Feeds

Novell adds clout to Liberty Alliance

Robust standards

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Novell threw much - needed support behind the Liberty Alliance yesterday stating that it had some very useful experience to bring to the table. It wasn't joking either - we were wondering how the Alliance would function without such a backer.

The Liberty Alliance was created with one over-riding aim: to address the increasingly complex issue of electronic identification. The plan, therefore, is to develop a number of 'open' yet federated solutions for network identities which will enable the all important single sign-on, decentralised authentication and open authorisation from any device connected to the network - Internet or otherwise.

This is no light-weight remit. A single sign-on is difficult enough typically but it gets even more complex when you consider the multitude of devices are likely to connect. Add in the notion of open standards and you can see why the Alliance needs all the help it can get.

Step up Novell.

Novell joining the Alliance is a major boost in one obvious way. Novell does electronic identification - probably better than anyone else in a complex environment. It has its market leading eDirectory to underpin the whole thing and it has a raft of experience and technical competency that few could contrast. Also it has its single sign-on solutions, biometrics and pretty much everything else that an alliance such as Liberty needs.

Indeed, this whole centralised approach, directory driven single sign-on is Novell's true home. It could, very probably, do this stuff on its own. But the addition of AOL, with Netscape's directory product, Sun and HP will undoubtedly make for a more robust and acceptable set of standards.

Microsoft hasn't taken the plunge yet - despite its rather active Passport identification solution. But is this a bad thing? Probably not. Microsoft could undoubtedly give the project similar, although arguably inferior, solutions, but these do not meet the pre-requisite of the 'open' system.

Sure, Microsoft could provide a directory and everybody could probably tap into Active Directory, but this would only be a de facto, as opposed to actual, open system. And anyway, Microsoft and AOL-TW sitting together in a group called the Liberty Alliance would probably make everyone shuffle uncomfortably.

© IT Analysis.com. All rights reserved.

Security for virtualized datacentres

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
IBM, backing away from hardware? NEVER!
Don't be so sure, so-surers
Hey - who wants 4.8 TERABYTES almost AS FAST AS MEMORY?
China's Memblaze says they've got it in PCIe. Yow
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
This time it's SO REAL: Overcoming the open-source orgasm myth with TODO
If the web giants need it to work, hey, maybe it'll work
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.