Securing the Perimeter Deploying Identity and Access Management with Free Open Source Software /
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack. The most co...
Uloženo v:
| Hlavní autor: | |
|---|---|
| Médium: | Elektronický zdroj E-kniha |
| Jazyk: | angličtina |
| Vydáno: |
Berkeley, CA :
Apress,
2018.
|
| Vydání: | 1st ed. 2018. |
| Témata: | |
| ISBN: | 9781484226018 |
| On-line přístup: |
|
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
Obsah:
- Chapter 1: Introduction
- Chapter 2: LDAP
- Chapter 3: SAML
- Chapter 4: Oauth
- Chapter 5: OpenID Connect
- Chapter 6: Proxy
- Chapter 7: Strong Authentication
- Chapter 8: User-Managed Access
- Chapter 9: Identity Management
- Chapter 10: Multiparty Federation.-.

