Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PISCATAWAY, NJ -- (Marketwired) -- 03/18/14 -- The User-Managed Access (UMA) protocol was originally designed to help individuals control Internet data sharing, but UMA's notion of authorization-as-a-service can also help modern enterprises control access to sensitive resources in cloud and mobile environments.
Kantara Initiative's UMA Work Group published revision 9 of its OAuth-based protocol on March 6 to solve a broad range of "access management 2.0" challenges, and will shortly begin interoperability testing. On Thursday, March 20, at 8am Pacific, the UMA Work Group will conduct a free public webinar sponsored by Kantara board member CA Technologies to discuss UMA's benefits for enterprises.
Register for the webinar and find specifications and interoperability information at http://tinyurl.com/umawg. Follow along on Twitter at @UMAWG with the #UMAam20 webinar hashtag.
Scott Morrison, SVP and Distinguished Engineer at CA Technologies, comments: "The OAuth standard began an important process by letting individuals control inter-account data sharing. UMA takes this concept further, and empowers not only individuals but also organizations to control data access in highly distributed environments. We believe UMA is the missing piece in the identity puzzle and a critical part of 21st century IAM."
Maciej Machulak, CEO of Cloud Identity and Vice-Chair of the UMA Work Group, says: "Businesses require modern and standard-based technologies to secure the increasing number of APIs and Web-accessible resources on-premise and in the Cloud. UMA gives them the right solution and easily integrates with other IAM technologies. Without a doubt, UMA will play a pivotal role in the identity space."
"For enterprises, managing access to a vast array of APIs and websites is a daunting challenge that now extends beyond the organizational perimeter," notes Lasse Andresen, CTO of Kantara Board Member ForgeRock. "Standards are essential for creating secure and interoperable B2B ecosystems. We are looking forward to the UMA interop and encourage other vendors to participate."
Michael Schwartz, CEO of Gluu, says: "To date, we've required developers to implement most access policies in code. With UMA, people and businesses can gain back control of the process. UMA is destined to become the foundation of domain application security."
Joni Brennan, executive director of Kantara Initiative, says the organization is "proud to host the UMA group's work. UMA is one of our highest-profile activities, gaining attention from around the world from innovators big and small. Kantara Initiative will continue to support UMA interoperability and adoption initiatives through our open and transparent community. We invite all interested parties to join the effort!"
About Kantara Initiative
http://kantarainitiative.org/
About the UMA WG
http://tinyurl.com/umawg
Add to Digg Bookmark with del.icio.us Add to Newsvine
Media Contact
Joni Brennan
732 226 4223
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs