Abstract
Externalizing authorization processing from business applications has been a goal for architects and developers for many years. Recent compliance demands for more granular access control and policy transparency have increased the urgency to adopt an architectural model where authorization and entitlement management are consumed as a service rather than embedded within business applications. Major software vendors, such as Microsoft, Oracle, and SAP, are making significant steps to separate IdM functionality, including entitlement management from application logic. The market has also responded with a plethora of products that provide entitlement management and authorization functionality for commercial or custom-built application environments. Finally, the Extensible Access Control Markup Language (XACML) has emerged as the consensus authorization standard being supported by a growing number of IT and application vendors. Collectively, these forces form the basis of a nascent IdM market segment referred to as entitlement management.
This new entitlement management market continues to evolve over time as the industry’s understanding of capabilities matures and enterprise requirements expand. In this paper we will discuss several dynamics currently at play, review the product landscape, cover recent standards advancements, and mention some issues that early adopters are addressing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gerry Gebel and Alice Wang, “Entitlement Management: Ready to Enter the IdM Mainstream,” 16 December, 2008, Burton Group Identity and Privacy Strategies Report, (http://www.burtongroup.com)
Gerry Gebel, “XACML Interoperability Demonstration,” 3 December 2007, Burton Group Identity and Privacy Strategies Report, (www.burtongroup.com)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2010 Vieweg+Teubner | GWV Fachverlage GmbH
About this chapter
Cite this chapter
Gebel, G., Wang, A. (2010). Entitlement Management: Ready to Enter the IdM Mainstream. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9363-5_11
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0958-2
Online ISBN: 978-3-8348-9363-5
eBook Packages: Computer ScienceComputer Science (R0)