
2 BACKGROUND
Many businesses have adopted the Web as a vehicle
for delivering both information and services to
customers, suppliers, and employees. By moving
internal business processes and external service
offerings to the Web, businesses can achieve
operating efficiencies and cost reductions.
Businesses that efficiently provide applications to
customers or suppliers via the Web can increase the
number of customers they serve without appreciable
increases in operating costs.
As the number of such applications grows, it is
desirable to both the business and to its application
users to provide a single login to each user. For the
user, access to multiple applications is simplified.
For the business, access to applications can be
controlled and monitored more readily.
General Electric (GE) has digitized many of its
internal processes for its hundreds of thousands of
employees worldwide. Most of GE’s businesses
also provide Web-based products and services to
their global customers and suppliers. Because of the
size of its user community and the large number of
applications, GE established a Single Sign On (SSO)
initiative across the company (Loshin, 2001).
The goal of SSO is to have all Web-based
applications share the same data repository for user
IDs, passwords, and other common information.
SSO benefits GE in that application programmers no
longer have to worry about collecting and managing
the common information. The cost and time to
develop Web applications is reduced, as is the cost
of maintenance and help desk support. GE’s SSO
solution, while achieving the intended benefits, had
its drawbacks, however. Millions of global
employee and customer records are located in a
single repository. Therefore, shared administration
is necessary to manage the information effectively.
Compounding the problem, the administrators who
are most capable of managing the data are as
distributed as the end users. Thus, a distributed
information management system is required to
distribute authority to a global community of
administrators responsible for managing this huge
volume of information.
At the same time as the SSO initiative, some of
GE’s businesses began to offer Web-based services
to communities of customers. For example, a GE
business may contract with a customer to provide a
suite of Web services for the customer’s staff. The
management of a user community requires
capabilities in addition to those for Single Sign On.
A community-based service compounds the
challenge of managing the user directory because the
knowledge of the users in the community resides
within the community, rather than at the GE
business. Therefore, GE must provide a mechanism
to allow communities of users to be established
within GE’s repository but maintained externally.
2.1 Prior Art
While the use of LDAP is growing, the number and
sophistication of LDAP administration tools have
not grown at the same rate. Two commercial tools
were found in an attempt to address this need;
however, each provided only a partial solution to the
problem.
Oblix’s Secure User Management Solution (now
a part of Oblix’s NetPoint product) (Oblix NetPoint,
2003) is capable of delegating the administration of
subsets of data and also supports specifying
attribute-level permissions on the data for
administrators. (An LDAP entry is comprised of a
set of ‘object classes’ that have corresponding
‘attributes.’ An entry has any number of these
associated attributes, which may be single or multi-
valued (Weltman & Dahbura, 2000).) However,
Oblix does not support arbitrary levels of delegation,
i.e., administrators cannot subdivide their world and
give other users part of their administrative
authority. Oblix also does not support dynamic
assignment of users to groups. Oblix’s group model
assumes that the organization is using LDAP groups
to arrange its user communities, an assumption that
restricts the structure of the customer’s directory.
LDAP groups are objects comprised of a list of
members.
At the time, Netegrity’s Delegated Management
Services (DMS) system was in the early phases of
being released as version 1.0. Offering less
capability than the Oblix solution, it did not support
a sophisticated model of attribute-based
authorization, supported only one level of
delegation, and enforced restrictions on the LDAP
group structure. Companies with an existing LDAP
infrastructure would have difficulty using
Netegrity’s DMS system. Netegrity has since
released the product IdentityMinder to replace DMS
(Netegrity IdentityMinder, 2003). IdentityMinder
supports role-based access control, although it still
lacks the flexibility GE requires.
While there are now more vendors in the
emerging area of identity management, these
vendors focus on access control and Single Sign On
to enterprise applications rather than on the
challenge of distributing administration of a large
directory (Senf, 2003). Identity management does
not provide a flexible delegation model to support
multiple overlapping or nested or isolated
communities of users. Identity management across a
ICEIS 2004 - DATABASES AND INFORMATION SYSTEMS INTEGRATION
156