Cargando…

Open Source Identity Management Patterns and Practices Using OpenAM 10.x /

This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of wha...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kenning, Waylon
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2013.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn857713040
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 130906s2013 enk o 000 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d OCLCQ  |d EBLCP  |d MHW  |d E7B  |d MEAUC  |d UMI  |d DEBSZ  |d S4S  |d N$T  |d OCLCQ  |d COO  |d YDXCP  |d OCLCQ  |d FEM  |d AGLDB  |d MERUC  |d OCLCQ  |d U3W  |d OCLCF  |d VTS  |d CEF  |d UKMGB  |d OCLCQ  |d STF  |d UAB  |d M8D  |d UKAHL  |d OCLCQ  |d AJS  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d QGK 
016 7 |a 018005390  |2 Uk 
019 |a 861503461  |a 865065014  |a 968055808  |a 969083239  |a 1259246784 
020 |a 9781299832435  |q (electronic bk.) 
020 |a 1299832431  |q (electronic bk.) 
020 |a 9781782166832  |q (electronic bk.) 
020 |a 1782166831  |q (electronic bk.) 
020 |z 9781782166825 
020 |z 1782166831 
020 |z 1782166823 
029 1 |a AU@  |b 000052162071 
029 1 |a AU@  |b 000062489817 
029 1 |a CHNEW  |b 000642082 
029 1 |a CHNEW  |b 001052154 
029 1 |a CHVBK  |b 567709744 
029 1 |a DEBBG  |b BV041433210 
029 1 |a DEBBG  |b BV043777199 
029 1 |a DEBSZ  |b 397632495 
029 1 |a DEBSZ  |b 398291802 
029 1 |a DEBSZ  |b 472798413 
029 1 |a NLGGC  |b 371561469 
029 1 |a UKMGB  |b 018005390 
035 |a (OCoLC)857713040  |z (OCoLC)861503461  |z (OCoLC)865065014  |z (OCoLC)968055808  |z (OCoLC)969083239  |z (OCoLC)1259246784 
037 |a 9781782166832  |b Packt Publishing Pvt. Ltd 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 051390  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Kenning, Waylon. 
245 1 0 |a Open Source Identity Management Patterns and Practices Using OpenAM 10.x /  |c Waylon Kenning. 
260 |a Birmingham :  |b Packt Publishing,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
490 1 |a Community experience distilled 
588 0 |a Print version record. 
520 |a This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat. 
505 0 |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Identity Management Patterns and Principles; Defining Identity Management; How claims relate to identity; Understanding identity contexts; Why Identity Management is important?; Examples of identity levels; Pseudonymous identities; Trusted identities; Trusted identities with multiple contexts; Federated identities; How Identity Management works; Key components of Identity Management; Identity Service Providers; Identity policy agents; Identity providers. 
505 8 |a Identity data storesIdentity managers; Summary; Chapter 2: Installing OpenAM 10.x; Downloading OpenAM 10.x; Prerequisites for OpenAM; Creating a fully qualified domain name; Installing the Java Runtime Environment; Downloading the Tomcat application server; Configuring Tomcat for OpenAM; Installing OpenAM 10.1.0; Summary; Chapter 3: Cross-Domain Single Sign On; An introduction to Cross-Domain Single Sign On; Securing an Apache 2.4 local domain website; Creating an Apache Policy Agent profile in OpenAM; Securing Apache with the OpenAM Policy Agent; Securing a Tomcat 6 remote domain website. 
505 8 |a Configuring Tomcat and creating a Tomcat Policy Agent profileSecuring Tomcat with the OpenAM Policy Agent; Configuring a Tomcat Agent Profile for Cross Domain Single Sign On; Summary; Chapter 4: Distributed Authentication; Understanding distributed authentication; How policy agents communicate with OpenAM; Understanding defense-in-depth architectures; Preparing OpenAM for distributed authentication; Configuring the distributed authentication application server; Configuring the distributed authentication application; Testing distributed authentication; Summary. 
505 8 |a Chapter 5: Application Authentication with FedletsUnderstanding Fedlets; Advantages of Fedlets over Policy Agents; Disadvantages of Fedlets over policy agents; Configuring the Fedlet application server; Creating a SAML hosted identity provider; Creating a Fedlet; Deploying Fedlet.zip onto our Java application server; Validating Fedlet setup; More information about Fedlets; Summary; Chapter 6: Implementing SAML2 Federation Patterns; Understanding SAML; Understanding Identity Providers; Understanding Service Providers; Understanding a Circle of Trust. 
505 8 |a Configuring OpenAM as a SAML Identity ProviderInstalling SimpleSAMLphp; Configuring SimpleSAMLphp as a Service Provider; Configuring OpenAM to trust a SimpleSAMLphp SP; Testing our SAML Circle of Trust; Summary; Chapter 7: OAuth Authentication; Understanding OAuth; Preparing Facebook as an OAuth Provider; Configuring an OAuth Authentication Module; Configuring the Authentication Chaining; Testing our OAuth Client against Facebook as an OAuth Provider; Summary; Chapter 8: Two Factor Authentication; Understanding two factor authentication; Understanding OATH and how it relates to OpenAM. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Identification  |x Computer programs. 
650 0 |a Online identities. 
650 0 |a Open source software. 
650 0 |a Computer systems  |x Verification. 
650 6 |a Identification  |x Logiciels. 
650 6 |a Identité numérique. 
650 6 |a Logiciels libres. 
650 6 |a Systèmes informatiques  |x Vérification. 
650 7 |a COMPUTERS  |x Programming  |x Open Source.  |2 bisacsh 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a Computer systems  |x Verification  |2 fast 
650 7 |a Online identities  |2 fast 
650 7 |a Open source software  |2 fast 
776 0 8 |i Print version:  |a Kenning, Waylon.  |t Open Source Identity Management Patterns and Practices Using OpenAM 10.x.  |d Packt Publishing, 2013  |z 1299832431 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=637221  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26849577 
938 |a ebrary  |b EBRY  |n ebr10754171 
938 |a EBSCOhost  |b EBSC  |n 637221 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26099202 
938 |a YBP Library Services  |b YANK  |n 11119985 
994 |a 92  |b IZTAP