{"id":626,"date":"2006-10-25T17:39:30","date_gmt":"2006-10-26T01:39:30","guid":{"rendered":"\/?p=626"},"modified":"2006-10-25T17:39:30","modified_gmt":"2006-10-26T01:39:30","slug":"ping-unveils-managed-card-ip-written-in-java","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=626","title":{"rendered":"Ping unveils Managed Card IP written in Java"},"content":{"rendered":"<p>Ashish Jain of <a href=\"http:\/\/www.pingidentity.com\/\">Ping Identity<\/a> seems to&nbsp;have&nbsp;broken&nbsp;another barrier by demonstrating&nbsp;a &#8220;managed card&#8221;&nbsp;identity provider written in Java.<\/p>\n<p>In the world of InfoCards,&nbsp;we talk about&nbsp;two kinds of &#8220;identity provider&#8221;.&nbsp; One is a &#8220;self-issued&#8221; card provider,&nbsp;through which&nbsp;individuals can make claims about themselves.&nbsp; The other is a &#8220;managed&#8221; card provider,&nbsp;which supports claims made by one party about another party.&nbsp;<\/p>\n<p>Examples of managed card providers could include claims made by an employer about its employees; a financial institution about its customers; an enterprise about its customers; or a reputation service making claims about its users.&nbsp; While the technology for posting tokens from an identity selector like Cardspace to a web site&nbsp;can be&nbsp;very light weight (RESTful), that for building managed card providers is more challenging.<\/p>\n<p>Here&#39;s how <a href=\"http:\/\/itickr.com\/index.php\/?p=41\" class=\"broken_link\">Ashish puts it<\/a>:<\/p>\n<div style=\"margin-left: 30px\">The Managed Card IdP as well as the RP server that we demonstrated at DIDW is now available for a test run. It\u00e2\u20ac\u2122s still early access\u00e2\u20ac\u00a6so expect some issues. But if you do want to try early, give it a go. It should give you an idea of the things to come.<\/p>\n<p><img loading=\"lazy\" id=\"image40\" title=\"baby_beer400x299.jpeg\" height=\"219\" alt=\"baby_beer400x299.jpeg\" src=\"http:\/\/itickr.com\/wordpress\/wp-content\/uploads\/2006\/10\/baby_beer400x299.jpeg\" width=\"260\" align=\"right\" \/><\/p>\n<p>Please do the following (you need to have RC1 client installed on your machine).<\/p>\n<ul>\n<li>Access the IdP Demo <a href=\"https:\/\/infocard.pingidentity.com\/idpdemo\" target=\"_blank\" class=\"broken_link\"><font color=\"#0a5692\">here<\/font><\/a>.<\/li>\n<li>Enter your information and click \u00e2\u20ac\u02dcGet Card\u00e2\u20ac\u2122.<\/li>\n<li>When the popup happens, click \u00e2\u20ac\u0153open\u00e2\u20ac\u009d to save it to the CardSpace Client. Alternatively, you can save it to the disk and double-click to install it. (You can change the extension from .crd to .xml if you are interested in looking at the contents).<\/li>\n<li>Close the CardSpace Client.<\/li>\n<li>Next go to the RP site <a href=\"https:\/\/infocard.pingidentity.com\/rpdemo\" target=\"_blank\" class=\"broken_link\"><font color=\"#0a5692\">here<\/font><\/a>.<\/li>\n<li>Click on the Managed Infocard Image.<\/li>\n<li>Your CardSpace client should pop-up at this time and only the relevant card should be available for selection.<\/li>\n<li>Select the card and it will challenge you to enter your IdP credentials. The server doesn\u00e2\u20ac\u2122t perform any password validation at this time (as long as the username is correct).<\/li>\n<\/ul>\n<p>And you should be logged in to the Relying party. The relying party page also displays the IdP as well as the RP message flow.<\/p><\/div>\n<p>I tried it and it definitely worked for me.&nbsp; I&#39;ll do a screen capture.<\/p>\n<p>I don&#39;t know if the picture in Ashish&#39;s piece shows something&nbsp;he drank as a baby, but if so, a lot of other programmers may want to try some.&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Managed Card IdP as well as the RP server that Ping Identity demonstrated at DIDW is now available for a test run<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[16,6,8,14,9,5],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/626"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=626"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/626\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}