11/18/2016 Laws of IdentityFrom time to time, I am asked; Can we change this to Ping, Dell CAM, <fill in whatever>? The answer is usually, yes. Why? Most modern Single Sign-on products adhere to Kit Cameron’s Laws of Identity. As such, there is high degree of compatibility between all true SSO. Incidentally, this is also why Accela’s product has never been SSO, they fail to implement the industry accepted Laws of Identity.
I have sent this because in seven bullet points, you have strong guidance of what makes modern identity management system and what it should be able to do. Also, please note the reference source, in my graduate program there is a definite focus on clear communications. 😀 Kit’s laws of identity are as follows:
(Lacey 177-178) Lacey, David. Managing the Human Factor in Information Security: How to win over staff and influence business managers. John Wiley & Sons P&T, 2009-02-17. VitalBook file. |
AuthorRobert Fischer is an Enterprise Cloud Architect working on a Masters Degree in Cyber Security. These posts are adapted from his graduate work. Anne Fischer edits these posts for this blog. Archives
December 2016
Categories |