Welcome!

IoT User Interface Authors: Liz McMillan, Philippe Abdoulaye, Pat Romanski, Scott Sobhani, Elizabeth White

News Feed Item

Novell Enables Rapid Adoption of Identity Management by Open Sourcing Key Technologies

Working within the larger identity and open source communities, the Bandit project will address common identity management requi

WALTHAM, Mass., June 12 /PRNewswire-FirstCall/ -- Novell today announced the creation of Bandit(TM), a groundbreaking open source project with a charter to unify disparate identity systems and provide a consistent approach to securing and managing identity. The identity services in development by the Bandit community are open source and will work with existing industry standards such as WS- * and Liberty Federation, and open source projects including Eclipse Higgins. Novell has already contributed significant engineering resources and code to jump start this effort. Ultimately, the goal of the Bandit project is to provide organizations with a consistent approach to enterprise identity management challenges such as secure, role- based access and regulatory compliance reporting.

"The Bandit project is looking to address one of the toughest challenges in identity management today -- provide a consistent approach to securing and managing identity," said Mike Neuenschwander, vice president and research director for the Burton Group. "The creation of identity services that abstract the complexity of identity systems and that are interoperable and freely available is a worthwhile goal and represents an important inflection point in the ongoing development of the identity management market."

While many organizations deploy identity management technologies today, disparate vendor solutions can create complexity and potentially slow adoption. By developing an open source enablement layer, Novell and the Bandit community will make it possible to standardize identity management across differing systems and resources. Bandit's freely available code can then be overlayed on an existing identity management system.

The Bandit project is focused on delivering a single, consistent experience of digital identity and includes several common identity services such as authentication, roles, policy and compliance:

-- The Common Authentication Services Adapter (CASA) provides interoperable authentication that enables application and enterprise single sign-on with a secure vault for user and system credentials. -- The Common Identity service is an implementation of the Higgins framework for representing digital identity. -- The Role Engine service can be integrated into any application to consistently calculate role information and unify authorization across systems. -- The Audit Record Framework service provides an open auditing and compliance API and receives audit records from Bandit's open identity services and other applications to provide common identity and event information to verify security and compliance.

Novell already incorporates some of Bandit's open identity services within its SUSE(R) Linux distribution and plans to include Bandit's identity services in future releases of other products. Novell will continue to support the Bandit project with substantial engineering resources and will maintain the project while the Bandit community grows.

"The Bandit project was created in response to our customers' need to reduce the complexity of identity management in the enterprise," said Jeff Jaffe, executive vice president and chief technology officer for Novell. "The industry needs to come together and deliver common identity services that provide a consistent experience, regardless of the underlying infrastructure. Novell's initial sponsorship of the Bandit project is a natural extension of our leadership in both identity and open source, and we are gratified to see the groundswell of community support."

A Community-driven Approach to Enterprise Identity Management

The Bandit project builds upon the participation of the broader identity and open source communities and many industry leaders are expressing their support and commitment to the goals of the Bandit project.

PARTNER QUOTES:

Dominic Fedronic, chief technology officer for ActivIdentity Inc., said, "The deployment of digital identity assurance and strong authentication solutions for both government and enterprise would greatly benefit from seamless interoperability and tight integration with identity management systems. ActivIdentity supports Novell's leadership with the Bandit project and Higgins as we believe the resulting open industry standards will expand the market and deliver greater value to customers."

Paul Trevithick, technology lead for the Higgins project at the Eclipse Foundation, said, "We are very pleased that Novell is promoting the adoption of open source identity technologies and that the Bandit project is contributing to and leveraging Higgins. Bandit is providing an important service by making an open identity infrastructure available on enterprise platforms including SUSE Linux."

Anthony Nadalin, Distinguished Engineer and Chief Security Architect for IBM, said, "IBM is pleased that Novell is using Higgins as the Identity Management foundation for the Bandit project. As a leading proponent of open source, IBM is committed to working with the Eclipse Higgins community to solve the identity-related challenges our customers face everyday."

George Goodman, president of the Liberty Alliance management board and director, Platform Capabilities Lab at Intel, said, "Liberty Alliance welcomes open initiatives that bring the industry closer to achieving a ubiquitous interoperable privacy-respecting identity layer for the Internet. We salute the Bandit team for contributing open source that will help advance the deployment of Liberty-enabled federations and Web services on the widest possible scale."

Kim Cameron, architect of Identity and Access for Microsoft, said: "The Identity Metasystem provides a model for identity interoperability across the industry. We're happy to see Novell playing an active role in helping realize the Identity Metasystem and look forward to working with them to ensure interoperability between our respective products."

Jim Gerken, practice manager for identity management with Novacoast, said, "We have spent years connecting disparate authentication repositories which confirms the need for consistent and standard identity services. With Novell's leadership in identity and open source, Bandit is a natural community for Novell to create that leverages its position in both markets."

Bob Lord, Red Hat senior director engineering, said, "Red Hat supports open source initiatives to build stronger identity frameworks and controls based on open standards. The Bandit project provides several initiatives that will help simplify identity management in heterogeneous environments and drive further innovation for the enterprise. We look forward to working with the open source community to extend a flexible identity framework from desktop to server, network to application."

Sara Gates, vice president of Identity Management at Sun Microsystems, said, "As a co-founder of the Liberty Alliance and a leading champion of open source, we have seen firsthand how customers are embracing open source technologies as a way to accelerate business solutions and reduce their costs. We strongly support the move of identity management services into the open source community."

Dick Hardt, Sxip Identity founder and CEO, said, "The identity management industry needs a common approach to secure, role-based access and compliance reporting for the enterprise and open source projects like Bandit from Novell and Higgins are a great step in that direction. We see this as a natural complement to the user-centric Identity 2.0 efforts being made with SXIP and DIX and are excited to work with them on adding support of Bandit, Higgins and eDirectory(TM)."

Rob Clyde, Symantec vice president of technology, office of the CTO, said, "Symantec is a strong supporter of open source initiatives that enable developer communities and vendors to work together to create flexible solutions capable of meeting the diverse needs of our customers. Companies today face a tremendous challenge as they try to integrate disparate application systems and security infrastructures each with its own authentication technologies into a cohesive, manageable solution. A standards-based approach backed by an open source implementation is a beneficial step towards addressing the vexing problem of identity management."

Jonathan Alexander, Trusted Network Technologies vice president of engineering, said, "Bandit is addressing key customer challenges, such as integrating distributed identity and roles, that we see as we help customers deploy our identity security and audit solutions. We see the Bandit and Higgins projects as filling a critical need to tie disparate identity systems together into a more pervasive, integrated and powerful solution."

About Novell

Novell, Inc. delivers Software for the Open Enterprise(TM). With more than 50,000 customers in 43 countries, Novell helps customers manage, simplify, secure and integrate their technology environments by leveraging best-of-breed, open standards-based software. With over 20 years of experience, 5,000 employees, 5,000 partners and support centers around the world, Novell helps customers gain control over their IT operating environment while reducing cost. More information about Novell can be found at http://www.novell.com/.

Novell and SUSE are registered trademarks and Bandit and eDirectory are trademarks of Novell, Inc. in the United States and other countries. * Linux is a registered trademark of Linus Torvalds. All other third party trademarks are the property of their respective owners.

Novell, Inc.

CONTACT: Kerry Adorno of Novell, +1-781-464-8042 or [email protected];
or Sarah Murray of Horn Group, +1-781-356-7135 or [email protected], for
Novell

Web site: http://www.novell.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
Edge Hosting has announced a partnership with and the availability of CloudFlare, a web application firewall, CDN and DDoS mitigation service. “This partnership enhances Edge Hosting’s world class, perimeter layer, application (layer 7) defensive mechanism,” said Mark Houpt, Edge Hosting CISO. “The goal was to enable a new layer of customer controlled defense and compliance through the application of DDoS filters and mitigations, the web application firewall (WAF) feature and the added benefit ...
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
"SpeedyCloud's specialty lies in providing cloud services - we provide IaaS for Internet and enterprises companies," explained Hao Yu, CEO and co-founder of SpeedyCloud, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profession...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists discusse...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2016' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited t...
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high quality and comprehensive student-athlete experience. The program sponsors 17 varsity teams and in their history, the Colorado Buffaloes have collected an impressive 28 national championships. Maintaining uptime...