How to build a solid business case for deployment. Smedinghoff is a partner at Wildman Harrold, where his practice focuses on the new legal issues relating to the developing field of information law ...
Learn how to modernize legacy login systems with a step-by-step framework for implementing secure federated identity and modern authentication.
The 1990s witnessed the adoption of IT systems designed to streamline business processes through electronic automation. The introduction of these systems has challenged companies with how to integrate ...
Years after it was hailed as the next big thing, federated identity management hasn't been widely adopted because both sides don't benefit equally and liability remains a concern. In 2005, advocates ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
“We are at the beginning of a very big thing,” says Mike Beach, associate technical fellow at The Boeing Co. “We are on the edge of a huge uptake of this idea of federated identity over the Internet, ...
Full partnerships will take time to develop, but state and county agencies are exploring expanding ideas of teamwork beyond traditional notions of collaboration, and looking at concepts of federated ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
As businesses start deploying distributed federated models to solve identity management problems, the Liberty Alliance has developed the Liberty Identification Federation Framework 1.2 specification.
Last January (see editorial links below) we brought you the results of a survey by PingID about people’s “federated identity” projects. PingID created and supports SourceID, the open source ...
The company's new NetPoint SHAREid promises to obviate the need for a given employee to remember multiple passwords, even as he passes from his internal company sites to secure sites of suppliers and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results