{"id":1417,"date":"2005-05-10T00:00:00","date_gmt":"2005-05-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/10\/ibm-rolls-out-federated-id-management-software\/"},"modified":"2021-12-30T11:39:20","modified_gmt":"2021-12-30T11:39:20","slug":"ibm-rolls-out-federated-id-management-software","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/10\/ibm-rolls-out-federated-id-management-software\/","title":{"rendered":"IBM Rolls Out Federated ID-Management Software"},"content":{"rendered":"<p>The Tivoli Federated Identity Manager is designed to securely extend the single-sign-on approach from internal systems to external business partners and suppliers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The IBM Tivoli Federated Identity Manager is designed to let a user log on to an Internet computer system or network and then use that connection to access information or systems run by a business partner, service provider, or other affiliated company.  For example, an employee could sign on to his company&#8217;s computer network and have that network provide the security authentication necessary when that user tries to access health-care insurance information on an insurer&#8217;s site or order parts from a supplier&#8217;s site.  Some companies will take on both roles, confirming that a user signing on to the network is who they claim to be and then providing secure authentication when that user travels over the Internet to the sites of partners.  A common way to share identities between providers means customers won&#8217;t have to replicate or stage business processes for their security providers, IBM says.<\/p>\n<p>Identity management is a market that&#8217;s poised to take off in the next year or two, but few companies are able to deploy such software today without help, says Jon Oltsik, an analyst at Enterprise Strategy Group.  &#8220;So IBM uses [Federated Identity Manager] to get through the door with customers,&#8221; he says, &#8220;and sets up IBM Global Services to make them ready.&#8221;<\/p>\n<p>http:\/\/www.informationweek.com\/showArticle.jhtml;jsessionid=DUUJ1L5ZK2NH4QSNDBNSKH0CJUMEKJVN?articleID=163100244<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1417","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1417"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1417\/revisions"}],"predecessor-version":[{"id":3904,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1417\/revisions\/3904"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}