Feeds

Microsoft ID guru quietly skips away from Redmond

Report points digital identity poster child at door marked exit

Protecting users from Firesheep and other Sidejacking attacks with SSL

Updated Microsoft's top identity architect Kim Cameron, who was last seen on these pages bemoaning Apple's "duplicitous" privacy policies, reportedly quit Redmond earlier this week.

According to ZDNet's Mary-Jo Foley, who cites anonymous sources, Cameron had a leaving do at Microsoft on Wednesday.

However, both Cameron and Microsoft have so far remained silent about his decision to move on from the company.

The Register has asked Microsoft to confirm Cameron's resignation, but we've yet to hear back.

The digital ID expert hasn't updated his blog since 21 April, and is yet to announce his departure on LinkedIn, Twitter or via any of the other Web2.0 ways adopted by many tech stars to reveal their break-ups.

As noted by Foley, Cameron appears to have quit on the same day that Microsoft's Windows Live division confirmed plans to support OAuth 2.0 in the next version of its Messenger Connect developer platform.

France-based Cameron joined Microsoft in 1999 when it acquired ZOOMIT, where he had worked as that's company's technology veep.

"Kim plays a leading role in the evolution of Active Directory, Federation Services, Forefront Identity Manager, CardSpace and Microsoft’s other Identity Metasystem products," his biog notes.

Cameron's apparent exit follows Dick Hardt's decision to leave the firm in early 2010, after joining Microsoft as a partner architect working on consumer, enterprise, and government identity problems in December 2008.

Microsoft, meanwhile, is presumably feverishly searching for Cameron's replacement and perhaps more ominously, according to our sources, is undertaking a big shake-up of the identity access group with at least two important men, Lee Nackman and Craig Wittenberg, said to have been sidelined. It's also unclear who will now steer development of Redmond's U-Prove cryptology technology, which the company bought in March 2008. ®

Update

Microsoft declined to comment on this story. Meanwhile, it looks as though Microsoft wants to hire "proven top development talent in the areas of identity and access, directory, and cloud platform services (PaaS)." (Our emphasis). Assuming that is, that MS technical fellow John Shewchuk's LinkedIn page isn't out of date.

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.