This presentation will outline a comprehensive reference architecture for meeting the secure access and provisioning demands of outsourcing business and technology processes to “the cloud”. The attendee will walk away with a more solid understanding of what identity and access management challenges face organizations looking to move application and business process support to cloud computing providers as well as offer a reference architecture that outlines how to build standards based solutions for each challenge. John F. Bauer III has over 20 years of Information Technology and Security delivery experience. John is currently the Enterprise Security Architect for Key Bank and has previous held leadership positions at British Petroleum, Cliffs Natural Resources, MTD Products, and National City/PNC Bank. John has spoken previously on the topic of Information Security at CA World, Oracle Open World, Digital ID World and NACHA conferences. John has both a Computer Science degree and MBA from Case Western Reserve University’s Weatherhead School of Management and is a frequent Adjunct Professor on Network Security at Cuyahoga Community College. John also maintains an active blog: MidwestITSurvival.com.
Text of Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture
– Over 20 years of Information Technology and Security delivery experience.
– Currently the Enterprise Security Architect for Key Bank
Previous leadership positions at:
– British Petroleum
– Cliffs Natural Resources
– MTD Products
– National City/PNC Bank
Spoken previously on the topic of Information Security at:
– CA World
– Oracle Open World
– Digital ID World
– NACHA Security conferences.
– Computer Science degree and MBA from Case Western Reserve University’s Weatherhead School of Management
– Adjunct Professor on Network Security at Cuyahoga Community College
– Author: Blog – http://MidwestITSurvival.com
"Computing may someday be organized as a public utility just as the telephone system is a public utility," Professor John McCarthy said at MIT's centennial celebration in 1961. "Each subscriber needs to pay only for the capacity he actually uses, but he has access to all programming languages characteristic of a very large system ... Certain subscribers might offer service to other subscribers ... The computer utility could become the basis of a new and important industry."
Cleveland, Ohio, USA
Carl B. Stokes
Public Utilities Building
Agenda The Hype has Legs, Real Usage of “the Cloud” Growing (SaaS) Need for a Comprehensive IAM Architecture as Part of Secure
SaaS Success Business and Technology Architecture
User Access and Directories Provisioning Procurement, HR and Legal SSO and Federation Authorization
IAM Reference Architecture Architecture Framework Investment Roadmap
NOTE: All the content of this presentation is the opinion of the author and not the author's past or current employers.
The lower total operating costs afforded by cloud SaaS offerings resonates with IT and business leaders.
Booz Allen Senior Associate Gwen Morton and Associate Ted Alford compared the life cycle cost to run 1,000 servers in a managed environment in-house, through a cloud offering from a commercial provider, from a centralized in-house cloud, and a hybrid of a public and private cloud.