Page 128 - How Cloud Computing Is Transforming Business and Why You Cant Afford to Be Left Behind
P. 128

MANA GEMENT STRATEGIES F O R THE CL OUD R EV OL UTION



                 applications. The “federated” identity moves with the end user
                 as she changes applications so that she doesn’t have to supply
                 multiple user names and passwords. In effect, she logs in once
                 and gets access to all the applications that she needs without
                 having to do so again, regardless of whether the applications
                 are in the enterprise or in the cloud. Microsoft says that it can

                 do more than just enforce controls on end users as they cross
                 the company boundary and move out into its Azure cloud. It
                 can identify and authenticate users from other companies or
                 from the public at large. It can use identity management from
                 multiple directories, in addition to its own Active Directory,
                 and use multiple types of identity confirmation. Its Identity
                 Platform serves as a metadirectory for end user access control.

                 Microsoft’s approach allows the application to demand a cer-
                 tain kind of unique identifier, a digital certificate, an Active
                 Directory name and title, or a Windows token. The system re-
                 trieves that identifier, if it’s available, and submits it to the ap-
                 plication, which accepts or rejects it. Identity under this system
                 is “claims based,” or just a claimed identifier until the applica-
                 tion accepts it. Some firms, such as start-up Symplified in Boul-
                 der, Colorado, say that they can also federate identity between
                 enterprise and cloud users, relying on directory sources.

                     As this was being written, Fujitsu senior director Daniel
                 Lawson said that in early 2010, his firm will launch cloud pro-
                 cessing services at its Dallas, Texas, and Sunnyvale, California,
                 data centers. The Dallas center will be secure enough to meet
                 the PCI regulations. Fujitsu can do this by implementing se-
                 cure FTP setups that ensure that the data that is sent arrives at





                    108
   123   124   125   126   127   128   129   130   131   132   133