Paul Simmonds discusses the importance of identity and attribute information that will define how access to the functionality and how data is governed by applications in the near future.
Francois Lascelles examines the role of API management infrastructure in API Security, API Access Control and API Federation and its interaction with enterprise infrastructure, social identity and application developers.
Justin Kobel introduces claims-based authentication, what are claims, their life cycle, explaining how to consume them in .NET through a number of demoes.
Chas Emerick explains how to implement multi-factor authentication, role-based authorization and phishing prevention with Friend.
Derek Parham discloses details of the largest and most complicated user migration and code refactoring in Google’s history when all their services were made available to Google Apps users.
Ganesh Prasad discusses the essentials of the loosely-coupled identity management approach called LIMA,
John Davies discusses passwords, the need for multiple passwords and password managers, and how OAuth is providing SSO for multiple sites, including an OAuth demo app for the iPhone.
Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.
Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.
Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.
Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.
Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.