Revision as of 11:04, 5 October 2006 editJohn Vandenberg (talk | contribs)Extended confirmed users68,507 editsm rm copyvio← Previous edit | Revision as of 02:04, 10 October 2006 edit undoEJNorman (talk | contribs)27 editsNo edit summaryNext edit → | ||
Line 5: | Line 5: | ||
For example, a traveler could be a flight passenger as well as a hotel guest. If the airline and the hotel use a federated identity management system, this means that they have a contracted mutual trust in each other's ] of the user. The traveler could identify themselves once as a customer for booking the flight and this identity can be carried over to be used for the reservation of a hotel room. | For example, a traveler could be a flight passenger as well as a hotel guest. If the airline and the hotel use a federated identity management system, this means that they have a contracted mutual trust in each other's ] of the user. The traveler could identify themselves once as a customer for booking the flight and this identity can be carried over to be used for the reservation of a hotel room. | ||
==Comment== | |||
See discussion for elaboration about the other meaning. | |||
==See also== | ==See also== |
Revision as of 02:04, 10 October 2006
In information technology, federated identity has two general meanings:
- The virtual reunion, or assembled identity, of a person's user information (or principal), stored across multiple distinct identity management systems. Data is joined together by use of the common token, usually the user name.
- The process of a user's authentication across multiple IT systems or even organizations.
For example, a traveler could be a flight passenger as well as a hotel guest. If the airline and the hotel use a federated identity management system, this means that they have a contracted mutual trust in each other's authentication of the user. The traveler could identify themselves once as a customer for booking the flight and this identity can be carried over to be used for the reservation of a hotel room.
See also
References
This computing article is a stub. You can help Misplaced Pages by expanding it. |