OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

wsdm message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: RE: [wsdm] Security Question: Can we manage security resources using WSDM?


Title: Message
 
In addition to those categories, I would add:
 
Metrics:
    Successful Authentications (total, per time period, etc)
    Failed Authentications
    Successful Authorizations
    Failed Authorizations
 
Notifications:
    Failed Authentications
    Failed Authorizations
 
Policies:
    Access control rules
   
Obviously the Provisioning category covers the same functionality as SPML. In the SPML model there is the concept of a Provisioning Service Provider (PSP) that is analogous to the WSDM Manageability Provider. The PSP manages Provisioning Service Objects (PSOs) on Provisioning Service Targets (PSTs). The PSTs represent the underlying systems being provisioned to (e.g. directories, OSs, RDBMSs, etc). The PSOs are the entities such as accounts, organizational units, roles, etc.
 
It makes sense to me that the PSTs are a type of WSDM resource, but I'm not so sure about the PSOs.
 
Jeff Bohren
Product Architect
OpenNetwork Technologies, Inc
 
Try the industry's only 100% .NET-enabled identity management software. Download your free copy of Universal IdP Standard Edition today. Go to www.opennetwork.com/eval.
 
-----Original Message-----
From: Heather Kreger [mailto:kreger@us.ibm.com]
Sent: Thursday, June 03, 2004 10:20 PM
To: wsdm@lists.oasis-open.org
Subject: [wsdm] Security Question: Can we manage security resources using WSDM?

Per our call today, I'm sending this email to start a discussion on this topic:

Given that security needs to be managed and has resources that need to be managed,
will the WSDM architecture and interfaces be able to be used to express the manageability of
manageable security resources?

Which leads to the follow on question: what are the requirements for managing Security?
What are the manageable security resources?

Hal suggested the following categories:
Provisioning – enabling service around user – name/id/pw are resources – Jeff Bohren
Configuration – of authentication mechanism - certificate, keys are resources

Heather Kreger
STSM, Web Services Lead Architect for SWG Emerging Technologies
Author of "Java and JMX: Building Manageable Systems"
kreger@us.ibm.com
919-543-3211 (t/l 441) cell:919-496-9572



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]