advising on IT-business alignment
IT-business alignment about us blog our services articles & reports resources your profile exposure
blog
blog
Thursday, May 11, 2006

Novell and identity management: from a long-tailed mouse to a masked dog

Earlier this week, Martin LaMonica at CNET reported that Novell will be taking the covers off its latest foray into open source identity management: the Bandit project (a somewhat surprising choice of name given the focus on security, privacy and so forth but that's by the by - there is some justification for the name provided here).

Novell is sponsoring the project and contributing the engineering effort. Whilst it is actively seeking external input, Novell

in consultation with the Bandit community, sets the project engineering goals and retains ultimate responsibility for the project.

The objectives of the project are to: enable application access to identity stores; support multiple and pluggable authentication methods and user-managed authentication credentials; provide a simple API for role-based access control; and simplify auditing and reporting for compliance based on open standards and specifications.

To do so, Bandit has identified a number of components (described in more detail here):
  • Common Authentication Services Adapter (CASA) - for the storage of credentials and other authentication data by users and applications
  • Common Identity - a framework for abstracting different identity data stores based on the Java Naming and Directory Interface (JNDI), which provides identity data mapping and transformation, caching, a policy engine and a variety of connectors for different identity data stores, including LDAP, SQL, XML
  • Compliance Records Architecture - provides an API for auditing based on name/value pairs and a taxonomy for the hierarchical classification of audit records
  • Role Engine Architecture - for role-based access control and management of roles, relationships, membership and dynamic separation of duties.
The objectives of the project are certainly ambitious, addressing as they do some of the more challenging, higher-level aspects of identity management such as role-based access control and compliance. Novell certainly has significant identity management expertise to contribute and it will be interesting to see how much of the intellectual property in its identity management solutions will migrate to the Bandit deliverables.

When I first heard about Bandit and began to navigate the project's site, my first thought was "there seems to be some overlap here with the Higgins project (which Novell joined at the end of February), particularly this Common Identity thingy". A little more digging revealed that to be the case. Although there is no integration between the two yet - well it has only been a couple of months - the Bandit team envisages the creation of a Higgins context provider based on the Common Identity component. A context provider is the means by which the Higgins Framework plugs into different identity repositories, protocols etc to provide application developers, via the Eclipse framework, with a common API to build on different identity management solutions.

As Eric over at Digital ID World points out this is not the first open source identity management initiative and I completely agree with him that the involvement of Novell means that it is still a significant event. I think the fact that the project is focussing on higher-level (value?) identity management issues gives it added significance. It will be particular interesting to see which other domain names pop up in members' email addresses.


Burn this feed
Burn this feed!

Creative Commons License
This work is licensed under a Creative Commons License.

Blog home

Previous posts

SOA Software continues its acquisition spree
Capgemini CTO on service infrastructure
New podcast - MMS episode: on DSI and virtualisation
Microsoft and management - steady as she goes
Podcast episode #4: news analysis and some insight...
More ecosystem building from VMware
Podcast episode #3: ITSM, ITIL - where's the value?
Liberty must focus on user privacy and experience
Liberty, LECPs and user-centric identity
Introducing the Uncompany

Blog archive

March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
November 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
October 2007
November 2007
December 2007
January 2008
February 2008
March 2008
April 2008
May 2008
June 2008
July 2008
August 2008
September 2008
October 2008
November 2008
December 2008
January 2009
February 2009
March 2009
April 2009
May 2009
June 2009
July 2009

Blogroll

Andrew McAfee
Andy Updegrove
Bob Sutor
Dare Obasanjo
Dave Orchard
Digital Identity
Don Box
Fred Chong's WebBlog
Inside Architecture
Irving Wladawsky-Berger
James Governor
Jon Udell
Kim Cameron
Nicholas Carr
Planet Identity
Radovan Janecek
Sandy Kemsley
Service Architecture - SOA
Todd Biske: Outside the Box

Powered by Blogger

Weblog Commenting and Trackback by HaloScan.com

Enter your email address to subscribe to updates:

Delivered by FeedBurner