Federated identity primer [electronic resource] / Derrick Rountree.

Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user creden...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via ScienceDirect)
Main Author: Rountree, Derrick
Format: Electronic eBook
Language:English
Published: [Place of publication not identified] : Syngress, ©2013.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b8585080
003 CoU
005 20211022041015.0
006 m o d
007 cr |||||||||||
008 121213s2013 xx a o 000 0 eng d
019 |a 823283949  |a 842426545  |a 1065983233  |a 1103274532  |a 1153026580  |a 1192346017  |a 1202545669  |a 1235832824  |a 1240518125  |a 1243579844  |a 1262672762 
020 |a 9780124072077 
020 |a 0124072070 
020 |a 1283851628 
020 |a 9781283851626 
020 |z 9780124071896 
020 |z 0124071899 
035 |a (OCoLC)scd821045458 
035 |a (OCoLC)821045458  |z (OCoLC)823283949  |z (OCoLC)842426545  |z (OCoLC)1065983233  |z (OCoLC)1103274532  |z (OCoLC)1153026580  |z (OCoLC)1192346017  |z (OCoLC)1202545669  |z (OCoLC)1235832824  |z (OCoLC)1240518125  |z (OCoLC)1243579844  |z (OCoLC)1262672762 
037 |a scd9780124071896 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d E7B  |d B24X7  |d IDEBK  |d UMI  |d COO  |d DEBSZ  |d UIU  |d OCLCO  |d YDXCP  |d S4S  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d OCLCQ  |d OCLCA  |d OCLCQ  |d U3W  |d D6H  |d CEF  |d INT  |d OCLCQ  |d WYU  |d UAB  |d AUD  |d LEAUB  |d VT2  |d RDF  |d TUHNV  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.A25  |b F43 2013 
100 1 |a Rountree, Derrick.  |0 http://id.loc.gov/authorities/names/no2010170606  |1 http://isni.org/isni/0000000103855029. 
245 1 0 |a Federated identity primer  |h [electronic resource] /  |c Derrick Rountree. 
260 |a [Place of publication not identified] :  |b Syngress,  |c ©2013. 
300 |a 1 online resource :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
505 0 |a Front Cover; Federated Identity Primer; Copyright Page; Contents; Preface; What to Expect from this Book; 1 Introduction to Identity; 1.1 Introduction; 1.2 What Is Identity?; 1.2.1 Physical Identity; 1.2.1.1 Components of Your Physical Identity; 1.2.1.2 Protecting Your Physical Identity; 1.2.1.3 Only One Physical Identity; 1.2.2 Digital Identity; 1.2.2.1 Components of Your Digital Identity; 1.2.2.2 Protecting Your Digital Identity; 1.2.2.3 Only One Digital Identity; 1.3 The Internet Identity Problem; 1.4 Summary; 2 What Is Federated Identity?; 2.1 Introduction. 
505 8 |a 2.2 Authentication and Authorization2.2.1 Authentication; 2.2.1.1 Types of Authentication; 2.2.1.1.1 Username and Password; 2.2.1.1.2 Biometrics; 2.2.1.1.3 User Certificates; 2.2.1.1.4 Kerberos; 2.2.1.1.5 One-Time-Use Token; 2.2.1.1.6 Risk-Based Authentication; 2.2.1.1.7 Custom Authentication Tokens; 2.2.1.2 Other Authentication Concepts; 2.2.1.2.1 Mutual Authentication; 2.2.1.2.2 Multifactor Authentication; 2.2.2 Authorization; 2.3 Access Control; 2.3.1 Mandatory Access Control; 2.3.2 Discretionary Access Control; 2.3.3 Role-Based Access Control; 2.4 Federated Service Model. 
505 8 |a 2.4.1 Identity Provider2.4.1.1 Credential Store; 2.4.2 Service Provider; 2.5 Federated Identity; 2.5.1 Authentication vs Authorization with Federated Identity; 2.5.2 Federated Identity Advantages and Disadvantages; 2.5.2.1 Advantages; 2.5.2.1.1 Security of User Credentials; 2.5.2.1.2 Seamless User Experience; 2.5.2.1.3 Applications only Make Authorization Decisions; 2.5.2.1.4 Reduce Account Management; 2.5.2.1.5 Reduce Number of Usernames and Passwords; 2.5.2.1.6 Ease Merger and Acquisition Activity; 2.5.2.1.7 Highly Extensible; 2.5.2.2 Disadvantages; 2.5.2.2.1 One Key to the Kingdom. 
505 8 |a 2.5.2.2.2 Requires Specialized Infrastructure2.5.2.2.3 Need to Conform to Same Standards; 2.5.2.2.4 It's Really New; 2.6 Summary; 3 Federated Identity Technologies; 3.1 Introduction; 3.2 OpenID; 3.2.1 Using OpenID; 3.3 OAuth; 3.3.1 Evolution of OAuth; 3.3.1.1 OAuth 1.0 and 1.0a; 3.3.1.2 OAuth WRAP; 3.3.1.3 OAuth 2.0; 3.4 Security Tokens; 3.4.1 Simple Web Tokens; 3.4.1.1 SWT Attributes; 3.4.2 JSON Web Tokens; 3.4.2.1 JWT Components; 3.4.2.2 JWT Claims; 3.4.2.3 JWT Creation; 3.4.3 Security Assertion Markup Language; 3.4.3.1 SAML Components; 3.4.3.1.1 SAML Assertions; 3.4.3.1.2 SAML Protocols. 
505 8 |a 3.4.3.1.3 SAML Bindings3.4.3.1.4 SAML Profiles; 3.4.3.2 The Evolution of SAML; 3.4.3.2.1 SAML v1.0; 3.4.3.2.2 SAML v1.1; 3.4.3.2.3 SAML 2.0; 3.4.3.2.3.1 SAML 2.0 Assertions; 3.5 Web Service Specifications; 3.5.1 WS-Security; 3.5.2 WS-SecurityPolicy; 3.5.3 WS-SecureConversation; 3.5.4 WS-Trust; 3.5.5 WS-Federation; 3.6 Windows Identity Foundation; 3.6.1 WIF Features; 3.6.1.1 Claims-Aware Applications; 3.6.1.2 Identity Delegation; 3.6.1.3 Custom Token Servers; 3.6.1.4 Step-Up Authentication; 3.7 Claims-Based Identity; 3.7.1 CBA Description and Overview; 3.7.1.1 Claims; 3.7.1.2 Token. 
520 |a Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree explains the concepts of digital identity Describes the technology behind and implementation of federated identity systems. Helps you decide if federated identity is good for your system or web service . Learn about Internet authentication . Learn about federated authentication. Learn about ADFS 2.0. 
588 0 |a Publisher supplied information; title not viewed. 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862. 
650 0 |a Computer networks  |x Access control.  |0 http://id.loc.gov/authorities/subjects/sh2007008424. 
650 0 |a Computers  |x Access control.  |0 http://id.loc.gov/authorities/subjects/sh85029553. 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 (OCoLC)fst00872298. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779. 
776 0 8 |i Print version:  |a Rountree, Derrick.  |t Federated identity primer.  |d Amsterdam ; Boston : Elsevier/Syngress, 2013  |z 0124071899  |w (OCoLC)819717457. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=https://www.sciencedirect.com/science/book/9780124071896  |z Full Text (via ScienceDirect) 
907 |a .b85850809  |b 02-07-22  |c 05-10-16 
998 |a web  |b 11-30-21  |c b  |d b   |e -  |f eng  |g xx   |h 0  |i 1 
907 |a .b85850809  |b 12-01-21  |c 05-10-16 
944 |a MARS - RDA ENRICHED 
907 |a .b85850809  |b 11-30-21  |c 05-10-16 
907 |a .b85850809  |b 10-28-21  |c 05-10-16 
915 |a - 
956 |a ScienceDirect ebooks 
956 |b ScienceDirect All Books 
956 |a ScienceDirect All Books 
999 f f |i ca62a85b-9ddf-583f-92f3-ee1206d8cae6  |s aeca454f-58b3-5255-92ad-82fa9d90128e 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 F43 2013  |h Library of Congress classification  |i web  |n 1