I was inspired by Mark Needham's post last week Kubernetes: Spinning up a Neo4j 3.1 Causal Cluster. I was going through this exact exercise myself and this really short circuited my learning curve. Mark left off that the next steps for him were to spin it up on both Google Container Engine (GKE) and AWS. He also wanted to add READ_REPLICA nodes into the mix. I couldn't wait so I took what Mark had started with and built on it.
HI + IM = Nulli
Nulli experts share their Human Information + Identity Management knowledge
Three guys, a tank full of gas and a custom kegerator we made for the ForgeRock Technical UnSummit. Here is a brief synopsis of our trip to California to show off the newly completed NulliBrew 450 on which we had been working.
Take the shell of a Sun E450 Group Server, replace the interior with refrigeration, 4 Raspberry Pi's, plumbing to connect beer kegs to taps and control access using the ForgeRock Identity Stack integrated with Neo Technologies Neo4j graph database. Leveraging the power of a graph database, OpenAM learns about your "connectedness" and makes access decisions for the equipment that controls the operation of the beer taps.
The Nulli Neo4j Universal Policy Condition plugin for OpenAM is available at https://github.com/nullibrew/openamneouniversalcondition.
The Neo Technology GraphConnect™ conference was held on Back to the Future© day, October 21, 2015 in San Francisco, California. Nulli, a partner of Neo Technology and of ForgeRock was invited to present at the conference and so Dave, our graph db aficionado, decided to see how information from the movie and movie characters could be modeled in a Neo4j™ graph db.
Access Management (AM) is concerned with authenticating users and determining whether they have permission to access requested resources. Core to any Access Management Platform is the design and implementation of access control policies. Nulli has provided a Youtube presentation series to discuss how graph databases can be used to help the design and implementation of complex acess control policies.
IAM architects and solution developers are being presented with a growing set of relationships that need to be highly visible to support real-time access decisions. To be successful, Access Management (IAM) systems require real-time visibility to relationships. The number of relationships between people, things, software and services need to be understood and assessed for a highly scalable IAM deployment. The Internet of Things (IoT) is driving the need for IAM to change and support the massive scale of identities needing to be assessed in relationship to the policies required to protect resources.
Nulli has been working with graph databases to determine their applicability to Identity and Access Management (IAM) with respect to policy definition, governance and accountability. This research and development has been driven by our own interest with better representing Identity and Access Management (IAM) information that can be leveraged in access policy decisions. Nulli sees the growth of Identities and supportive data attributes as requiring a flexible methodology for exposing relationships between identity attributes. The relationships between and among identity data touch points is critical to enforcing ever more complex authentication and authorization rules driven by the increasing number of identities that IAM systems are required to manage.