Asimba is to enable websites to use a single IDP for SSO, even when the organization may have a number of IDPs that are trusted. “Our main goal was to simplify single sign-on configuration for websites and SaaS applications” said Gluu CEO Mike Schwartz. “In many organizations, the list of which organizations are trusted, and what type of technology infrastructure they use, is too complex for website developers to track. The Asimba SAML proxy drives down the cost of SSO integrations by enabling an internal web site or SaaS application to point to a single SAML IDP.” Asimba has additional functionality which may be incorporated into the Gluu Server in the future. Asimba has hooks for authorization, enabling the enforcement of rules that define who can access which websites based on user claims, OAuth2 scopes, or context (for example geo-location and time of day). Gluu adds Asimba SAML platform to Gluu Server Stack
“We are very happy to see the Asimba server get additional distribution and use,” said Mark Dobrinic, one of the lead developers of Asimba. “Open source software for security is a requirement for many organizations, and will help enable a safer Internet for everyone. This is especially true for high quality tooling in the field of Identity and Access Management, that is an enabler for new and innovative services to build on.” About Gluu: Gluu provides build, operate, and transfer services to organizations that want to deploy the Gluu Server stack for single sign-on, strong authentication, and web access management. A subscription to Gluu Server Operate, Gluu’s flagship service, enables an organization to quickly deploy and more easily operate one or more Gluu Server instances for their Internet domain, on the IAAS platform of their choice, to enable centralized authentication and access management. About Asimba: Asimba is the successor of OpenASelect, a flexible and modular Access Management and Single Sign On application. The application exists of a framework for authentication and authorization, that enables many features and options to create custom extensions. More information on www.asimba.org.
Sprint could support standard API’s for authentication and authorization, and enable an ecosystem of partners to authenticate Sprint customers via Internet standard API. How is this better than Sprint’s current solution? Supporting standards is important because we live in a world where there are multiple consumer IDPs, and if a website needs a special API to use your IDP, it will probably just not support you. What is the cost of your solution? Gluu sells support on its product. However, I think there might be some sponsored co-development opportunities. Who are some of your current customers? • Toshiba uses Gluu to deliver authentication for its Cloud TV Service in Japan and Europe (and soon in the US). We have more than 20 university customers, in addition to a number of large enterprise customers.
We also are designing an authentication/authorization platform for the State of TX K-12 students, and a citizen authentication platform for the Philippines (90M users). In the telecom industry, we worked with British Telecom on a multi-year VOIP project, and have advised Rackspace on the design of their authentication system. Do you have any additional information or comments? Please check the latest OpenID Connect test results. Look in the last column for Gluu, and you can see that our server is currently the most comprehensive implementation of an OpenID Connect Provider. Article Resource:-http://thegluuserver.wordpress.com/2013/11/22/submission-to-sprint-innovate-why-sprint-should-support-openid-connect/