Network World's excellent John Fontana has written about an opening keynote I gave recently at the Directory Experts’ Conference (DEC). I was talking about claims, trying to start a conversation that I will pursue on my blog over the next while.
Las Vegas — The traditional concepts of authentication and authorization will eventually give way to an inclusive identity system where users will present claims that answer who they are or what they can do in order to access systems and content or complete transactions, according to Microsoftâ€™s identity architect.
â€œThis is happening now and all it needs to do is gain momentum,â€ said Kim Cameron, Microsoftâ€™s identity architect, who gave the keynote address Monday to open NetProâ€™s Directory Experts Conference. He said the transformation to a claims-based identity model is 18-24 months away.
Cameron said the flexible claims architecture, which is based on standard protocols such as WS-Federation, WS-Trust and the Security Assertion Markup Language (SAML) will replace todayâ€™s more rigid systems that are based on a single point of truth, typically a directory of user information.
â€œYou need extroverted systems, not introverted,â€ said Cameron, who over the past few years has aligned Microsoft, its competitors and open source advocates around user-centric identity models.
He said identity systems that are rigid and cannot connect to other systems will become irrelevant and a competitive disadvantage.
â€œYou may come with a claim that you are authorized to do something and it may not have any authentication [information] at all,â€ he said. â€œThis tremendously important factor means we can have a consistent technology that goes between authentication and authorization. We donâ€™t need all these different technologies and have all this new stuff to learn. It can all be done using the claims-based model.â€
Cameron said this thinking is very different from a few years ago when authentication and authorization were thought of as entirely separate technologies that should never be confused.
He said the beauty of the claims model is that it can grow out of the infrastructure users have today, including PKI, directory services and provisioning systems.
The claims model, he said, is more flexible and based on components that can be snapped together like Lego blocks. Cameron called them Legonic Systems, which, he said, are agile and self-organizing much like service-oriented architectures. (Continued here…)
5 thoughts on “Identity systems all about making claims”
A lot of folks have been saying the it's absolutely critical to distinguish between authentication and authorization for lots of years. It's about time to recognize that distinction as hokum.
Comments are closed.