Identity and Access Management, as well as Software-as-a-Service, are still growing markets. Remarkable opportunities will arise through new developments in these areas.

Using the INCLOUDING solution will allow organizations to administer identities globally in multi-cloud environments ensuring an efficient and safe management of identities:

  • The delivery of new authentication schemes will increase the number of authentication devices in different form factors
  • The cloud gateway will benefit the adoption of cloud hosted applications
  • Organization will take back the governance of the service level management with a solution based on ontology of security concepts

INCLOUDING serves many different kinds of customers. It will push the use of inter-cloud environments for all the stakeholders of the SaaS value chain, improve their competitiveness and open new markets.

Overall, we expect INCLOUDING to create:

  • Easy administration of employees' identities
  • Higher security
  • Higher customer satisfaction
  • New job opportunities for entrepreneurs
  • High efficient company strategies/focuses and enable the current labours keep their job

The project partners anticipate that the INCLOUDING project will lead to the following major outputs:

  1. The several authentication technologies and the SE enforcement will push adoption of cloud hosted applications and the increase of the number of authentication devices in different form factors.
  2. The delivery of a cloud gateway acting as a focus point in the organization for authentication, identity management, audit, reporting, etc., will ensure a smooth evolution between today implementations of identity and access management, and tomorrow's Identity Management as a Service
  3. The software platform will provide a single front-end vision to SaaS applications to end-customers, and at the same time will still maintain the traditional on-premise management of identities and accesses increasing adoption of cloud hosted applications as organizations will equally manage on-premise identities and inter-cloud identities.
  4. The project will specify and implement more flexible negotiation protocols based on semantic matching of SLAs based on ontology of security concepts and the definition of logical framework to compare security requirements to be negotiated. Thanks to this innovation, organizations will take back the control on the governance, the risk management and the compliance of their IT processes.
  5. Applicability of concepts, algorithms and tool chains to different domains will be demonstrated in metrology and manufacturing environments.