THE WHATIS.COM WORD-OF-THE-DAY   
June 16, 2003

identity management 
______________
SPONSORED BY: AMD

64-bit computing software 
If you need more performance or are developing new applications, you
may want to consider migrating from 32-bits to 64-bits. Wondering how
much work is involved and which enterprise apps will most benefit?
Find out here. http://WhatIs.com/r/0,,15076,00.htm?amd
________________   
TODAY'S WORD: identity management 

See our complete definition with hyperlinks at
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci906307,00.html 

Identity management (ID management) is a broad administrative area
that deals with identifying individuals in a system (such as a
country, a network, or an enterprise) and controlling their access to
resources within that system by associating user rights and
restrictions with the established identity. The driver licensing
system is a simple example of identity management: drivers are
identified by their license numbers and user specifications (such as
"can not drive after dark") are linked to the identifying number.
 
In an IT network, identity management software is used to automate
administrative tasks, such as resetting user passwords. Enabling
users to reset their own passwords can save significant money and
resources, since a large percentage of help desk calls are
password-related. Password synchronization (p-synch) enables a user
to access resources across systems with a single password; a more
advanced version called single signon enables synchronization across
applications as well as systems. 

In an enterprise setting, identity management is used to increase
security and productivity, while decreasing cost and redundant
effort. Standards such as Extensible Name Service (XNS) are being
developed to enable identity management both within the enterprise
and beyond. 

In a wider context, industry groups such as the World Wide Web
Consortium (W3C) and The Open Group are developing standards that
would enable global identity management, in which each individual
would be uniquely identified, and all applicable data would be linked
to that identity. A position paper on the W3C Web site, Requirements
for a Global Identity Management Service, maintains that establishing
global identity management is crucial for the development of the Web
and Web services. The W3C position paper stipulates, among other
things, that such a system that must be universally portable and
interoperable; that it must support unlimited identity-related
attributes; that it must provide adequate mechanisms for privacy and
accountability; and that it must be overseen by an independent
governing authority. 

RELATED TERMS:

single signon 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci340859,00.html 

World Wide Web Consortium 
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci213331,00.html 

The Open Group 
http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci212708,00.html 

Web services
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci750567,00.html 

attribute 
http://searchwebservices.techtarget.com/sDefinition/0,,sid26_gci214608,00.html 

______________________
SELECTED LINKS:

The Global Information Assurance Certification Web site provides An
Introduction to Identity Management.  
http://www.giac.org/practical/GSEC/Spencer_Lee_GSEC.pdf 

The World Wide Web Consortium maintains a document about Requirements
for a Global Identity Management Service.  
http://www.w3.org/2001/03/WSWS-popa/paper57 

The National Electronic Commerce Coordinating Council provides a
white paper about Identity Management.  
http://www.ec3.org/Downloads/2002/id_management.pdf 

SearchSecurity.com has an article, "Identity management a must for
the virtual enterprise."  
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci822376,00.html 

______________________
TODAY'S TECH NEWS:

CASE STUDY: EMC CURES MEDICAL GROUPS' STORAGE ILLS
A storage environment out of control prompted the North Bronx
Healthcare Network to move all of its medical data to EMC storage. 
http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci906216,00.html 

LETTERS TO THE EDITOR: MICROSOFT'S CHANGES TO LICENSING 6.0
Recently, SearchWin2000.com asked our members to send in their
comments on the changes Microsoft is making to Licensing 6.0 and to
let us know what they'd to see in the new Software Assurance
maintenance program. Here's what a few of our readers had to say. 
http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci905796,00.html 

STUDY PREDICTS ENTERPRISE IM BOOM
The Radicati Group is bullish about the corporate instant messaging
market. New research outlines expected growth and outlines the
technology enhancements organizations can expect. 
http://searchdomino.techtarget.com/originalContent/0,289142,sid4_gci906195,00.html 

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com/ 

______________________
KNOW-IT-ALL QUESTION | Do you speak geek?

This is information that a Web site puts on your hard disk so that it
can remember something about you at a later time. 

a. mnemonic 
b. trigger
c. token
d. cookie

>> Click for correct answer
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211838,00.html 
 
______________________
Information Kit | Spyware

When you surf the Web, is someone monitoring your every keystroke? Is
it legal? Find out more about this controversial subject, and review
products designed to stop spyware.

http://whatis.techtarget.com/definition/0,,sid9_gci905446,00.html 

______________________
QUIZ #6 | All about servers

In the client/server programming model, a server is a program that
awaits and fulfills requests from client programs. How much do you
know about servers? Take our quiz and find out!

>> Click to take the quiz
http://whatis.techtarget.com/definition/0,,sid9_gci556836,00.html 

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] bump mapping 
http://whatis.techtarget.com/definition/0,,sid9_gci905729,00.html 

[2] BEx 
http://searchsap.techtarget.com/sDefinition/0,,sid21_gci905452,00.html 

[3] Our Favorite Cheat Sheets 
http://whatis.techtarget.com/definition/0,,sid9_gci826135,00.html 

[4] iPOD 
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci903269,00.html 

[5] utility computing 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci904539,00.html 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])

___________________________________________________________________
::::::::::::::::::::  ABOUT THIS NEWSLETTER   :::::::::::::::::::::

Published by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2003, All Rights Reserved.

Unsubscribe from 'Word of the Day'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://WhatIs.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to