OASIS Identity in the Cloud TC


  1. What does the OASIS IDCloud Technical Committee do?

    The OASIS IDCloud TC focuses on advancing the use of identity management standards in the context of cloud computing. It is tasked to generate a set of use cases pertaining to the use of identity in the cloud. Once the use cases are generated, the TC will work on identifying the gaps in existing identity standards and feed those gaps to appropriate OASIS TCs or working groups from other standards organizations. Finally, various profiles for the use of identity in cloud computing will be developed.

  2. What is the need for the OASIS IDCloud Technical Committee?

    Currently, there are multiple working groups internationally that are looking at the various aspects of cloud computing including security; however, there is no group that is working toward identifying the gaps in security standards and generating profiles based on a set of use cases.

  3. Will the OASIS IDCloud Technical Committee generate any new standards?

    The TC will not try to reinvent the wheel. It will not generate any new standards for identity in cloud computing. Any gaps identified in the current security standards will be fed back to those working groups.

  4. Will the OASIS IDCloud TC use existing security standards?

    Yes. The TC is chartered to reuse existing security standards for its work.

  5. Will there be any liaison relationship with other standard bodies, working groups and alliances?

    Yes. The TC charter clearly mentions the strong will to have liaisons with other working groups and alliances.

  6. Who should join the OASIS IDCloud Technical Committee?

    The TC is open to new and existing OASIS members. Everyone with a stake in cloud computing is invited to join the TC. Particularly, security architects and companies that deploy cloud-based infrastructure or applications are encouraged to participate.

  7. Who will benefit from the work of the OASIS IDCloud Technical Committee?

    Enterprises that use and deploy cloud computing infrastructure either privately or publicly will benefit from the work. Additionally security architects working on cloud software will greatly benefit from standardization.