{"id":1446,"date":"2005-09-01T00:00:00","date_gmt":"2005-09-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/01\/ca-rolls-out-security-assertion-markup-language\/"},"modified":"2021-12-30T11:39:24","modified_gmt":"2021-12-30T11:39:24","slug":"ca-rolls-out-security-assertion-markup-language","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/01\/ca-rolls-out-security-assertion-markup-language\/","title":{"rendered":"CA Rolls Out Security Assertion Markup Language"},"content":{"rendered":"<p>Computer Associates International Inc. plans to use reduce costs and risks of connecting business applications and users across Web domains with Security Assertion Markup Language.   The scalable system is designed to allow customers to federate as identity providers or as service providers with multiple partners. It provides a standardized means for exchanging user authentication, entitlement and attribution both internally and externally.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Islandia, N.Y.-based company that SAML 2.0 support is available for eTrust SiteMinder, its Web access management solution.<\/p>\n<p>CA said the federation platform would allow companies to share identity information on the Web, with secure and controlled automation.  The access management support eliminates the need to re-authenticate at each site.  The scalable system is designed to allow customers to federate as identity providers or as service providers with multiple partners.  It provides a standardized means for exchanging user authentication, entitlement and attribution both internally and externally. <\/p>\n<p>SAML is an XML-based framework developed by OASIS Security Services Technical Committee.  It has an adaptable architecture and can easily be extended to partner organizations.<\/p>\n<p>http:\/\/www.techweb.com\/wire\/security\/170102622<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1446","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1446"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1446\/revisions"}],"predecessor-version":[{"id":3933,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1446\/revisions\/3933"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}