“The success of the Liberty Interoperable program is demonstrated by the wide scale deployment of Liberty-enabled products and the increasing number of businesses and governments now requiring vendors to pass Liberty Alliance testing.”

— Linux Magazine, Dec. 18, 2007

“Organizations worldwide are deploying SAML 2.0-based applications to enable secure new business services, help meet regulatory requirements and provide consumers with better protection against online fraud and identity theft.”

— IT Week, Dec. 18, 2007, Roger Sullivan

“The open and interoperable federated identity model being developed by the Liberty Alliance aligns well with the federal government’s objectives. Many countries such as the UK, Australia and France are also basing their initiatives on the Liberty Alliance’s standards.”

— CIO Gov. Review, Dec. 5, 2007 , Dave Temoshok, US GSA

“The idea behind the [Identity Assurance] Framework is to simplify the process for an organization to use credentials from other organizations without incurring the considerable costs of integrating with external identity management systems on a one-by-one basis.”

— Government Computer News, Nov. 29, 2007, Joab Jackson

“Consortia like the Liberty Alliance and specs like SAML 2.0 all work to strengthen pieces of the overall framework with federated identity and authentication, privacy and security specs for online identity management.”

— Billing & OSS World, Nov. 16, 2007, Stephen Weagraff

“As I have said before…the work of the Liberty Alliance can be perceived as focusing on server-to-server protocols for enterprise-centric federation. Its work on client-enablement, however, provides compelling evidence that this is not the case.”

— IT Directions/eBizQ, Mar. 21, 2007, Neil Macehiter

“The formation of the Liberty Identity Assurance Expert Group helps to ensure the broadest possible industry support for advancing online identity assurance interoperability.”

— Ajax World, Sept. 10, 2007, Jane Hennessy

“What we really want is to get a pretty ubiquitous, interoperable privacy response layer for identities on the Internet…To ensure greater productivity, we need interoperability—it’s the easiest way to bring them together.”

— IT World Canada, July 11, 2007, Jason Rouault

“Liberty’s open and more inclusive membership structure provides new opportunities for individuals, governments and enterprise of all sizes and in every market sector to both leverage and participate in the work of the Alliance.”

— Connect IT News, May 20, 2007, Brett McDowell

“The Liberty Alliance’s Contractual Framework Outline for Circles of Trust provides businesses with a starting point for their thinking and a context within which to discuss federation issues with potential partners. As such it’s a necessary step on the road to a future in which federations are routinely and efficiently created online.”

— IT News, Mar. 7, 2007, Bob Blakely, The Burton Group

“Federated ID will be crucial in deploying this idea of having an electronic record for every patient that can be accessed from anywhere at any time by an authorized person. No other technology out there can provide that.”

— Government Health IT, Feb. 19, 2007, Dr. Christina Stephan

“Follow the Liberty Alliance’s efforts in the IGF area. Be ready to start using its common language when defining, architecting and designing your internal solution at maturity.”

— Gartner, Feb. 15, 2007, Roberta J. Witty, Analyst

“In health care, an individual could use People Service to designate the people entitled to view medical records. Users could mark a specific doctor as a friend in their social networks.”

— Government Health IT, Feb. 19, 2007, Sampo Kellomaki

“By developing the IGF standards in Liberty Alliance, Oracle is helping to ensure the broadest possible industry support for advancing the framework quickly.”

— Dark Reading, Feb. 2007, Brett McDowell, Executive Director, Liberty Alliance

“Interoperability of identity products and solutions is key to the successful and wide scale deployment of federation, Web services, SOAs and social networking applications.”

— Dark Reading, Jan. 16, 2007, Roger Sullivan


Please enter your comment!
Please enter your name here