Cargando…

Federated identity primer /

Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user creden...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rountree, Derrick
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Syngress, ©2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn821045458
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 121213s2013 xx a o 000 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d E7B  |d B24X7  |d IDEBK  |d UMI  |d COO  |d DEBSZ  |d UIU  |d OCLCO  |d YDXCP  |d S4S  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d OCLCQ  |d OCLCA  |d OCLCQ  |d U3W  |d D6H  |d CEF  |d INT  |d OCLCQ  |d WYU  |d UAB  |d AUD  |d LEAUB  |d VT2  |d RDF  |d TUHNV  |d OCLCQ  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 823283949  |a 842426545  |a 1065983233  |a 1103274532  |a 1153026580  |a 1192346017  |a 1202545669  |a 1235832824  |a 1240518125  |a 1243579844  |a 1262672762  |a 1276915734 
020 |a 9780124072077 
020 |a 0124072070 
020 |a 1283851628 
020 |a 9781283851626 
020 |z 9780124071896 
020 |z 0124071899 
029 1 |a AU@  |b 000050608654 
029 1 |a AU@  |b 000051433042 
029 1 |a AU@  |b 000066217780 
029 1 |a CHNEW  |b 001010843 
029 1 |a DEBBG  |b BV041121639 
029 1 |a DEBBG  |b BV042305259 
029 1 |a DEBSZ  |b 396765610 
029 1 |a DEBSZ  |b 405346204 
029 1 |a NZ1  |b 15189152 
035 |a (OCoLC)821045458  |z (OCoLC)823283949  |z (OCoLC)842426545  |z (OCoLC)1065983233  |z (OCoLC)1103274532  |z (OCoLC)1153026580  |z (OCoLC)1192346017  |z (OCoLC)1202545669  |z (OCoLC)1235832824  |z (OCoLC)1240518125  |z (OCoLC)1243579844  |z (OCoLC)1262672762  |z (OCoLC)1276915734 
037 |a CL0500000215  |b Safari Books Online 
050 4 |a QA76.9.A25  |b F43 2013 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Rountree, Derrick. 
245 1 0 |a Federated identity primer /  |c Derrick Rountree. 
260 |a [Place of publication not identified] :  |b Syngress,  |c ©2013. 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree explains the concepts of digital identity Describes the technology behind and implementation of federated identity systems. Helps you decide if federated identity is good for your system or web service . Learn about Internet authentication . Learn about federated authentication. Learn about ADFS 2.0. 
588 0 |a Publisher supplied information; title not viewed. 
505 0 |a Front Cover; Federated Identity Primer; Copyright Page; Contents; Preface; What to Expect from this Book; 1 Introduction to Identity; 1.1 Introduction; 1.2 What Is Identity?; 1.2.1 Physical Identity; 1.2.1.1 Components of Your Physical Identity; 1.2.1.2 Protecting Your Physical Identity; 1.2.1.3 Only One Physical Identity; 1.2.2 Digital Identity; 1.2.2.1 Components of Your Digital Identity; 1.2.2.2 Protecting Your Digital Identity; 1.2.2.3 Only One Digital Identity; 1.3 The Internet Identity Problem; 1.4 Summary; 2 What Is Federated Identity?; 2.1 Introduction 
505 8 |a 2.2 Authentication and Authorization2.2.1 Authentication; 2.2.1.1 Types of Authentication; 2.2.1.1.1 Username and Password; 2.2.1.1.2 Biometrics; 2.2.1.1.3 User Certificates; 2.2.1.1.4 Kerberos; 2.2.1.1.5 One-Time-Use Token; 2.2.1.1.6 Risk-Based Authentication; 2.2.1.1.7 Custom Authentication Tokens; 2.2.1.2 Other Authentication Concepts; 2.2.1.2.1 Mutual Authentication; 2.2.1.2.2 Multifactor Authentication; 2.2.2 Authorization; 2.3 Access Control; 2.3.1 Mandatory Access Control; 2.3.2 Discretionary Access Control; 2.3.3 Role-Based Access Control; 2.4 Federated Service Model 
505 8 |a 2.4.1 Identity Provider2.4.1.1 Credential Store; 2.4.2 Service Provider; 2.5 Federated Identity; 2.5.1 Authentication vs Authorization with Federated Identity; 2.5.2 Federated Identity Advantages and Disadvantages; 2.5.2.1 Advantages; 2.5.2.1.1 Security of User Credentials; 2.5.2.1.2 Seamless User Experience; 2.5.2.1.3 Applications only Make Authorization Decisions; 2.5.2.1.4 Reduce Account Management; 2.5.2.1.5 Reduce Number of Usernames and Passwords; 2.5.2.1.6 Ease Merger and Acquisition Activity; 2.5.2.1.7 Highly Extensible; 2.5.2.2 Disadvantages; 2.5.2.2.1 One Key to the Kingdom 
505 8 |a 2.5.2.2.2 Requires Specialized Infrastructure2.5.2.2.3 Need to Conform to Same Standards; 2.5.2.2.4 It's Really New; 2.6 Summary; 3 Federated Identity Technologies; 3.1 Introduction; 3.2 OpenID; 3.2.1 Using OpenID; 3.3 OAuth; 3.3.1 Evolution of OAuth; 3.3.1.1 OAuth 1.0 and 1.0a; 3.3.1.2 OAuth WRAP; 3.3.1.3 OAuth 2.0; 3.4 Security Tokens; 3.4.1 Simple Web Tokens; 3.4.1.1 SWT Attributes; 3.4.2 JSON Web Tokens; 3.4.2.1 JWT Components; 3.4.2.2 JWT Claims; 3.4.2.3 JWT Creation; 3.4.3 Security Assertion Markup Language; 3.4.3.1 SAML Components; 3.4.3.1.1 SAML Assertions; 3.4.3.1.2 SAML Protocols 
505 8 |a 3.4.3.1.3 SAML Bindings3.4.3.1.4 SAML Profiles; 3.4.3.2 The Evolution of SAML; 3.4.3.2.1 SAML v1.0; 3.4.3.2.2 SAML v1.1; 3.4.3.2.3 SAML 2.0; 3.4.3.2.3.1 SAML 2.0 Assertions; 3.5 Web Service Specifications; 3.5.1 WS-Security; 3.5.2 WS-SecurityPolicy; 3.5.3 WS-SecureConversation; 3.5.4 WS-Trust; 3.5.5 WS-Federation; 3.6 Windows Identity Foundation; 3.6.1 WIF Features; 3.6.1.1 Claims-Aware Applications; 3.6.1.2 Identity Delegation; 3.6.1.3 Custom Token Servers; 3.6.1.4 Step-Up Authentication; 3.7 Claims-Based Identity; 3.7.1 CBA Description and Overview; 3.7.1.1 Claims; 3.7.1.2 Token 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Access control. 
650 0 |a Computers  |x Access control. 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Computer networks  |x Access control  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
776 0 8 |i Print version:  |a Rountree, Derrick.  |t Federated identity primer.  |d Amsterdam ; Boston : Elsevier/Syngress, 2013  |z 0124071899  |w (OCoLC)819717457 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124071896/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00051021 
938 |a ebrary  |b EBRY  |n ebr10631182 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis24345397 
938 |a YBP Library Services  |b YANK  |n 9936348 
994 |a 92  |b IZTAP