OpenSSO Tab Sweep – Mar 27 2009

As always, a bumper crop of OpenSSO news from the last couple of weeks…

That wraps things up for another week – I’m off to jump in the Patmobile and brave 101. See you next time!

Jobs @ OpenSSO – March 2009

Sun is hiring engineers for OpenSSO and related identity products – we have a number of positions spanning engineering, QA and UI design. If you read my blog regularly, you’ll know that OpenSSO is hot stuff – open source single sign-on, federation and secure Web services, delivered as Sun OpenSSO Enterprise and used in deployments large and small.

BTW, we have a referral bonus scheme at Sun, so, please, if you do apply for any of these positions, list me (Pat Patterson, ) as the referrer – I’ll buy you lunch once you start 🙂

UPDATE – I added another position and updated the publication time… We may have more reqs in the pipeline, so watch this space…

  • Entry Level Engineer (0-2 yrs experience) – we’re looking for junior folks with some experience in Java, C++, J2EE, XML, servlets, and web technology development. Any middleware experience would be a bonus.
  • Senior Quality Engineer (6+ yrs experience) – a rare opportunity to get into one of the best QA teams in the business – OpenSSO QA team manager Indira Thangasamy talks about what’s involved.
  • Interaction Designer / Information Architect (0-2 yrs experience) – anyone seeing the evolution of Access Manager into OpenSSO over the past few years will have seen our emphasis on ease of use and UI design. We’re not done yet, though! We need another UI designer to work on projects across the identity management product line.
  • Senior Java-based User Interface Developer (3+ yrs experience) – JSF, RIA, Ajax – buzzword heaven in this UI developer post. The job spec currently says ‘Identity Server project management’, but it looks like that’s a typo for ‘Identity Manager‘ – OpenSSO’s provisioning cousin. Unlike the other jobs, which are all Bay Area-based, this one is ‘Any US Sun Location’ – a great opportunity if you have wicked Java Web UI skills but are based in Colorado, or Massachusetts, or Texas, or…

If those links are no longer by the time you’re reading this, then you can use these search links for OpenSSO jobs at Sun and identity-related jobs at Sun.

A Grand OpenSSO Community Day Out in New York

Many thanks to all who attended (I counted at least 50) and spoke at our very first OpenSSO Community Day this past Tuesday in New York City, and to NYU for making available such an excellent facility.

We had a range of speakers: some from the OpenSSO product team, some from other parts of Sun, and even one SI partner – Mike Schwartz from ID-Vault. As promised, we assembled the agenda at the start of the day, and managed to fit in nine 40 minute sessions covering pretty much every aspect of OpenSSO. Almost all the slides are online at the event wiki page (slides, please, Brad!).

If you attended the community day, please complete the Meetup survey – we’d love to have your rating and comments.

The next stop for the OpenSSO Community Day roadshow will be Munich, on May 5. Remember, if you’re also planning to attend the European Identity Conference (hosts for our event), you can get 20% off your registration fee by quoting the discount code OPENSSO.

Watch this space for news of OpenSSO Community Day 3.0 – to be held in San Francisco, around the time of CommunityOne West/JavaOne.

OpenSSO Tab Sweep – Mar 13 2009

Lots of news over the last couple of weeks from the world of OpenSSO. Events in New York, new Fedlet innovations and more; read on…

That wraps things up for this week. Don’t forget, if you’re planning to attend the European Identity Conference 2009 in May, the second OpenSSO Community Day will be there on the Tuesday, May 5 2009. Register at Meetup and you can pick up a discount code for 20% off the cost of your EIC registration. Bargain!

Swekey Authentication Module for OpenSSO

I just finished another OpenSSO Extension – this time, an authentication module for the Swekey authentication key (README, source). The authentication module prompts the user for their username and uses the Swekey to generate a one-time password, which is validated against the Swekey authentication server.

It’s interesting to contrast the Swekey with the Yubikey, which I covered here a few months ago. Where the Yubikey emulates a USB keyboard, requiring no special client software, the Swekey requires a driver. On the other hand, where the Swekey is invoked automatically by a browser plugin, requiring no user intervention apart from inserting the device into a USB port, the Yubikey requires the user to press its button and, potentially, ensure that the cursor is in the correct input field. One thing they do now have in common, though: they both work with OpenSSO 🙂

So, if you have a Swekey, grab the authentication module, deploy it (see the README) and let me know how you get on.