THE WHATIS.COM WORD-OF-THE-DAY June 16, 2003 identity management ______________ SPONSORED BY: AMD
64-bit computing software If you need more performance or are developing new applications, you may want to consider migrating from 32-bits to 64-bits. Wondering how much work is involved and which enterprise apps will most benefit? Find out here. http://WhatIs.com/r/0,,15076,00.htm?amd ________________ TODAY'S WORD: identity management See our complete definition with hyperlinks at http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci906307,00.html Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. The driver licensing system is a simple example of identity management: drivers are identified by their license numbers and user specifications (such as "can not drive after dark") are linked to the identifying number. In an IT network, identity management software is used to automate administrative tasks, such as resetting user passwords. Enabling users to reset their own passwords can save significant money and resources, since a large percentage of help desk calls are password-related. Password synchronization (p-synch) enables a user to access resources across systems with a single password; a more advanced version called single signon enables synchronization across applications as well as systems. In an enterprise setting, identity management is used to increase security and productivity, while decreasing cost and redundant effort. Standards such as Extensible Name Service (XNS) are being developed to enable identity management both within the enterprise and beyond. In a wider context, industry groups such as the World Wide Web Consortium (W3C) and The Open Group are developing standards that would enable global identity management, in which each individual would be uniquely identified, and all applicable data would be linked to that identity. A position paper on the W3C Web site, Requirements for a Global Identity Management Service, maintains that establishing global identity management is crucial for the development of the Web and Web services. The W3C position paper stipulates, among other things, that such a system that must be universally portable and interoperable; that it must support unlimited identity-related attributes; that it must provide adequate mechanisms for privacy and accountability; and that it must be overseen by an independent governing authority. RELATED TERMS: single signon http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci340859,00.html World Wide Web Consortium http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci213331,00.html The Open Group http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci212708,00.html Web services http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci750567,00.html attribute http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci214608,00.html ______________________ SELECTED LINKS: The Global Information Assurance Certification Web site provides An Introduction to Identity Management. http://www.giac.org/practical/GSEC/Spencer_Lee_GSEC.pdf The World Wide Web Consortium maintains a document about Requirements for a Global Identity Management Service. http://www.w3.org/2001/03/WSWS-popa/paper57 The National Electronic Commerce Coordinating Council provides a white paper about Identity Management. http://www.ec3.org/Downloads/2002/id_management.pdf SearchSecurity.com has an article, "Identity management a must for the virtual enterprise." http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci822376,00.html ______________________ TODAY'S TECH NEWS: CASE STUDY: EMC CURES MEDICAL GROUPS' STORAGE ILLS A storage environment out of control prompted the North Bronx Healthcare Network to move all of its medical data to EMC storage. http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci906216,00.html LETTERS TO THE EDITOR: MICROSOFT'S CHANGES TO LICENSING 6.0 Recently, SearchWin2000.com asked our members to send in their comments on the changes Microsoft is making to Licensing 6.0 and to let us know what they'd to see in the new Software Assurance maintenance program. Here's what a few of our readers had to say. http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci905796,00.html STUDY PREDICTS ENTERPRISE IM BOOM The Radicati Group is bullish about the corporate instant messaging market. New research outlines expected growth and outlines the technology enhancements organizations can expect. http://searchdomino.techtarget.com/originalContent/0,289142,sid4_gci906195,00.html >> Catch up on all the latest IT news at http://searchtechtarget.techtarget.com/ ______________________ KNOW-IT-ALL QUESTION | Do you speak geek? This is information that a Web site puts on your hard disk so that it can remember something about you at a later time. a. mnemonic b. trigger c. token d. cookie >> Click for correct answer http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211838,00.html ______________________ Information Kit | Spyware When you surf the Web, is someone monitoring your every keystroke? Is it legal? Find out more about this controversial subject, and review products designed to stop spyware. http://whatis.techtarget.com/definition/0,,sid9_gci905446,00.html ______________________ QUIZ #6 | All about servers In the client/server programming model, a server is a program that awaits and fulfills requests from client programs. How much do you know about servers? Take our quiz and find out! >> Click to take the quiz http://whatis.techtarget.com/definition/0,,sid9_gci556836,00.html ______________________________ RECENT ADDITIONS AND UPDATES [1] bump mapping http://whatis.techtarget.com/definition/0,,sid9_gci905729,00.html [2] BEx http://searchsap.techtarget.com/sDefinition/0,,sid21_gci905452,00.html [3] Our Favorite Cheat Sheets http://whatis.techtarget.com/definition/0,,sid9_gci826135,00.html [4] iPOD http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci903269,00.html [5] utility computing http://searchcio.techtarget.com/sDefinition/0,,sid19_gci904539,00.html ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: LOWELL THING, Site Editor ([EMAIL PROTECTED]) ____________________________________________________________________ MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED]) ___________________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::: Published by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2003, All Rights Reserved. Unsubscribe from 'Word of the Day' - Simply Reply to this Email with REMOVE within the Body or Subject > or - Go to: http://WhatIs.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."