by Beth Staats
Quick Summary
Organizations and institutions holding licensed content or other sensitive forms of data -- regardless of whether the data may be hosted in a library or in a proprietary service or platform setting -- must do so with the intent of minimizing any risk of leakage or unauthorized
Organizations and institutions holding licensed content or other sensitive forms of data -- regardless of whether the data may be hosted in a library or in a proprietary service or platform setting -- must do so with the intent of minimizing any risk of leakage or unauthorized incursion by third parties. One solution consistently put forward in recent years is the use of federated identity management systems. An application verifies the user’s right to interact with a particular system by engaging with another system storing individual credentials and the various access rights associated with those credentials.
However, depending upon the institution’s role and resources, hesitation may arise about the trustworthiness of such federated identity systems. This roundtable will feature discussion by a variety of stakeholders (chief technology officers, information professionals, producers of content and service providers) to talk about available system options, their reliability and the benefits gained in their use. Welcome to EditPad.org - your online plain text editor. Enter or paste your text here. To download and save it, click on the button below.