Category Archives: Identity Management

Managing PIV Lifecycle and Converging Physical & Logical Access Control

Last week, I was at the 7th Annual Smart Card in Government Conference and had the  opportunity to join a panel on “Personal Identity Verification (PIV) – Technologies” and presented a session entitled “Managing PIV Lifecycle and Converging Physical and Logical Access Control” with emphasis on implementing HSPD-12/FIPS-201 mandates.  I thoroughly enjoyed my participation in the conference, particularly the overwhelming … Read more »

Exploring SPML with Sun Identity Manager 7.x – A Cheatsheet

Are you tired of the high-level SPML content floating around the web from couple of analysts with no practical guidance ! If you are a practical guy..who want to explore SPML, here is something that you may find worth test-driving for SPML 1.0 amd SPML 2.0 based provisioning operations. I had been using SPML using Sun IDM 7.0 for a while now.  Most… Read more »

Using SAML w/ SPML – A potential reality !

      No Comments on Using SAML w/ SPML – A potential reality !

I had multiple opportunities to work on SPML based user-provisioning with Sun Java System Identity Manager.  I found SPML as a very compelling standard, it worked as piece-of-cake on Sun IDM that certainly simplified my efforts on representing provisioning requests intended for creating, modifying, canceling, deleting, enabling, disabling, searching user accounts and associated access control privileges with multiple resources. Naturally… Read more »

Biometrics enabled Single Sign-On (SSO) using SAML

Last week, I was at Biometric Consortium Conference 2006 to present “Biometric Single Sign-On using SAML: Architecture and Design Strategies” and demonstrate one of my favorite topic of interest – Stronger authentication solution that combines “Web Access Management/SSO/Federation” using “Biometrics”.  I used my previous JAAS Module integration work between Sun Java System Access Manager 6.x (SunONE Identity Server) and BioBex… Read more »

Security Patterns @Information Security Conf. NY

After long time, last week Chris and I joined together at Newyork for presenting a session on “Security By Default” at “Information Security Conference – 2006”.  The overall attendance in the conference was’nt great…. but we did have some participation in our session.  Chris and I did’nt forget to have fun especially the good food and drinks at couple of… Read more »

Meet us at JavaRanch

      No Comments on Meet us at JavaRanch

This week, Chris and I will be participating in JavaRanch online discussion forum to share our Core Security Patterns work and answer questions from the JavaRanch developer community particularly those with SECURITY focus.  The discussion will start Tuesday, January 10th 2006 and end on Friday January 13th 2006. As a surprise, We’ll be selecting four random posters in this forum… Read more »

Belgium eID Authentication for Web SSO and Sun Ray Desktop Authentication.

Last 3 weeks, been so hectic…the days were faster than light,  I was pulling my-hair-out on a critical proof-of-concept that requires demonstrating Web Single Sign-on (via Sun Java System Access Manager) using PKI/Digital certificate credentials (from Belgian eID) and then enable Smartcard PKI based Desktop authentication/Session Mobility using Sun Rays. The secret sauce on this architecture is using OpenSC PAM… Read more »

Using JAAS for Biometric Authentication – Yes, it works.

Last few months, I was passionately busy working on an interesting project opportunity …to implement a biometric authentication module for a security sensitive J2EE application (Sorry…don’t ask who is the customer :-)). Ofcourse, the target is a die-hard Sun customer who believed on us -not- that armed contractor. They suggested me to use CrossMatch Verifier-E Fingerprint scanner and BioBex middleware… Read more »

Our show at RSA…

      No Comments on Our show at RSA…

We did two panel sessions at RSA Conference, SFO last week – Both were well received.  Here is the links to the slides that we used to present  “Core Security Patterns” in the sessions. RSA 2005 Panel – Building End-to-End Security for XML Web Services: Applied Techniques, Patterns and Best Practices Security Patterns and Best Practices for J2EE, Web Services… Read more »