* Liberty Alliance document looks at business concerns of identity federation One difference between WS-Federation and the Liberty Alliance specification for federated identity is that WS-Fed is the product solely of technology vendors while the Liberty Alliance, which has tech vendors as members, is primarily composed of consumer products vendors, government and nonprofit organizations. Reflecting that makeup, Liberty is quick to point out that technology is only part of the federation problem, and in many ways it’s the easiest part to solve.At last week’s Burton Group Catalyst Conference, the Liberty Alliance published a preliminary document outlining business requirements for wide-scale deployment of federated network identity. This is planned as the first in a series of documents outlining good practices for identity federation. WS-Fed so far has not even begun to address the business requirements of federation.As many of us have found out through our experiences with identity provisioning, the technology is the easy part. Cultural differences between organizations – even between different parts of a single organization – coupled with turf battles over data and political fights over control are the battlefields that the provisioning revolution was (and still is) fought on. Identity federation won’t be very different.The Liberty group’s business document is available at: https://www.projectliberty.org/resources/business_guidelines.htmlIt looks at four areas: * Mutual confidence – the processes and tasks business partners must undertake to set minimum quality requirements, certify the other party has met those requirements, and manage the risk of exposure.* Risk management – the best practices and procedures business partners must identify to guard themselves from losses due to identity fraud or the exposure of identity information as well as the loss of business integrity due to insecure processes or data.* Liability assessment – the process for determining what parties will bear which losses under what circumstances, and how to resolve disputes.* Compliance – the alignment with agreed-upon standards, policies and procedures and how that compliance is governed, including compliance with local privacy requirements.These guidelines owe much to the experiences companies have had with the Electronic Data Interchange (EDI) framework over the past 25 years, another place where technology was 10% of the solution and business process negotiation was 90%.It does sound a bit like the lawyers demanding their pound of flesh, and it’s easy for the technologists to say they can build in safeguards so that bad things never happen. But time and time again bad things have happened. When large amounts of money and prestige are at stake, the business managers aren’t going to let the technology managers have the final say. The business case has to be made, the business requirements have to be met. Only after that’s been done will the technology be able to make the connections. It was like that with EDI, it was (and is) like that with provisioning and it will also be like that with identity federation. Companies who overlook this necessary step do so at their own peril. Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe