Back-To-The-Future: Contextual Identity and Access Management
The Neo Technology GraphConnect™ conference was held on Back to the Future© day, October 21, 2015 in San Francisco, California. Nulli, a partner of Neo Technology and of ForgeRock was invited to present at the conference and so Dave, our graph db aficionado, decided to see how information from the movie and movie characters could be modeled in a Neo4j™ graph db.
a robust authorization solution based on a user’s contextual identity based on identity relationships being modeled in the graph
Dave demonstrated that Neo4j™ graph db combined with ForgeRock™ OpenAM, delivers a robust authorization solution based on a user’s contextual identity based on identity relationships being modeled in the graph.
Access to the time travel service was restricted using a Nulli developed ForgeRock™ OpenAM Environment Condition Policy. Doc could have applied this mode of access management in 2015 when he had the hover conversion done to the DeLorean and he would have saved everyone a lot of grief. Dave demonstrated that access to the “Flux Capacitor” and thus time travel could be determined based on identity and context of the identity of the individual requesting access as based on information about them in the graph db. People with known gang affiliations were prevented form accessing the time travel service where as Doc and Marty were allowed access.
The demonstration showed that off the shelf, open-source ForgeRock access control products combined with Neo4j graph databases can service an organizations requirement for a proven access management solution protecting their applications, devices or processes. Organizations can confidently rely on graph based data to be applied when making complex access policy decisions that ensure dynamically determined information or data is return only to an authorized user, application or device.
Contact Nulli to hear more about contextual identity and how it can be used for access management (AM) for your organization using a Neo4j graphdb. Nulli can show you that the future is already here and that you can use our techniques very successfully to better model your identity information.
Dave shows the Cypher query used to determine Back To The Future gang affiliation and thus determine who can access the time machine. Too bad, so sad Biff, not you…..
Photo courtesy of Neo Technology Ltd. all rights reserved by same.