tag:blogger.com,1999:blog-6053747786603248705.post6535076926938749453..comments2023-12-15T09:29:32.069+01:00Comments on Blog of Guy Crets: Devoxx 2008Guy Cretshttp://www.blogger.com/profile/12357277914036649295noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-6053747786603248705.post-72964324267842025392008-12-15T20:13:00.000+01:002008-12-15T20:13:00.000+01:00Guy,Are you in contact with Ulrich Lang of Object ...Guy,<BR/><BR/>Are you in contact with Ulrich Lang of Object Security? They have a great tool that takes a business process map, and creates authentication rules based on the steps within the process and deploys them on the appropriate app servers.<BR/><BR/>This video gives a better idea of what they do.<BR/><BR/><A HREF="http://www.objectsecurity.com/en-products-video-openpmf20-intalio-nov08.html" REL="nofollow">http://www.objectsecurity.com/en-products-video-openpmf20-intalio-nov08.html</A>.<BR/><BR/>Of course my view of them may be a little biased since they use Intalio's (the company I work for) Designer for the process map. But, I think it is unique on the market and has huge benefits for easing the tangled spaghetti network of the enterprise infrastructure.Anonymousnoreply@blogger.com