Skip to content

Managers want this thing, often….

October 27, 2016

Or is it IT directors, or Admin?  None or all.  Anyway.

We have systems, like most people/organizations.  Those systems have credentials, like usernames and passwords.  Systems no longer are allowed to work in silos – they must, share their data.  The systems want to share their data, they want to connect to other systems.  Systems / software stays healthy and relevant when it connects to other software and shares things.  Fine, lots of standards out there trying to promote rules for sharing things, but to my simple point.

One of my customers was how do you say,  Seduced?  He was tasked by NYS government to do something, saw a presentation on how it could be solved and wallah, sold.  Flash forward a couple months and he contacts me with a question like this

“James can the link in so and so open the security cameras into a view, automatically?”

On further review we notice that his customers would use system a to get information and then system b to view security cameras.  System a makes the user authenticate.  System b also makes the user authenticate.  My customer wants the authentication in system a to also work in system b.    He figures they already logged in over here, why do they have to log in over there?  Its a valid question.  I told him out of the gate that we may not be able to accommodate the request – meaning system b may not have the capability to allow system a to bypass or feed in credentials.  The user of system a will also have to authenticate in system b.

My customer wants to bypass the front door of the house and the need to show proper id for entry.  He wants them to use the back door with a special token gained from system a.  He wants his customer to arrive in the living room, bypassing the door and id check.  No can do.  I tried, I worked with the engineers of system b and asked if we could somehow provide id on the link in system a, that would automatically allow entry into the living room.  Nope.  I get it.  Its a risk.  Software wants to make people authenticate too, especially software that contains cameras.

Moral of the story?

People want shortcuts, ease of use, but systems still require id.

 

Advertisements

From → Uncategorized

One Comment
  1. I like your analogy… and how you explained the concept of single sign on, and the problems with the concept

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: