Single sign-on (SSO)

High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Auteur:
Kevin Roebuck
ISBN:
9781743046647
ISBN10:
1743046642
Taal:
Engels
Bindwijze:
Digitaal Boek ()
Publicatiedatum:
03-06-2011
Geillustreerd:
Nee
Pagina's:
366 pagina's

Waar te koop:


Amazon
As an Amazon Associate I earn from qualifying purchases.

Extra informatie

Reviews

Er zijn nog geen reviews voor 'Single sign-on (SSO)'.

Wil je een review schrijven voor dit boek?

:
:
(Nooit getoond op site):

:
:

Verslagen

Er zijn nog geen verslagen voor 'Single sign-on (SSO)'.


Wil je een verslag toevoegen aan dit boek

:
:
(Nooit getoond op site):

:
:

Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Single sign-off is the reverse property whereby a single action of signing out terminates access to multiple software systems.


As different applications and resources support different authentication mechanisms, single sign-on has to internally translate to and store different credentials compared to what is used for initial authentication.


This book is your ultimate resource for Single sign-on (SSO). Here you will find the most up-to-date information, analysis, background and everything you need to know.


In easy to read chapters, with extensive references and links to get you to know all there is to know about Single sign-on (SSO) right away, covering: Single sign-on, Password, 1dl, 2D Key, ATM SafetyPIN software, Canonical account, Challenge-Handshake Authentication Protocol, Challenge-response authentication, Cognitive password, Default password, Diceware, Draw a Secret, Duress code, LM hash, Munged password, One-time password, OpenID, OTPW, Partial Password, Passmap, PassPattern system, Passphrase, Password authentication protocol, Password cracking, Password fatigue, Password length parameter, Password management, Password manager, Password notification e-mail, Password policy, Password strength, Password synchronization, Password-authenticated key agreement, PBKDF2, Personal identification number, Pre-shared key, Privileged password management, Random password generator, Risk-based authentication, S/KEY, Secure Password Authentication, Secure Remote Password protocol, SecurID, Self-service password reset, Shadow password, Swordfish (password), Windows credentials, Zero-knowledge password proof, Federated identity, Federated identity management, Apple ID, Athens (access and identity management service), CoSign single sign on, Credential Service Provider, Crowd (software), Digital identity, E-Authentication, Enterprise Sign On Engine, EZproxy, Facebook Platform, Google Account, Higgins project, Identity Governance Framework, Identity metasystem, Information Card, Information Card Foundation, Janrain, JOSSO, Light-Weight Identity, Novell Access Manager, OneLogin, OpenAM, OpenSSO, Point of Access for Providers of Information, Pubcookie, Shibboleth (Internet2), Sun Java System Access Manager, Ubuntu Single Sign On, Windows CardSpace, Windows Live ID, Yadis, Access control list, Access Control Matrix, Atomic authorization, Authentication, Authorization, Bell-LaPadula model, Closed-loop authentication, Comparison of privilege authorization features, Computational trust, Context-based access control, Copy protection, Cryptographic log on, DACL, Database audit, DataLock Technology, Delegated administration, Delegation of Control, Digipass, Directory service, Discretionary access control, Distributed Access Control System, EAuthentication, Form-based authentication, Global Trust Council, HERAS-AF, HTTP cookie, HTTP+HTML form-based authentication, IBM Lightweight Third-Party Authentication, IBM Tivoli Access Manager, Identity Assertion Provider, Identity driven networking, Initiative For Open Authentication, Integrated Windows Authentication, Internet Authentication Service, Java Authentication and Authorization Service, Location-based authentication, Logical access control, Login, LOMAC, Mandatory access control, MicroID, Microsoft Fingerprint Reader, Mobilegov, Multi-factor authentication, Mutual authentication, NemID, NIST RBAC model, OAuth, Object-capability model...and much more.


This book explains in-depth the real drivers and workings of Single sign-on (SSO). It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Single sign-on (SSO) with the objectivity of experienced professional


Gerelateerde boeken

Single Sign-On (Sso)
High-Impact Strategies - What You Need to Know
9781743044957 | 174304495X | Kevin Roebuck

Single Sign-On Sso Complete Self-Assessment Guide
9780655315353 | 0655315357 | Gerardus Blokdyk

CISA-Testing Concept-Single Sign On (SSO) (Domain-5)
9781370888764 | 1370888767 | Hemang Doshi
Bekijk!
Minimaal 1 aanbieding

Icewall Sso
Think Like an Engineer
9781979462624 | 1979462623 | Gerard Blokdyk
Bekijk!
Minimaal 1 aanbieding

Jboss Sso
Getting Started
9781979460873 | 1979460876 | Gerard Blokdyk
Bekijk!
Minimaal 1 aanbieding

JBoss SSO
9785512108406 | 5512108409

Single Sign-on mit SAP
Lösungen für die Praxis
9783836216272 | 3836216272 | Martijn De Boer

Algemene informatie

Titel:
Single sign-on (SSO)
ISBN:
9781743046647
ISBN-10:
1743046642
Auteur:
Kevin Roebuck

We gebruiken partnerprogramma's van Bol.com en anderen om te verdienen aan bestellingen.