Videos
NOTE: to view videos full-screen, click on the button within the respective video window.
- Orange County’s Implementation of the XACML Architecture’s Components
John Ruegg and Tony Lucich provide a guided introduction to Orange County’s Identity Provider, OCID, including a discussion of how OCID enables the Juvenile Information Content Exchange (JUICE) project. Along the way, they highlight a few of the benefits of external authentication and authorization. (Download transcript) - Introduction to the CONNECT Consortium
John Ruegg, Mike Overton, and Maury Mitchell explain the history and scope of CONNECT’s information-sharing system. What were their business drivers? What benefits have federated identity and external authentication realized for their users and for their system maintenance? (Download transcript) - Overview of Orange County, California’s Identity Provider (OCID)
John Ruegg and Tony Lucich explore the numerous benefits of external authentication and the importance of communicating those benefits to achieve stakeholders’ buy-in. (Download transcript) - Implementing the Global Federated Identity and Privilege Management Standard in a Four-State Information-Sharing Enterprise
John Ruegg, Mike Overton, and Maury Mitchell discuss the CONNECT Consortium’s implementation of external identity authentication, using the GFIPM standard. In particular, the conversation includes CONNECT’s evolving technical architecture and change-management techniques for helping IT staff adjust to the new development methodology. (Download transcript) - Effective Project Management Strategies
John Ruegg and Tony Lucich discuss best practices for securing funding, selecting software, measuring return on investment, collecting and documenting requirements, prioritizing enhancements, and overcoming the “keys to the kingdom” objection to external authentication. (Download transcript) - Governance of Privacy in the Information-Sharing Enterprise
John Ruegg, Mike Overton, and Maury Mitchell discuss their real-world governance experiences, including challenges and lessons learned. The conversation includes governance structures, formal authority, data ownership, privacy policy development, and adding new partners. (Download transcript) - Orange County Users and the OCID Portal: WIIFM?, Part 1
John Ruegg and Tony Lucich explore the details of Orange County’s Identity Provider: the OCID portal, the new workflows for provisioning users, the team’s techniques for more rapid integration of additional applications, and the technical architecture that makes it all happen. (Download transcript) - Orange County Users and the OCID Portal: WIIFM?, Part 2
John Ruegg and Tony Lucich explore the details of Orange County’s Identity Provider: the OCID portal, the new workflows for provisioning users, the team’s techniques for more rapid integration of additional applications, and the technical architecture that makes it all happen. (Download transcript) - CONNECT Consortium’s Implementation of the XACML Architecture’s Components
John Ruegg, Mike Overton, and Maury Mitchell describe CONNECT’s business needs for external authorization. They also discuss CONNECT’s technical architecture (with distributed Policy Decision Points and audit logs), the technical resources that guided their development in a Microsoft .NET environment, their strategy for long-term maintenance, and the cultural shift from “need to know” to “need to share.” (Download transcript) - Supporting IT Staff Through the Transition to External Authentication and Authorization
John Ruegg and Tony Lucich describe effective strategies for overcoming internal objections to technical privacy, as well as several techniques for integrating legacy applications. (Download transcript) - Supporting Users Through the Transition to External Authentication and Authorization
John Ruegg, Mike Overton, and Maury Mitchell discuss the CONNECT Consortium’s change-management strategies for their users, including their Help Desk structure. The conversation also addresses the topics of data quality and achieving consensus about data markup. (Download transcript) - Future Frontiers, part 1
John Ruegg, Mike Overton, Maury Mitchell, and Tony Lucich discuss future business needs that could be served by components of the XACML architecture that their projects have not yet implemented: the Policy Administration Point (PAP), Policy Information Point (PIP), and Obligation Handlers. The conversation also explores the rapid development of adapters and connectors designed to integrate legacy systems. >(Download transcript) - Future Frontiers, part 2
John Ruegg, Mike Overton, Maury Mitchell, and Tony Lucich predict the future of the XACML architecture in the public sector. Their conversation ranges from Obligation Handlers to Policy Information Points that retrieve data about external conditions, and from potential new information-sharing partners to the importance of rethinking today’s business processes. (Download transcript)