Here are the architectural overview pages for Project Higgins and Project Bandit: Higgins Overview: http://spwiki.editme.com/HigginsIntroduction Presentation: http://spwiki.editme.com/HigginsOverview2 Bandit Architecture: http://www.bandit-project.org/index.php/Architecture_and_Design Roadmap: http://www.bandit-project.org/index.php/Roadmap Higgins Project Bandit Project Higgins Identity
Category: Security
As you might know, Sun is shutting down their operations during the 4th of July week, so my bloggin will be fairly light over the next couple of days. A few thinks that I intend to spend some thoughts on…
SAML could be used for performing anonymous (more precisely pseudonymous) authorization in the following way: A user contacts a relying party for a particular service. The RP returns a request for a set of attributes that it requires to allow…
One of the issues (it seems) around identity is that there is a lack of highly trusted digital identity sources. Do I trust a (fairly anonymous) Yahoo ID or don’t I? I would like to argue that if we had…
The Bandit Project is the latest in a wave of Identity Metasystems (components?) to attract the interest of the community. It is deeply tied into the Higgins Identity API system, and could (will?) use Liberty and Windows CardSpace as providers.…
The DIX identity protocol in its latest draft form now uses parts of the SAML 2.0 token format. Ah, interesting times… Identity DIX SAML
Microsoft Live has a STS for Windows Live ID (aka Passport) running here. Now this is really interesting, particularly in the context of Microsoft’s recent move to get the Infocard selector to many platforms. So what is the rationale behind…
Andre Durand is blogging today about his demo at the upcoing Catalyst conference: an Infocard Server that can connect to any federation source and ‘translate’ this into Infocard. Kim Cameron has a few things to say about as well. Now…
Here is my presentation from yesterday’s panel discussion at the Network Security 2006 conference (many thanks to Hubert and Eve, which have essentially provided the largest part of this). Network Security – SAMLv20.pdf (103.81 KB) Security SAML
After an interesting panel discussion yesterday at the Network Security 2006Conference, I started to think about security protocols in general again. One comment from a gentleman in the audience struck me in particular: PKI (and other authentication systems) are hard…