Welcome to IDtrust XML.org.
This is the official community gathering place and information resource for identity and trusted infrastructure standards. The site is hosted by the OASIS IDtrust Member Section, a group that encourages new participation from developers and users. This is an open, vendor-neutral community-driven site, and the public is encouraged to contribute content. See more about this site.
News: Submitted by Tracey Thomas on Wed, 10/28/2009 - 14:10.
ASRC has an opportunity in Sterling, VA for a Systems Administrator. Successful candidates will be able go through the clearance process. This position will be responsible for PKI certificate generation, revocation and maintenance. Data integrity checks along with minor databse administration and maintenance are also a part of the responsibilties. This position will take part in Certificate Authority root management, subordinate management, backup of the CA system, contingency planning and end user certificate management.
News: Submitted by dschur on Tue, 10/06/2009 - 13:21.
The Obama administration is poised to issue a long-awaited open
government directive as soon as two weeks from now that strikes a
balance between new information technology and new policies, White
House officials said.
News: Submitted by dschur on Fri, 09/25/2009 - 14:33.
My Sun Microsystems colleague Dave Edstrom asked me recently to prepare a webinar entitled “Identity Management in 2010: Trends and Predictions” and present it on the weekly “Software Technical Roundtable” he co-hosts for Sun Microsystems employees and partners.
News: Submitted by dschur on Fri, 08/07/2009 - 13:55.
The General Services Administration plans to
launch an online storefront that agencies can use to purchase computing
services that are stored and maintained by third-party providers,
federal Chief Information Officer Vivek Kundra said on Wednesday.
News: Submitted by carolgeyer on Fri, 08/07/2009 - 13:20.
Two major identity management companies are forging ahead with
products designed to satisfy what a cloud-computing consortium calls
one of the trickiest problems preventing secure and automated
connections between internal IT infrastructures and external service
providers: identity and authentication.
Last week at The Burton Group's Catalyst Conference,
Novell demonstrated a pre-release version of its Cloud Security
Service, designed to synchronize login and authentication data between
external clouds and internal systems without exposing internal security