|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn857713040 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130906s2013 enk o 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d OCLCQ
|d EBLCP
|d MHW
|d E7B
|d MEAUC
|d UMI
|d DEBSZ
|d S4S
|d N$T
|d OCLCQ
|d COO
|d YDXCP
|d OCLCQ
|d FEM
|d AGLDB
|d MERUC
|d OCLCQ
|d U3W
|d OCLCF
|d VTS
|d CEF
|d UKMGB
|d OCLCQ
|d STF
|d UAB
|d M8D
|d UKAHL
|d OCLCQ
|d AJS
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d QGK
|
016 |
7 |
|
|a 018005390
|2 Uk
|
019 |
|
|
|a 861503461
|a 865065014
|a 968055808
|a 969083239
|a 1259246784
|
020 |
|
|
|a 9781299832435
|q (electronic bk.)
|
020 |
|
|
|a 1299832431
|q (electronic bk.)
|
020 |
|
|
|a 9781782166832
|q (electronic bk.)
|
020 |
|
|
|a 1782166831
|q (electronic bk.)
|
020 |
|
|
|z 9781782166825
|
020 |
|
|
|z 1782166831
|
020 |
|
|
|z 1782166823
|
029 |
1 |
|
|a AU@
|b 000052162071
|
029 |
1 |
|
|a AU@
|b 000062489817
|
029 |
1 |
|
|a CHNEW
|b 000642082
|
029 |
1 |
|
|a CHNEW
|b 001052154
|
029 |
1 |
|
|a CHVBK
|b 567709744
|
029 |
1 |
|
|a DEBBG
|b BV041433210
|
029 |
1 |
|
|a DEBBG
|b BV043777199
|
029 |
1 |
|
|a DEBSZ
|b 397632495
|
029 |
1 |
|
|a DEBSZ
|b 398291802
|
029 |
1 |
|
|a DEBSZ
|b 472798413
|
029 |
1 |
|
|a NLGGC
|b 371561469
|
029 |
1 |
|
|a UKMGB
|b 018005390
|
035 |
|
|
|a (OCoLC)857713040
|z (OCoLC)861503461
|z (OCoLC)865065014
|z (OCoLC)968055808
|z (OCoLC)969083239
|z (OCoLC)1259246784
|
037 |
|
|
|a 9781782166832
|b Packt Publishing Pvt. Ltd
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 051390
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kenning, Waylon.
|
245 |
1 |
0 |
|a Open Source Identity Management Patterns and Practices Using OpenAM 10.x /
|c Waylon Kenning.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
490 |
1 |
|
|a Community experience distilled
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat.
|
505 |
0 |
|
|a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Identity Management Patterns and Principles; Defining Identity Management; How claims relate to identity; Understanding identity contexts; Why Identity Management is important?; Examples of identity levels; Pseudonymous identities; Trusted identities; Trusted identities with multiple contexts; Federated identities; How Identity Management works; Key components of Identity Management; Identity Service Providers; Identity policy agents; Identity providers.
|
505 |
8 |
|
|a Identity data storesIdentity managers; Summary; Chapter 2: Installing OpenAM 10.x; Downloading OpenAM 10.x; Prerequisites for OpenAM; Creating a fully qualified domain name; Installing the Java Runtime Environment; Downloading the Tomcat application server; Configuring Tomcat for OpenAM; Installing OpenAM 10.1.0; Summary; Chapter 3: Cross-Domain Single Sign On; An introduction to Cross-Domain Single Sign On; Securing an Apache 2.4 local domain website; Creating an Apache Policy Agent profile in OpenAM; Securing Apache with the OpenAM Policy Agent; Securing a Tomcat 6 remote domain website.
|
505 |
8 |
|
|a Configuring Tomcat and creating a Tomcat Policy Agent profileSecuring Tomcat with the OpenAM Policy Agent; Configuring a Tomcat Agent Profile for Cross Domain Single Sign On; Summary; Chapter 4: Distributed Authentication; Understanding distributed authentication; How policy agents communicate with OpenAM; Understanding defense-in-depth architectures; Preparing OpenAM for distributed authentication; Configuring the distributed authentication application server; Configuring the distributed authentication application; Testing distributed authentication; Summary.
|
505 |
8 |
|
|a Chapter 5: Application Authentication with FedletsUnderstanding Fedlets; Advantages of Fedlets over Policy Agents; Disadvantages of Fedlets over policy agents; Configuring the Fedlet application server; Creating a SAML hosted identity provider; Creating a Fedlet; Deploying Fedlet.zip onto our Java application server; Validating Fedlet setup; More information about Fedlets; Summary; Chapter 6: Implementing SAML2 Federation Patterns; Understanding SAML; Understanding Identity Providers; Understanding Service Providers; Understanding a Circle of Trust.
|
505 |
8 |
|
|a Configuring OpenAM as a SAML Identity ProviderInstalling SimpleSAMLphp; Configuring SimpleSAMLphp as a Service Provider; Configuring OpenAM to trust a SimpleSAMLphp SP; Testing our SAML Circle of Trust; Summary; Chapter 7: OAuth Authentication; Understanding OAuth; Preparing Facebook as an OAuth Provider; Configuring an OAuth Authentication Module; Configuring the Authentication Chaining; Testing our OAuth Client against Facebook as an OAuth Provider; Summary; Chapter 8: Two Factor Authentication; Understanding two factor authentication; Understanding OATH and how it relates to OpenAM.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Identification
|x Computer programs.
|
650 |
|
0 |
|a Online identities.
|
650 |
|
0 |
|a Open source software.
|
650 |
|
0 |
|a Computer systems
|x Verification.
|
650 |
|
6 |
|a Identification
|x Logiciels.
|
650 |
|
6 |
|a Identité numérique.
|
650 |
|
6 |
|a Logiciels libres.
|
650 |
|
6 |
|a Systèmes informatiques
|x Vérification.
|
650 |
|
7 |
|a COMPUTERS
|x Programming
|x Open Source.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer systems
|x Verification
|2 fast
|
650 |
|
7 |
|a Online identities
|2 fast
|
650 |
|
7 |
|a Open source software
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Kenning, Waylon.
|t Open Source Identity Management Patterns and Practices Using OpenAM 10.x.
|d Packt Publishing, 2013
|z 1299832431
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=637221
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26849577
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10754171
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 637221
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26099202
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11119985
|
994 |
|
|
|a 92
|b IZTAP
|