Feeds

Microsoft Identity workshop

A rough and tumble affair

The Power of One Brief: Top reasons to choose HP BladeSystem

I've just been at a Microsoft Identity Workshop - Exploring Digital Identity. It was a good rough and tumble session, with a lot of the (pretty well-informed) attendees asking some searching questions.

As a result, I remain unconvinced by Microsoft's Digital Rights Management - for business documents, at least (I'm also not exactly sure why it was lumped in with Identity).

It doesn't do all that you might think it does, it's easily bypassed, and it's a sledgehammer to crack a nut, for what it does do, it seems to me. Why not just tag documents with a "public" "Internal Use" and "Confidential" label, and use security awareness training to encourage appropriate good practice?

It also seems to come configured for ease of use rather than the enforcement of rights management, and I suspect it may be a bit of a management nightmare to configure so it reliably implements your business' own digital rights policies - if these differ from what Microsoft considers the norm and you aren't a Microsoft-only shop.

There also seems to be a strong possibility of lock-in to the Microsoft platform in practice - you probably can integrate with other environments, but who has the time?

Infocard, on the other hand, seems to be one of those Microsoft technologies that might have been thought through and got right.

However, I'll be particularly interested to see the results of Microsoft's study on the legal implications of its approach to Digital Identity, when I get it - no matter how good the technology, success or failure will come from whether or not it enables better commercial contracts - and anybody's opinion of what makes sense as an Identity is worthless if the courts take a different view.

Finally, it was rather disturbing to find that at least one attendee at this workshop appeared to want us all to shut up, so he could see the demo of the technology in peace and make notes. But, we can get descriptions of technology from the web, or press releases. Surely, what journalists are supposed to do is ask questions, to try to determine whether the technology is fit for some purpose or whether it is just some marketroid's dream?

Partly the workshop organisers' problem, I guess, since different attendees clearly had conflicting needs. However, it was billed as a workshop, not a product demonstration; I do hope the UK press isn't becoming like (parts of) the US press, which dutifully listens to what it is told, takes notes, and claps when it is all over. I remember an occasion when a US journalist once apparently took it upon himself to apologise for the "disrespectful" questions asked by a UK journalist, at a US press conference.

The duty of the press, in the UK at least, is to give the vendors a hard time, on behalf of its readership. And I suppose the duty of its readership is to write in and complain when it thinks it isn't doing this.

It's just a PITA all round when Microsoft gets something more or less right for once; but it would be a really neat trick to get everything wrong all the time and still manage to be one of the biggest vendors of software on the planet. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.