Securing the Perimeter Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack. The most common...

Descripción completa

Detalles Bibliográficos
Autores principales: Schwartz, Michael. author (author), Machulak, Maciej. author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Berkeley, CA : Apress 2018.
Edición:1st ed. 2018.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630543206719
Tabla de Contenidos:
  • Chapter 1: Introduction
  • Chapter 2: LDAP
  • Chapter 3: SAML
  • Chapter 4: Oauth
  • Chapter 5: OpenID Connect
  • Chapter 6: Proxy
  • Chapter 7: Strong Authentication
  • Chapter 8: User-Managed Access
  • Chapter 9: Identity Management
  • Chapter 10: Multiparty Federation.-.