{"id":1496,"date":"2006-06-13T00:00:00","date_gmt":"2006-06-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/13\/novell-lets-bandit-loose\/"},"modified":"2021-12-30T11:39:29","modified_gmt":"2021-12-30T11:39:29","slug":"novell-lets-bandit-loose","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/13\/novell-lets-bandit-loose\/","title":{"rendered":"Novell Lets Bandit Loose"},"content":{"rendered":"<p>Managing your identity in the Internet of 2006 is a complex Web that requires multiple identities and passwords for multiple sites and services.   This open source effort led by Novell aims to integrate disparate identity standards and projects in an effort to help create an identity system that spans the Internet.  &#8220;Formerly announced Monday, Bandit actually went live in February.  Bandit integrates a number of different initiatives and open standards to identity management.   Among them is an implementation of the open source Higgins framework which is seen as an open source affront to Microsoft&#8217;s InfoCard single sign initiative.<br \/>\nProject Higgins is an effort in which Novell, IBM and other collaborate on an identity framework that enables users to integrate profile and identity information across disparate systems.  Other Bandit components include The Common Authentication Services Adapter (CASA), which enables interoperable authentication for sign-on systems, and the Role Engine service for role-based authorization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the auditing side, the Audit Record Framework service will deliver a compliance API as well as open auditing of records from Bandit.<\/p>\n<p>Regardless of what Novell actually does or doesn&#8217;t do with Bandit, the project is an open source project with code licensed under the GPL(define) and the LGPL(define) Free Software licenses.  As such anyone can take the code, use it and even add to it so long as they contribute their changes back to the community.<\/p>\n<p>&#8220;What we want to do is to provide a consistent identity fabric for interactions across the network,&#8221; Dale Olds, distinguished engineer at Novell told internetnews.com.  <\/p>\n<p>http:\/\/www.internetnews.com\/security\/article.php\/3612911<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1496","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1496"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1496\/revisions"}],"predecessor-version":[{"id":3983,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1496\/revisions\/3983"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}