Securing the Perimeter Deploying Identity and Access Management with Free Open Source Software
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack. The most common...
Autores principales: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Berkeley, CA :
Apress
2018.
|
Edición: | 1st ed. 2018. |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630543206719 |
Tabla de Contenidos:
- Chapter 1: Introduction
- Chapter 2: LDAP
- Chapter 3: SAML
- Chapter 4: Oauth
- Chapter 5: OpenID Connect
- Chapter 6: Proxy
- Chapter 7: Strong Authentication
- Chapter 8: User-Managed Access
- Chapter 9: Identity Management
- Chapter 10: Multiparty Federation.-.