A Deep-dive Roundup of Cloud Identity Solutions
Tuesday May 22 09:00 - 17:00
As we move into the future, businesses and their IT departments are realising the need to break out of their cocooned corporate IT environments and reach out to applications and services that distributed across disparate organisations and boundaries. The corollary of that is for organisations to remain competitive they must make their own applications and services available.
Despite this ubiquitous availability, resources must remain protected and secure. The security boundary that encompasses all resources is federated authentication. The protocols to support federation are an industry standard that started with SAML and WS-*. However, OpenID Connect and OAuth 2.0 are becoming the norm. All of these protocols rely on a Security Token Service (STS) that issues a token that is trusted by the protected resource. The protected resource uses the token as proof that the user, presenting the token, has been authenticated by a trusted STS.
The protocols are standard, but of course, Identity as a Service (IDaaS) solutions are available from a whole range of providers including, Microsoft, Amazon, Google, Okta, Auth0 and more… When working with federation, although your environment may be from a single provider, you may well have to configure federated trusts with one or more other service providers.
Come to this precon and let John Craddock expand your knowledge of IDaaS by understanding the technical approach taken by different vendor. Armed with this new understanding you will be in an exemplary position to evaluate IDaaS solutions for your organization. John will show you how federation can be realised across platforms and suppliers. Integrating with other providers can sometimes present major challenges, and he will share his extensive experience with you. Come and learn how to move into the world of cross-platform authentication without boundaries. The session is packed with demos and definitely a precon not to be missed.
John is a Microsoft MVP and has designed and implemented computing systems ranging from high-speed industrial controllers through to distributed IT systems with a focus on security and high-availability. A key player in many IT projects for industry leaders including Microsoft, the UK Government and multi-nationals that require optimised IT systems. Developed technical training courses that have been published worldwide, co-authored a highly successful book on Microsoft Active Directory Internals, presents regularly at major international conferences including, TechEd, ITForum and European summits. John is passionate about communicating tough technical content in an engaging and highly consumable format.