Skip to content

Identity Management on a Shoestring by Ganesh Prasad, Umesh Rajbhandari PDF

By Ganesh Prasad, Umesh Rajbhandari

ISBN-10: 1105558630

ISBN-13: 9781105558634

This booklet is aimed toward safeguard and IT practitioners (especially architects) in end-user companies who're answerable for enforcing an enterprise-wide identification and entry administration (IAM) approach. it really is neither a conceptual therapy of id (for which we'd refer the reader to Kim Cameron's very good paintings at the legislation of id) nor a close technical guide on a specific product. It describes a practical and in your price range architectural method of imposing IAM inside of an agency, in keeping with the adventure of the authors.

Show description

Read Online or Download Identity Management on a Shoestring PDF

Best computers & technology books

QEMU by Robert Warnke, Thomas Ritzau PDF

Dieses Fachbuch beschreibt die software program QEMU. Das kostenlose, quelloffene QEMU emuliert die komplette eines desktops mit CPU. Damit ist es möglich, software program verschiedener Prozessorarchitekturen auszuführen. QEMU ist nicht, wie zum Beispiel VMware, auf die x86-Architektur beschränkt. Zum QEMU-Paket gehört auch das leistungsfähige instrument qemu-img zum Anlegen, Konvertieren und Verschlüsseln von Image-Dateien (virtuellen Festplatten) in unterschiedlichen Formaten, auch anderer Virtualisierungssoftware.

Carol Dolman, Marcus Saunders's Managing Your First Computer: How to Perform Core Tasks and PDF

Moment revised version of an illustrated e-book which incorporates recommendation aimed toward these possessing a working laptop or computer for the 1st time.

Download e-book for kindle: The post-human condition by Robert Pepperell

This paintings demanding situations a few of the humanist assumptions of Western philosophy, technology and paintings. It proposes a view of the human development at the findings of quantum conception, chaos conception, disaster concept, cybernetics, cyberpunk and "New Ageism", considering present clinical and technological advancements.

Additional resources for Identity Management on a Shoestring

Sample text

This is SSO! What about authorisation? Well, there are a few options on how this can be done. The diagram above shows how coarse-grained authorisation works in the general case. The SSO server generates an Application Access Token for this application anyway, stores it in the Token Database and then redirects the browser back to the application along with the token's “handle”, usually 41 as a URL parameter. As before, when the application's interceptor receives the token handle, it checks back with the SSO server to see if this is genuine and still valid.

With CAS, since the URL contains the SP's URL, the IdP knows which application is being accessed. 4. The IdP challenges the RA to provide authentication credentials. In the case of CAS, this is usually just a login page that employs HTTP Formbased Authentication. 5. The RA submits its credentials to the IdP. With CAS, a user fills in the login page with a user ID and password and submits the form. The form submission is over HTTPS for security. At this point, the IdP validates the user's credentials against a repository 20 (usually an LDAP directory).

If you don't already have preferred products in these categories, OpenLDAP, MySQL (or PostgreSQL) and ActiveMQ are perfectly adequate Open Source offerings. There are some complications here for organisations that already use Microsoft's Active Directory, but we will cover that case a bit later. Data design:  It may be counter-intuitive, but you must use both an LDAP directory and a relational database, and split user data between them. Store only authentication credentials in the directory using the simplest possible 13 tree structure and store all other attributes in the database .

Download PDF sample

Identity Management on a Shoestring by Ganesh Prasad, Umesh Rajbhandari


by Christopher
4.3

Rated 4.93 of 5 – based on 49 votes