Jump to ratings and reviews
Rate this book

Digital Identity: Unmasking Identity Management Architecture

Rate this book
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for Excite@Home.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

254 pages, Paperback

First published January 1, 2005

9 people are currently reading
46 people want to read

About the author

Phillip J. Windley

6 books38 followers
Phil Windley is the Founder and Chief Technology Officer of Kynetx. Kynetx provide a cloud-based application platform that is uniquely architected to use events, personal data, and APIs to create social products and services. He is also an Adjunct Professor of Computer Science at Brigham Young University where he teaches courses on reputation, digital identity, large-scale system design, and programming languages. Phil writes the popular Technometria blog and is a frequent contributor to various technical publications. He is also the author of the books The Live Web published by Course Technology in 2011 and Digital Identity published by O'Reilly Media in 2005.

Prior to joining BYU, Phil spent two years as the Chief Information Officer (CIO) for the State of Utah, serving on Governor Mike Leavitt's Cabinet and as a member of his Senior Staff. Before entering public service, Phil was Vice President for Product Development and Operations at Excite@Home. He was the Founder and Chief Technology Officer (CTO) of iMALL, Inc. an early creator of electronic commerce tools. Phil serves on the Boards of Directors and Advisory Boards for several high-tech companies. Phil received his Ph.D. in Computer Science from Univ. of California, Davis in 1990.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
12 (24%)
4 stars
18 (36%)
3 stars
16 (32%)
2 stars
1 (2%)
1 star
2 (4%)
Displaying 1 - 6 of 6 reviews
Profile Image for Andre.
408 reviews14 followers
November 10, 2021
A solid book, but a bit dated when it comes to the technology and standards aspects. Fortunately about half of this book is how to build a identity architecture from the governance, policy, process POV. But I was disappointed because I was hoping for more relevant discussion about the technology pieces.

If you're a technology architect, this book is of use to you. If you're a technician, not so much.
2,017 reviews57 followers
August 30, 2012
Anyone dealing with digital identities should read this, whether your angle is identity management, security or just casual interest in what's affecting *yours*. It's not for the true expert - if you're already an expert in your field, you'll know most of this already, but will probably find a couple of nuggets along the way - but ideal for someone moving into a new field or wanting a better grounding in their existing one.
Profile Image for Bill Nelson.
13 reviews1 follower
March 1, 2015
This is a clear, concise, and easy to read book on IDM and DRM. I recommend it HIGHLY to anyone who wants an overview of IDM and its roots in the X.500 space. While Digital Identity does not specifically address certain concepts such as roles management, it is an essential resource for anyone’s library of identity management books. I understand that this book is now out of print; this is unfortunate as I was looking forward to a 2nd edition.
Profile Image for Mister MN.
22 reviews5 followers
February 11, 2010
Pretty poor and slanted book about Identity Management. Seems like the author couldn't figure out how to implement it fully in the enterprises he was a part of.

Its an OK read for those who have no idea what IdM is, but anyone that has a clue just avoid it.
54 reviews
May 27, 2011
A solid "yellow book" HL primer that effectively bridges old-school IAM approaches & terminology with more contemporary user & consumer-centric Webby approaches. Not that contemporary, though: given recent pace of innovation in claims-based and portable ID, it's already showing some age.
51 reviews
June 12, 2012
An excellent overview of how Digital Identity works. A good first step in understanding how IdM works. Showing it's age a little though. Needs to be updated to take into account the "Cloud" and Compliance models.
Displaying 1 - 6 of 6 reviews

Can't find what you're looking for?

Get help and learn more about the design.