The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
Phil Windley is the Founder and Chief Technology Officer of Kynetx. Kynetx provide a cloud-based application platform that is uniquely architected to use events, personal data, and APIs to create social products and services. He is also an Adjunct Professor of Computer Science at Brigham Young University where he teaches courses on reputation, digital identity, large-scale system design, and programming languages. Phil writes the popular Technometria blog and is a frequent contributor to various technical publications. He is also the author of the books The Live Web published by Course Technology in 2011 and Digital Identity published by O'Reilly Media in 2005.
Prior to joining BYU, Phil spent two years as the Chief Information Officer (CIO) for the State of Utah, serving on Governor Mike Leavitt's Cabinet and as a member of his Senior Staff. Before entering public service, Phil was Vice President for Product Development and Operations at Excite@Home. He was the Founder and Chief Technology Officer (CTO) of iMALL, Inc. an early creator of electronic commerce tools. Phil serves on the Boards of Directors and Advisory Boards for several high-tech companies. Phil received his Ph.D. in Computer Science from Univ. of California, Davis in 1990.
A solid book, but a bit dated when it comes to the technology and standards aspects. Fortunately about half of this book is how to build a identity architecture from the governance, policy, process POV. But I was disappointed because I was hoping for more relevant discussion about the technology pieces.
If you're a technology architect, this book is of use to you. If you're a technician, not so much.
Anyone dealing with digital identities should read this, whether your angle is identity management, security or just casual interest in what's affecting *yours*. It's not for the true expert - if you're already an expert in your field, you'll know most of this already, but will probably find a couple of nuggets along the way - but ideal for someone moving into a new field or wanting a better grounding in their existing one.
This is a clear, concise, and easy to read book on IDM and DRM. I recommend it HIGHLY to anyone who wants an overview of IDM and its roots in the X.500 space. While Digital Identity does not specifically address certain concepts such as roles management, it is an essential resource for anyone’s library of identity management books. I understand that this book is now out of print; this is unfortunate as I was looking forward to a 2nd edition.
Pretty poor and slanted book about Identity Management. Seems like the author couldn't figure out how to implement it fully in the enterprises he was a part of.
Its an OK read for those who have no idea what IdM is, but anyone that has a clue just avoid it.
A solid "yellow book" HL primer that effectively bridges old-school IAM approaches & terminology with more contemporary user & consumer-centric Webby approaches. Not that contemporary, though: given recent pace of innovation in claims-based and portable ID, it's already showing some age.
An excellent overview of how Digital Identity works. A good first step in understanding how IdM works. Showing it's age a little though. Needs to be updated to take into account the "Cloud" and Compliance models.