Saturday Feb 07, 2009

OpenSSO Community Day in Munich -- May 5, 2009


"Ohhhh, it's been a long journey from Munich to Minsk, Rochelle, Rochelle!"

You asked and we listened . . . OpenSSO Community Day 2.0 will be held in Munich for all of our European OpenSSO friends to attend for FREE!!! Hosted by our colleages at Kuppinger Cole, this event will be held during the European Identity Conference 2009 at the Deutschen Museum in Munich, Germany and sponsored by Sun Microsystems. This is another opportunity for OpenSSO contributors, deployers and users to come together in an informal 'unconference' setting.

Being an unconference, the only rigid item on the agenda will be to decide at 9am on the sessions for the rest of the day. You can show up and talk about any OpenSSO-related topic you like. Maybe you have an interesting deployment, a new extension or a nagging question - sessions can be discussions as much as presentations. Now, that doesn't mean that there need be zero preparation - if you have a session in mind, go to the wiki and add it there, so folks can get an idea of the likely content ahead of time. We've already posted a few ideas.

All are welcome, attendance is free, and lunch will be provided. We'll likely adjourn to a nearby bar at the end of the day to continue the conversation

We're using meetup.com to manage the registration process - just join the OpenSSO group and RSVP!

Thursday Feb 05, 2009

OpenSSO Enterprise 12 Month Outlook

A few weeks ago I did a customer webinar to about 150+ people on OpenSSO with Jamie Nelson, my engineering brother in arms. The preso outlines our direction over the next 12 months. Check it out. No muppet songs in this video.

OpenSSO Community Day Super Sized!


Due to early demand, the OpenSSO Community Day @ NYU has super sized to a larger room so that we can hold up to 75 participants! So . . . if you are working on an access management, federation, or a secure web services project using OpenSSO or are just interested in learning about open source web access management tools then sign-up before the registration fills! First come, first served!

I have to admit that when we were planning this event we thought the first event would be quite small. Maaaaaaaan were we wrong. People are really excited about our first community event and it's sparked some ideas on doing more events in other regions -- stay tuned Europa!

Register Now

Tuesday Feb 03, 2009

Roadmap Preview: 1x Password w/ Mobile Phone

At the end of last week, I did a write-up on how we are extending OpenSSO to include Service-Level Monitoring. Today I'd like to talk about 1x Password capabilities that we are adding to OpenSSO.

One time passwords are used when an organization wants a higher level of authentication for users trying to access a web application. That is, they want to require a second way to authenticate users, such as a physical token card, besides simply entering a user name and password. This is commonly seen in the financial services sector when trying to access bank accounts or when accessing a corporate intranet remotely.

The challenge with physical token cards is that they tend to be expensive to purchase and disseminate. As an alternative, we are in the process of adding capabilities to OpenSSO that allows a user to obtain a 1x password via your mobile phone (i.e. - using SMS text messages). This is not a replacement for traditional multi-factor authentication solutions, but rather a lightweight alternative for those that don't want to buy a robust offering to complement their web access management solution. The key benefit of this solution is that organizations will be able to lower operational expenses by allowing consumers to use their cell phones as a physical token device rather than buying a separate piece of hardware.

Above is a video of what we are building. The solution uses Open Authentication (OATH) to do standards-based strong authentication. It's still rough, but this will give you a taste of what we are building.

Friday Jan 30, 2009

Roadmap Preview: OpenSSO Service-Level Monitoring

A few weeks ago I blogged that I would start going in to detail on the OpenSSO roadmap. I've been a bit slow in doing this so no more procrastination on my side. Here's the skinny on service-level monitoring.

The goal of service-level monitoring is to provide standards-based way for systems management solutions to view reports on OpenSSO component behavior, quickly view a dashboard for trends and deloyment status, diagnose problems and set threshhold alarms. OpenSSO was instrumented with the Java Enterprise System Monitoring framework APIs, which is CIM compliant, but we are now expanding it to support SNMP and plain JMX to monitor deployment status.

Within the OpenSSO community we are actively working to develop robust monitoring for large-scale deployments that allows system and network administrators to proactively manage important enterprise assets that range from physical devices to systems and applications. Through our new service-level monitoring capabilities deployers will be able to monitor their deployment health, detect and diagnose problems and use reported metrics to size deployments.

The monitoring solution will use monitoring agents and leverage existing agents such as those provided with OpenDS, GlassFish and the Java Virtual Machine. The mosaic of agents will all reporting management data to a management console, which can aggregate the information and present a single consolidated view for administrators.

Data captured by the OpenSSO monitoring solution will fall into the following categories for each OpenSSO component:

\* Configuration overview : number of servers, auth modules, Realms, agent types, etc
\* Metrics related to resource usage : cache sizes, connection pools, sessions, etc
\* Counts on operations : authentication success/failures, authZ sucess/failures etc
\* Faults and diagnostics : server/agent down, ldap health, connectivity issues, etc
\* Thresholds and alerts : events emitted when certain configured limits are met -- number of authentication failures exceeds limit, number of in-memory session exceeds limit, etc.

The traditional commercial release of service-level monitoring is March 2010, but as you know we support features upon completion in OpenSSO Express Builds the moment they are done, so regularly check the OpenSSO project to "monitor" development status.

Tuesday Jan 27, 2009

OpenSSO Community Day @ NYU - March 17, 2009


Join us for the very first OpenSSO Community Day!

Hosted by New York University and sponsored by Sun Microsystems, this is an opportunity for OpenSSO contributors, deployers and users to come together in an informal 'unconference' setting.

Being an unconference, the only rigid item on the agenda is to decide at 9am on the sessions for the rest of the day. You can show up and talk about any OpenSSO-related topic you like. Maybe you have an interesting deployment, a new extension or a nagging question - sessions can be discussions as much as presentations. Now, that doesn't mean that there need be zero preparation - if you have a session in mind, go to the wiki and add it there, so folks can get an idea of the likely content ahead of time. We've already posted a few ideas:

OpenSSO Community Day Agenda

All are welcome, attendance is free, and continental breakfast plus lunch will be provided. We'll likely adjourn to a nearby bar at the end of the day to continue the conversation :-)

We're using meetup.com to manage the registration process. Join the OpenSSO group and RSVP. And don't delay - 5 of the 40 places are already gone!

Cheers

Friday Jan 16, 2009

OpenSSO Enterprise: Developer.com Security Product of the Year 2009!

HOORAY! Developer.com selected OpenSSO Enterprise as the Security Product of the Year. I definitely did a Pee Wee Herman dance (see below) when I saw this one. We're real proud of our relationship with the development community and make it a huge part of our focus. We're glad people are noticing and expect to see lots of great things out of the OpenSSO Community again this year. Congrats everyone!

Everyday Access Management Webinar

Hey All! As "Pat mentioned, I'm doing a webinar on Everyday Access, Federation and Secure Web Services on Tuesday, Januaray 21. Preso is aimed at highlighting the core problems that web access management tools address and a tiered approach to conquering them from easiest to hardest. If you want to hear my schpeal click the link below to register. I may not be the IdentiCat this time, but I promise to entertain and make some jokes at Pat's expense.

REGISTER NOW

Friday Jan 09, 2009

Ping Star Wars Parody: May the Schwaaaaartz be with you!


Happy New Year! I just finished watching a portion of the new Ping Star Wars parody. (Sorry Ping friends. I didn't make it through the entire thing. It's just reeeeeaaaal loooooong.) I have to laugh though when I see them making the open v. proprietary and big v. small argument because Ping's commercial product is closed and proprietary!

OpenSSO is 100% open source, has a thriving external community and is completely free in all aspects of the word. We have lots of stories of companies deploying it on there own without Sun knowledge and from an innovation stand point we are moving at a trailblazing pace.

So . . . In the spirit of openness, it's that time of year where I plan to outline what we'll be doing in the OpenSSO Project over the next few months. I plan to write a multi-part series outlining the major features we will be adding to the product. To give a teaser, the core features that I'll be writing about are listed below. Stay tuned for more details over the next week or so.

UPCOMING FEATURES FOR OPENSSO:

1. Service-level Monitoring - service-level monitoring for large scale deployments.

2. Access Entitlement Management - Fine grained authorization for protecting web objects

3. 1x Passwords using SMS - Light-weight two-factor authentication using mobile phones.

4. Password Replay / Enhanced Reverse Proxy - The ability to memorize and recall passwords for web-apps not protected by your single sign-on solution

5. Embedded Container Option - Embedding Glassfish Application Server in OpenSSO so you don't need to deploy and configure a container prior to deploying OpenSSO

6. Ease-of-Use Task Flows - Lots more task flows that make it easier than ever to use OpenSSO services

Wednesday Dec 03, 2008

Top 10 Things That IT Does in Tough Times

Love this blog from Ping Identity -- Top 10 Things That IT Does in Tough Times. I couldn't agree more about the uptake on open source. We've seen a significant increase in OpenSSO activity over the last two months and attribute this to organizations looking for open source identity alternatives during these tough times. Check out our month by month message activity in the OpenSSO Project below.

Tuesday Dec 02, 2008

Federated SSO to SugarCRM using OpenSSO & simpleSAMLphp

The Sun Writers have been popping our tons of great technical articles of late on how to use OpenSSO 8. The latest one shows how to use OpenSSO and simpleSAMLphp to federate between an identity provider application written in Java and a service provider application written in php. The article uses SugarCRM, an open source php application, as an example. Check out the article and try it out if you have time!

Monday Dec 01, 2008

Sun Gartner WAM Leader Agaaaaaaain!

I'm thrilled to say we were positioned as a leader in the Gartner WAM MQ again this year. I'm very happy with the results and encourage you to focus on the strengths and weaknesses of each vendor rather than the color of the pretty dots. :-) Below is the image and Sun's strengths and weaknesses. We thought our growth was pretty impressive last year, Gartner didn't agree. Don't worry about that though, because we're just getting started. In fact, our product revenue grew by 30% last year. If you're interested in reading the whole report click here.

SUN MICROSYSTEMS

Product: Sun OpenSSO Enterprise (formerly Sun Access Manager)

Sun is a leader in the WAM market, due to a combination of technical platform expertise, diverse and experienced partnerships in consulting and SI; a growing customer base; and consistent customer service. OpenSSO Enterprise is a full-featured product, with identity federation, SOA capabilities and built-in Web services security functions.

Strengths

    \* Due to technical platform expertise, diverse and experienced partnerships in consulting and SI, a growing customer base, and consistent customer service, Sun is a leader in the WAM market.

    \* OpenSSO Enterprise is a full-featured product, with built-in identity federation, SOA capabilities and Web services security functions.

    \* Sun plays a leadership role in open-source WAM through the OpenSSO project, which gives the company a potential customer base and the benefit of the efforts of the community that has developed around OpenSSO. When this option is included, Sun has the widest variety of pricing options for a WAM offering, and also has appealing standard pricing.

    \* Sun has focused on ancillary functionality to ease deployment, including federation partner offerings ("fedlets"), as well as standard, out-of-the-box task-based workflows.

    \* Sun's Partner Advantage Program remains a model for covering consulting, system integration, VAR and independent software vendor (ISV) needs for IAM customers.

    \* OpenSSO Enterprise now includes Microsoft SharePoint support and a fully functional security token service.

Caution

    \* Sun has a large customer base for OpenSSO Enterprise; however, growth in the customer base was relatively flat in 2007.

About

Read my extraordinary thoughts about the world of identity and access management. As an identity child prodigy, I have much to say about these subjects.

Search

Categories
Archives
« April 2014
SunMonTueWedThuFriSat
  
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today