I have been asking Lots of Questions on Identity
lately and hope that someone in the blogosphere may know the answer to my questions. Figured I would ask Phil since he may be best positioned to know the answers...
- If I work for a premier outsourcing firm and I have been asked to develop a software architecture document describing how identity should work and be consumed within an enterprise application I am thinking about, what should this document look like?
- Taking the above question, one step further how should they describe the notion of entitlements?
- In a federation that actually consumes identity of an outside party, the possibility exists for conflicts. For example, let's say that I wanted to have E&Y employees audit our books for one part of the company and them also consult on changing the general ledger. Ignoring for a moment that this is against the law (in most cases for public firms) who has the responsibility in terms of an identity ecosystem for handling the notion of a Chinese Wall?
- Infoworld does a great job of covering all the wonderful vendors in this space and all of the wonderful products that are available for sale but readers don't know which Fortune enterprise has the most mature thinking and/or implementation in this space. What would it take for this to be an upcoming Infoworld article?