Welcome!

Search Authors: Jnan Dash, Shelly Palmer, Carmen Gonzalez, Lori MacVittie, Liz McMillan

News Feed Item

Novell Enables Rapid Adoption of Identity Management by Open Sourcing Key Technologies

Working within the larger identity and open source communities, the Bandit project will address common identity management requi

WALTHAM, Mass., June 12 /PRNewswire-FirstCall/ -- Novell today announced the creation of Bandit(TM), a groundbreaking open source project with a charter to unify disparate identity systems and provide a consistent approach to securing and managing identity. The identity services in development by the Bandit community are open source and will work with existing industry standards such as WS- * and Liberty Federation, and open source projects including Eclipse Higgins. Novell has already contributed significant engineering resources and code to jump start this effort. Ultimately, the goal of the Bandit project is to provide organizations with a consistent approach to enterprise identity management challenges such as secure, role- based access and regulatory compliance reporting.

"The Bandit project is looking to address one of the toughest challenges in identity management today -- provide a consistent approach to securing and managing identity," said Mike Neuenschwander, vice president and research director for the Burton Group. "The creation of identity services that abstract the complexity of identity systems and that are interoperable and freely available is a worthwhile goal and represents an important inflection point in the ongoing development of the identity management market."

While many organizations deploy identity management technologies today, disparate vendor solutions can create complexity and potentially slow adoption. By developing an open source enablement layer, Novell and the Bandit community will make it possible to standardize identity management across differing systems and resources. Bandit's freely available code can then be overlayed on an existing identity management system.

The Bandit project is focused on delivering a single, consistent experience of digital identity and includes several common identity services such as authentication, roles, policy and compliance:

-- The Common Authentication Services Adapter (CASA) provides interoperable authentication that enables application and enterprise single sign-on with a secure vault for user and system credentials. -- The Common Identity service is an implementation of the Higgins framework for representing digital identity. -- The Role Engine service can be integrated into any application to consistently calculate role information and unify authorization across systems. -- The Audit Record Framework service provides an open auditing and compliance API and receives audit records from Bandit's open identity services and other applications to provide common identity and event information to verify security and compliance.

Novell already incorporates some of Bandit's open identity services within its SUSE(R) Linux distribution and plans to include Bandit's identity services in future releases of other products. Novell will continue to support the Bandit project with substantial engineering resources and will maintain the project while the Bandit community grows.

"The Bandit project was created in response to our customers' need to reduce the complexity of identity management in the enterprise," said Jeff Jaffe, executive vice president and chief technology officer for Novell. "The industry needs to come together and deliver common identity services that provide a consistent experience, regardless of the underlying infrastructure. Novell's initial sponsorship of the Bandit project is a natural extension of our leadership in both identity and open source, and we are gratified to see the groundswell of community support."

A Community-driven Approach to Enterprise Identity Management

The Bandit project builds upon the participation of the broader identity and open source communities and many industry leaders are expressing their support and commitment to the goals of the Bandit project.

PARTNER QUOTES:

Dominic Fedronic, chief technology officer for ActivIdentity Inc., said, "The deployment of digital identity assurance and strong authentication solutions for both government and enterprise would greatly benefit from seamless interoperability and tight integration with identity management systems. ActivIdentity supports Novell's leadership with the Bandit project and Higgins as we believe the resulting open industry standards will expand the market and deliver greater value to customers."

Paul Trevithick, technology lead for the Higgins project at the Eclipse Foundation, said, "We are very pleased that Novell is promoting the adoption of open source identity technologies and that the Bandit project is contributing to and leveraging Higgins. Bandit is providing an important service by making an open identity infrastructure available on enterprise platforms including SUSE Linux."

Anthony Nadalin, Distinguished Engineer and Chief Security Architect for IBM, said, "IBM is pleased that Novell is using Higgins as the Identity Management foundation for the Bandit project. As a leading proponent of open source, IBM is committed to working with the Eclipse Higgins community to solve the identity-related challenges our customers face everyday."

George Goodman, president of the Liberty Alliance management board and director, Platform Capabilities Lab at Intel, said, "Liberty Alliance welcomes open initiatives that bring the industry closer to achieving a ubiquitous interoperable privacy-respecting identity layer for the Internet. We salute the Bandit team for contributing open source that will help advance the deployment of Liberty-enabled federations and Web services on the widest possible scale."

Kim Cameron, architect of Identity and Access for Microsoft, said: "The Identity Metasystem provides a model for identity interoperability across the industry. We're happy to see Novell playing an active role in helping realize the Identity Metasystem and look forward to working with them to ensure interoperability between our respective products."

Jim Gerken, practice manager for identity management with Novacoast, said, "We have spent years connecting disparate authentication repositories which confirms the need for consistent and standard identity services. With Novell's leadership in identity and open source, Bandit is a natural community for Novell to create that leverages its position in both markets."

Bob Lord, Red Hat senior director engineering, said, "Red Hat supports open source initiatives to build stronger identity frameworks and controls based on open standards. The Bandit project provides several initiatives that will help simplify identity management in heterogeneous environments and drive further innovation for the enterprise. We look forward to working with the open source community to extend a flexible identity framework from desktop to server, network to application."

Sara Gates, vice president of Identity Management at Sun Microsystems, said, "As a co-founder of the Liberty Alliance and a leading champion of open source, we have seen firsthand how customers are embracing open source technologies as a way to accelerate business solutions and reduce their costs. We strongly support the move of identity management services into the open source community."

Dick Hardt, Sxip Identity founder and CEO, said, "The identity management industry needs a common approach to secure, role-based access and compliance reporting for the enterprise and open source projects like Bandit from Novell and Higgins are a great step in that direction. We see this as a natural complement to the user-centric Identity 2.0 efforts being made with SXIP and DIX and are excited to work with them on adding support of Bandit, Higgins and eDirectory(TM)."

Rob Clyde, Symantec vice president of technology, office of the CTO, said, "Symantec is a strong supporter of open source initiatives that enable developer communities and vendors to work together to create flexible solutions capable of meeting the diverse needs of our customers. Companies today face a tremendous challenge as they try to integrate disparate application systems and security infrastructures each with its own authentication technologies into a cohesive, manageable solution. A standards-based approach backed by an open source implementation is a beneficial step towards addressing the vexing problem of identity management."

Jonathan Alexander, Trusted Network Technologies vice president of engineering, said, "Bandit is addressing key customer challenges, such as integrating distributed identity and roles, that we see as we help customers deploy our identity security and audit solutions. We see the Bandit and Higgins projects as filling a critical need to tie disparate identity systems together into a more pervasive, integrated and powerful solution."

About Novell

Novell, Inc. delivers Software for the Open Enterprise(TM). With more than 50,000 customers in 43 countries, Novell helps customers manage, simplify, secure and integrate their technology environments by leveraging best-of-breed, open standards-based software. With over 20 years of experience, 5,000 employees, 5,000 partners and support centers around the world, Novell helps customers gain control over their IT operating environment while reducing cost. More information about Novell can be found at http://www.novell.com/.

Novell and SUSE are registered trademarks and Bandit and eDirectory are trademarks of Novell, Inc. in the United States and other countries. * Linux is a registered trademark of Linus Torvalds. All other third party trademarks are the property of their respective owners.

Novell, Inc.

CONTACT: Kerry Adorno of Novell, +1-781-464-8042 or [email protected];
or Sarah Murray of Horn Group, +1-781-356-7135 or [email protected], for
Novell

Web site: http://www.novell.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device experiences grounded in people's real needs and desires.
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect at Hookflash, will walk through the shifting landscape of traditional telephone and voice services ...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. According to a recent IDG Research Services Survey this rate of traffic will only grow. What's driving t...
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps, abiding by privacy concerns and making the concept a reality. These challenges can't be addressed w...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Architect for the Internet of Things and Intelligent Systems at Red Hat, described how to revolutioniz...
Bit6 today issued a challenge to the technology community implementing Web Real Time Communication (WebRTC). To leap beyond WebRTC’s significant limitations and fully leverage its underlying value to accelerate innovation, application developers need to consider the entire communications ecosystem.
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from hardware to software, or as we like to say, it’s an Internet of many different things. The difference ...
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.
SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Windstream (Nasdaq: WIN), a FORTUNE 500 and S&P 500 company, is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide. The company also offers broadband, phone and digital TV services to consumers primarily in rural areas.
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com), moderated by Ashar Baig, Research Director, Cloud, at Gigaom Research, Nate Gordon, Director of T...