Books & Videos

Table of Contents

  1. Chapter 1 Introduction

    1. Business Opportunity

    2. Digital Identity Matters

    3. Using Digital Identity

    4. The Business Context of Identity

    5. Foundational Technologies for Digital Identity

    6. Identity Management Architectures

  2. Chapter 2 Defining Digital Identity

    1. The Language of Digital Identity

    2. Identity Scenarios in the Physical World

    3. Identity, Security, and Privacy

    4. Digital Identity Perspectives

    5. Identity Powershifts

    6. Conclusion

  3. Chapter 3 Trust

    1. What Is Trust?

    2. Trust and Evidence

    3. Trust and Risk

    4. Reputation and Trust Communities

    5. Conclusion

  4. Chapter 4 Privacy and Identity

    1. Who's Afraid of RFID?

    2. Privacy Pragmatism

    3. Privacy Drivers

    4. Privacy Audits

    5. Privacy Policy Capitalism

    6. Anonymity and Pseudonymity

    7. Privacy Principles

    8. Prerequisites

    9. Conclusion

  5. Chapter 5 The Digital Identity Lifecycle

    1. Provisioning

    2. Propagating

    3. Using

    4. Maintaining

    5. Deprovisioning

    6. Conclusion

  6. Chapter 6 Integrity, Non-Repudiation, and Confidentiality

    1. Integrity

    2. Non-Repudiation

    3. Confidentiality

    4. Conclusion

  7. Chapter 7 Authentication

    1. Authentication and Trust

    2. Authentication Systems

    3. Authentication System Properties

    4. Conclusion

  8. Chapter 8 Access Control

    1. Policy First

    2. Authorization Patterns

    3. Abstract Authorization Architectures

    4. Digital Certificates and Access Control

    5. Conclusion

  9. Chapter 9 Names and Directories

    1. Utah.gov: Naming and Directories

    2. Naming

    3. Directories

    4. Aggregating Directory Information

    5. Conclusion

  10. Chapter 10 Digital Rights Management

    1. Digital Leakage

    2. The DRM Battle

    3. Apple iTunes: A Case Study in DRM

    4. Features of DRM

    5. DRM Reference Architecture

    6. Trusted Computing Platforms

    7. Specifying Rights

    8. Conclusion

  11. Chapter 11 Interoperability Standards

    1. Standards and the Digital Identity Lifecycle

    2. Integrity and Non-Repudiation: XML Signature

    3. Confidentiality: XML Encryption

    4. Authentication and Authorization Assertions

    5. Example SAML Use Cases

    6. Identity Provisioning

    7. Representing and Managing Authorization Policies

    8. Conclusion

  12. Chapter 12 Federating Identity

    1. Centralized Versus Federated Identity

    2. The Mirage of Centralized Efficiency

    3. Network Effects and Digital Identity Management

    4. Federation in the Credit Card Industry

    5. Benefits of Federated Identity

    6. Digital Identity Standards

    7. Three Federation Patterns

    8. Conclusion

  13. Chapter 13 An Architecture for Digital Identity

    1. Identity Management Architecture

    2. The Benefits of an Identity Management Architecture

    3. Success Factors

    4. Roadblocks

    5. Identity Management Architecture Components

    6. Conclusion

  14. Chapter 14 Governance and Business Modeling

    1. IMA Lifecycle

    2. IMA Governance Model

    3. Initial Steps

    4. Creating a Vision

    5. IMA Governing Roles

    6. Resources

    7. What to Outsource

    8. Understanding the Business Context

    9. Business Function Matrix

    10. IMA Principles

    11. Conclusion

  15. Chapter 15 Identity Maturity Models and Process Architectures

    1. Maturity Levels

    2. The Maturity Model

    3. The Rights Steps at the Right Time

    4. Finding Identity Processes

    5. Evaluating Processes

    6. A Practical Action Plan

    7. Filling the Gaps with Best Practices

    8. Conclusion

  16. Chapter 16 Identity Data Architectures

    1. Build a Data Architecture

    2. Processes Link Identities

    3. Data Categorization

    4. Identity Data Structure and Metadata

    5. Exchanging Identity Data

    6. Principles for Identity Data

    7. Conclusion

  17. Chapter 17 Interoperability Frameworks for Identity

    1. Principles of a Good IF

    2. Contents of an Identity IF

    3. Example Interoperability Framework

    4. A Word of Warning

    5. Conclusion

  18. Chapter 18 Identity Policies

    1. The Policy Stack

    2. Attributes of a Good Identity Policy

    3. Determining Policy Needs

    4. Writing Identity Policies

    5. An Identity Policy Suite

    6. Assessing Identity Policies

    7. Enforcement

    8. Procedures

    9. Conclusion

  19. Chapter 19 Identity Management Reference Architectures

    1. Reference Architectures

    2. Benefits and Pitfalls

    3. Reference Architecture Best Practices

    4. Using a Reference Architecture

    5. Components of a Reference Architecture

    6. Technical Position Statements

    7. Consolidated Infrastructure Blueprint

    8. System Reference Architectures

    9. Conclusion

  20. Chapter 20 Building an Identity Management Architecture

    1. Scoping the Process

    2. Which Projects Are Enterprise Projects?

    3. Sequencing the IMA Effort

    4. A Piece at a Time

    5. Conclusion: Dispelling IMA Myths

  1. Colophon