I dati dell'Emilia-Romagna
Wednesday, February 16, 2005
  Jericho and Radiant Logic Team to Deliver Attribute-Based Access Control and Context-Based Identity Services Jericho and Radiant Logic Team to Deliver Attribute-Based Access Control and Context-Based Identity Services: "Security and Personalization Combined with an On-Demand Identity and Attribute Service Unlock the Value of Existing Information Assets for Fine-Grained Policy and Federated Identity


Jericho Systems, the leading provider of next generation, fine-grained decisioning solutions for security, personalization, and knowledge management and Radiant Logic, Inc., the leading provider of virtual directory and context-based identity infrastructure solutions, today announced an alliance that provides seamless technology integration between the Jericho Systems' security, personalization, and knowledge management products and the RadiantOne Virtual Directory Server. The joint integration enables organizations to leverage their existing assets to put real-time decision making into the hands of business users.

The Jericho EnterSpace Security Suite (ESS) is designed to act as an authorization service within a SOA. For example, in a CRM infrastructure, the technologies work in tandem, with Jericho acting as an authorization server and Radiant Logic as an attribute server. The ESS authorization server protects resources and provides personalization while the RadiantOne server provides the right attributes in the right context through virtualization. ESS employs Attribute Based Access Control (ABAC) which augments and extends Role Based Access Control (RBAC).

'To date, even with the implementation of innovative authentication techniques, many application developers and enterprise architects have found enabling systems to control access through 'fine-grained' authorization to be an application-specific, time-consuming and costly task,' said Michel Prompt, CEO of Radiant Logic, Inc. 'The limitations and cost of creating and relying on traditional RBAC techniques can be a barrier. Any viable alternative for improving enterprise security opportunities must overcome the 'stovepipes' among applications, must focus on authorization and must be delivered as application-neutral services available within a Service Oriented Architecture (SOA). By combining a robust, fine-grained policy engine with a flexible identity and attribute service, our customers can define and enforce policy that reflects the way they really do business.'

The RadiantOne virtualization layer provides an identity service that can access existing data sources to reveal a complete picture of identity that is buried in existing applications. Existing identity integration solutions ignore the relationship between objects because of a lack of 'metadata' management. By ignoring relationships between objects, these integration technologies lose information about the context in which an operation occurred. The capability to capture a global picture of the different application contexts -- especially their security contexts -- is a key advantage when delivering fine-grained authorization.

'Organizations need to leverage their existing identity related information and the relevant context surrounding the identity,' said Brynn Mow, CEO of Jericho Systems. 'Attribute-based policy requires a thorough understanding of the relationships among objects and the ability to quickly access attributes in real-time. Our integration with the RadiantOne virtual directory allows our customers to leverage what they already have in their distributed identity stores.'

Most organizations architecting a federated identity strategy focus first on simplifying the authentication process by establishing secure trusted relationships and delegation. However, in a federated environment, authorization and access to resources are typically distributed and decentralized. This, in turn, implies that a federation participant should be able to authorize a user quickly based on a relatively limited number of attributes passed by the authenticator service. The authorization system must provide a service that quickly correlates a user token with the right services, which means quickly searching across many contexts to trigger a fine-grained authorization.

For more information on Jericho Systems visit www.jerichosystems.com. More information about Radiant Logic can be found at www.radiantlogic.com." 
Comments: Post a Comment

<< Home
Questa e' la pagina di dati e segnalazioni sull'Emilia-Romagna di Giampaolo Montaletti. Il sito principale e' qui.

ARCHIVES
November 2004 / December 2004 / January 2005 / February 2005 / March 2005 / April 2005 / May 2005 / June 2005 / July 2005 / August 2005 / September 2005 / October 2005 / November 2005 / December 2005 /


Powered by Blogger