Digital Identity

Phillip J. Windley

  • 出版商: O'Reilly
  • 出版日期: 2005-08-23
  • 售價: $1,310
  • 貴賓價: 9.5$1,245
  • 語言: 英文
  • 頁數: 256
  • 裝訂: Paperback
  • ISBN: 0596008783
  • ISBN-13: 9780596008789
  • 已過版




The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.

Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture.

How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.


Table of Contents:



1. Introduction

     Business Opportunity

     Digital Identity Matters

     Using Digital Identity

     The Business Context of Identity

     Foundational Technologies for Digital Identity

     Identity Management Architectures

2. Defining Digital Identity

     The Language of Digital Identity

     Identity Scenarios in the Physical World

     Identity, Security, and Privacy

     Digital Identity Perspectives

     Identity Powershifts


3. Trust

     What Is Trust?

     Trust and Evidence

     Trust and Risk

     Reputation and Trust Communities


4. Privacy and Identity

     Who's Afraid of RFID?

     Privacy Pragmatism

     Privacy Drivers

     Privacy Audits

     Privacy Policy Capitalism

     Anonymity and Pseudonymity

     Privacy Principles



5. The Digital Identity Lifecycle







6. Integrity, Non-Repudiation, and Confidentiality





7. Authentication

     Authentication and Trust

     Authentication Systems

     Authentication System Properties


8. Access Control

     Policy First

     Authorization Patterns

     Abstract Authorization Architectures

     Digital Certificates and Access Control


9. Names and Directories Naming and Directories



     Aggregating Directory Information


10. Digital Rights Management

     Digital Leakage

     The DRM Battle

     Apple iTunes: A Case Study in DRM

     Features of DRM

     DRM Reference Architecture

     Trusted Computing Platforms

     Specifying Rights


11. Interoperability Standards

     Standards and the Digital Identity Lifecycle

     Integrity and Non-Repudiation: XML Signature

     Confidentiality: XML Encryption

     Authentication and Authorization Assertions

     Example SAML Use Cases

     Identity Provisioning

     Representing and Managing Authorization Policies


12. Federating Identity

     Centralized Versus Federated Identity

     The Mirage of Centralized Efficiency

     Network Effects and Digital Identity Management

     Federation in the Credit Card Industry

     Benefits of Federated Identity

     Digital Identity Standards

     Three Federation Patterns


13. An Architecture for Digital Identity

     Identity Management Architecture

     The Benefits of an Identity Management Architecture

     Success Factors


     Identity Management Architecture Components


14. Governance and Business Modeling

     IMA Lifecycle

     IMA Governance Model

     Initial Steps

     Creating a Vision

     IMA Governing Roles


     What to Outsource

     Understanding the Business Context

     Business Function Matrix

     IMA Principles


15. Identity Maturity Models and Process Architectures

     Maturity Levels

     The Maturity Model

     The Rights Steps at the Right Time

     Finding Identity Processes

     Evaluating Processes

     A Practical Action Plan

     Filling the Gaps with Best Practices


16. Identity Data Architectures

     Build a Data Architecture

     Processes Link Identities

     Data Categorization

     Identity Data Structure and Metadata

     Exchanging Identity Data

     Principles for Identity Data


17. Interoperability Frameworks for Identity

     Principles of a Good IF

     Contents of an Identity IF

     Example Interoperability Framework

     A Word of Warning


18. Identity Policies

     The Policy Stack

     Attributes of a Good Identity Policy

     Determining Policy Needs

     Writing Identity Policies

     An Identity Policy Suite

     Assessing Identity Policies




19. Identity Management Reference Architectures

     Reference Architectures

     Benefits and Pitfalls

     Reference Architecture Best Practices

     Using a Reference Architecture

     Components of a Reference Architecture

     Technical Position Statements

     Consolidated Infrastructure Blueprint

     System Reference Architectures


20. Building an Identity Management Architecture

     Scoping the Process

     Which Projects Are Enterprise Projects?

     Sequencing the IMA Effort

     A Piece at a Time

     Conclusion: Dispelling IMA Myths