Feeds

Novell adds clout to Liberty Alliance

Robust standards

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Novell threw much - needed support behind the Liberty Alliance yesterday stating that it had some very useful experience to bring to the table. It wasn't joking either - we were wondering how the Alliance would function without such a backer.

The Liberty Alliance was created with one over-riding aim: to address the increasingly complex issue of electronic identification. The plan, therefore, is to develop a number of 'open' yet federated solutions for network identities which will enable the all important single sign-on, decentralised authentication and open authorisation from any device connected to the network - Internet or otherwise.

This is no light-weight remit. A single sign-on is difficult enough typically but it gets even more complex when you consider the multitude of devices are likely to connect. Add in the notion of open standards and you can see why the Alliance needs all the help it can get.

Step up Novell.

Novell joining the Alliance is a major boost in one obvious way. Novell does electronic identification - probably better than anyone else in a complex environment. It has its market leading eDirectory to underpin the whole thing and it has a raft of experience and technical competency that few could contrast. Also it has its single sign-on solutions, biometrics and pretty much everything else that an alliance such as Liberty needs.

Indeed, this whole centralised approach, directory driven single sign-on is Novell's true home. It could, very probably, do this stuff on its own. But the addition of AOL, with Netscape's directory product, Sun and HP will undoubtedly make for a more robust and acceptable set of standards.

Microsoft hasn't taken the plunge yet - despite its rather active Passport identification solution. But is this a bad thing? Probably not. Microsoft could undoubtedly give the project similar, although arguably inferior, solutions, but these do not meet the pre-requisite of the 'open' system.

Sure, Microsoft could provide a directory and everybody could probably tap into Active Directory, but this would only be a de facto, as opposed to actual, open system. And anyway, Microsoft and AOL-TW sitting together in a group called the Liberty Alliance would probably make everyone shuffle uncomfortably.

© IT Analysis.com. All rights reserved.

Internet Security Threat Report 2014

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?