James Governor of Redmonk (I might jeopardize our ranking in the next magic quadrant if I say that he’s the best software analyst on the planet. D’oh!) reckons that Open Source Software is Social Media. I agree wholeheartedly – this is exactly what we’re experiencing in OpenSSO. We would be building the next version of Sun Java System Access Manager (sorry – I have to appease the branding gods, and that string gets this blog entry listed on the Access Manager blogs page) regardless. OpenSSO is building a community (btw – we’re up to 432 members now) around the product. Random folks get to use it for cool stuff, we can make that cool stuff available for others, system integrators get to see inside the product and do a better job for our mutual customers, and we get feedback from the community at the earliest possible opportunity – from the design docs or code itself. Not to mention contributions from the wider community – the building software bit. It’s a win all round. Except for our competitors. Shame, that.
I’ll leave it to James and the other analysts to figure out where Open Source makes sense and where it doesn’t, but, I have to say, it’s working for us!
UPDATE – bonus customer quote from a Software Engineer at Google: “I like the fact that I can look at your source and give it to my security guys and get the blessing. That’s the main reason I’m looking at Sun’s stuff and not some closed source vendor”
I just read in John McLaughlin’s latest Sun SystemNews email newsletter that Sun Java Composite Application Platform Suite (Java CAPS) received the SWIFTReady Gold Label for Financial Enterprise Application Integration (EAI) for the ninth year in a row.
Apart from the fact that this is a great achievement for Java CAPS, the news made me smile for another reason. Back in the Trustbase days (heh – just found a Bloor report on Trustbase, if you’re really keen to know more – free registration required), I got to visit SWIFT a couple of times. If you ever get the chance to see their headquarters at La Hulpe, just outside Brussels, then GO! It’s amazing, like a Bond villain’s lair. You expect the tennis courts to slide back to reveal a rocket launch pad. And the cafeteria. Wow! Puts even the Googleplex to shame
It finally happened – I got a round tuit. The tuit in question was updating Planet Identity to a more recent version of the Planet software – specifically, Sam Ruby‘s Venus. There will be a bit of short term disruption as things settle down (I had to clear the feed cache), but the upside is that Atom feeds are now properly supported – no more <s and >s in the feed. Hopefully
Back in December of last year, Marina Sum and I co-wrote the article Sun and Microsoft Interoperate for Web Authentication, Part 1. In that article we examined how Sun Java System Access Manager‘s policy agents work with Microsoft Internet Information Server (IIS) to provide single sign-on and authorization in a heterogeneous environment. At the end of the piece, we promised further articles on integration with SharePoint Portal Server 2003 and Outlook Web Access in Microsoft Exchange 2003.
Well, it’s been a while, but the planets finally aligned for Robertis Tongbram, Access Manager policy agent engineer, and Marina to create the second article (deep breath): Sun and Microsoft Interoperate for Web Authentication, Part 2 – Sun Java System Access Manager and SharePoint Portal Server 2003. The article works from the basics of authentication and authorization in SharePoint to configuring single sign-on between Access Manager and SharePoint via the policy agent. If you’re wrestling with SharePoint, I recommend you go take a look.
Prompted by Ludo‘s recent entry on OpenDS @ Ohloh…
A few weeks ago, I discovered the OpenSSO project page on Ohloh, tracking information related to the OpenSSO community.
The Ohloh OpenSSO page provides links and news about the OpenSSO project, direct access to the Download area, license information and metrics such as number of developers, commit statistics per day and per developer, number of lines of code and much more.
If you are using OpenSSO, please add it to your stack on Ohloh, show us where you are located, and, if you want to provide a user review, you’re more than welcome.
Not too many blog entries lately, as I’ve been elbow-deep in code – Friday saw the first ever single sign-on from OpenSSO to Microsoft Active Directory Federation Services (ADFS) via WS-Federation (click on the screenshot for a closer look at the output of the ADFS test app). This is OpenSSO acting as an account partner (in ADFS terminology), or identity provider, to ADFS as a resource partner, or service provider. There is a lot of work still to do – single logout, account and attribute mapping, etc, but the core SSO protocol support is all there now.