Welcome!

Java Authors: Elizabeth White, Esmeralda Swartz, Trevor Parsons, Liz McMillan, Pat Romanski

Related Topics: Web 2.0

Web 2.0: Blog Feed Post

Cloud 2.0 – Cloud Identity and Social Media Engagement

Implementing Cloud Identity best practices is achieved through ‘IDaaS’ – Identity as a Service

A keystone to Cloud 2.0 is Cloud Identity – Common identity systems for single sign-on across Cloud as well as internal applications.

Implementing Cloud Identity best practices is achieved through ‘IDaaS’ – Identity as a Service, one of the services on our Roadmap.

A great example is this recent press release from NASA, about their use of ‘PIV’ technologies to secure their move to Google apps, and these are best practices defined in detail @ IDmanagement.gov.

Furthermore there is OMB M-11-11, which is a Whitehouse memo increasing the pressure to be implementing the HSPD-12 program, the Homeland Security Presidential Directive 12. This calls for use of identity technologies to better secure government systems, most notably ‘PIV’ (Personal Identity Verification) smartcards and associated key developments like PIV interoperability.

.

Social Sign-on
These developments aren’t limited to the VPN access technologies for staff, it expands holistically to provide a foundation for ‘Trusted Identities in Cyberspace’, in such a way as to enable features like ‘Social Sign-on’. One example vendor is Janrain.

This is a process where you can log in to one site (eg. a government claims site) using your username/password already supplied to another web site, like Facebook for example. Hence ‘social sign-on’.

The USA policy requirements for the public sector for this are documented in this Whitehouse directive requiring agencies to begin accepting signin credentials from external sites. 

More Stories By Cloud Ventures

The Cloud Ventures Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.