skip to content
Federated Identity Primer. Preview this item
ClosePreview this item
Checking...

Federated Identity Primer.

Author: Derrick Rountree
Publisher: Burlington : Elsevier Science, 2012.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Rountree, Derrick.
Federated Identity Primer.
Burlington : Elsevier Science, ©2012
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Derrick Rountree
ISBN: 9780124072077 0124072070
OCLC Number: 823729237
Notes: 3.7.1.3 Issuer.
Description: 1 online resource (97 pages)
Contents: Front Cover; Federated Identity Primer; Copyright Page; Contents; Preface; What to Expect from this Book; 1 Introduction to Identity; 1.1 Introduction; 1.2 What Is Identity?; 1.2.1 Physical Identity; 1.2.1.1 Components of Your Physical Identity; 1.2.1.2 Protecting Your Physical Identity; 1.2.1.3 Only One Physical Identity; 1.2.2 Digital Identity; 1.2.2.1 Components of Your Digital Identity; 1.2.2.2 Protecting Your Digital Identity; 1.2.2.3 Only One Digital Identity; 1.3 The Internet Identity Problem; 1.4 Summary; 2 What Is Federated Identity?; 2.1 Introduction. 2.2 Authentication and Authorization2.2.1 Authentication; 2.2.1.1 Types of Authentication; 2.2.1.1.1 Username and Password; 2.2.1.1.2 Biometrics; 2.2.1.1.3 User Certificates; 2.2.1.1.4 Kerberos; 2.2.1.1.5 One-Time-Use Token; 2.2.1.1.6 Risk-Based Authentication; 2.2.1.1.7 Custom Authentication Tokens; 2.2.1.2 Other Authentication Concepts; 2.2.1.2.1 Mutual Authentication; 2.2.1.2.2 Multifactor Authentication; 2.2.2 Authorization; 2.3 Access Control; 2.3.1 Mandatory Access Control; 2.3.2 Discretionary Access Control; 2.3.3 Role-Based Access Control; 2.4 Federated Service Model. 2.4.1 Identity Provider2.4.1.1 Credential Store; 2.4.2 Service Provider; 2.5 Federated Identity; 2.5.1 Authentication vs Authorization with Federated Identity; 2.5.2 Federated Identity Advantages and Disadvantages; 2.5.2.1 Advantages; 2.5.2.1.1 Security of User Credentials; 2.5.2.1.2 Seamless User Experience; 2.5.2.1.3 Applications only Make Authorization Decisions; 2.5.2.1.4 Reduce Account Management; 2.5.2.1.5 Reduce Number of Usernames and Passwords; 2.5.2.1.6 Ease Merger and Acquisition Activity; 2.5.2.1.7 Highly Extensible; 2.5.2.2 Disadvantages; 2.5.2.2.1 One Key to the Kingdom. 2.5.2.2.2 Requires Specialized Infrastructure2.5.2.2.3 Need to Conform to Same Standards; 2.5.2.2.4 It's Really New; 2.6 Summary; 3 Federated Identity Technologies; 3.1 Introduction; 3.2 OpenID; 3.2.1 Using OpenID; 3.3 OAuth; 3.3.1 Evolution of OAuth; 3.3.1.1 OAuth 1.0 and 1.0a; 3.3.1.2 OAuth WRAP; 3.3.1.3 OAuth 2.0; 3.4 Security Tokens; 3.4.1 Simple Web Tokens; 3.4.1.1 SWT Attributes; 3.4.2 JSON Web Tokens; 3.4.2.1 JWT Components; 3.4.2.2 JWT Claims; 3.4.2.3 JWT Creation; 3.4.3 Security Assertion Markup Language; 3.4.3.1 SAML Components; 3.4.3.1.1 SAML Assertions; 3.4.3.1.2 SAML Protocols. 3.4.3.1.3 SAML Bindings3.4.3.1.4 SAML Profiles; 3.4.3.2 The Evolution of SAML; 3.4.3.2.1 SAML v1.0; 3.4.3.2.2 SAML v1.1; 3.4.3.2.3 SAML 2.0; 3.4.3.2.3.1 SAML 2.0 Assertions; 3.5 Web Service Specifications; 3.5.1 WS-Security; 3.5.2 WS-SecurityPolicy; 3.5.3 WS-SecureConversation; 3.5.4 WS-Trust; 3.5.5 WS-Federation; 3.6 Windows Identity Foundation; 3.6.1 WIF Features; 3.6.1.1 Claims-Aware Applications; 3.6.1.2 Identity Delegation; 3.6.1.3 Custom Token Servers; 3.6.1.4 Step-Up Authentication; 3.7 Claims-Based Identity; 3.7.1 CBA Description and Overview; 3.7.1.1 Claims; 3.7.1.2 Token.

Abstract:

Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree Explains the concepts of digital identity Describes the technology behind and implementation of federated identity sy.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/823729237> # Federated Identity Primer.
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
   library:oclcnum "823729237" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/vtu> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1184230284#Place/burlington> ; # Burlington
   schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
   schema:about <http://id.loc.gov/authorities/subjects/sh2007008424> ; # Computer networks--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/1184230284#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
   schema:about <http://id.loc.gov/authorities/subjects/sh85029553> ; # Computers--Access control
   schema:about <http://id.worldcat.org/fast/872298> ; # Computer networks--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/1184230284#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/1184230284#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:about <http://dewey.info/class/005.8/> ;
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:bookFormat schema:EBook ;
   schema:creator <http://viaf.org/viaf/155203189> ; # Derrick Rountree
   schema:datePublished "2012" ;
   schema:description "Front Cover; Federated Identity Primer; Copyright Page; Contents; Preface; What to Expect from this Book; 1 Introduction to Identity; 1.1 Introduction; 1.2 What Is Identity?; 1.2.1 Physical Identity; 1.2.1.1 Components of Your Physical Identity; 1.2.1.2 Protecting Your Physical Identity; 1.2.1.3 Only One Physical Identity; 1.2.2 Digital Identity; 1.2.2.1 Components of Your Digital Identity; 1.2.2.2 Protecting Your Digital Identity; 1.2.2.3 Only One Digital Identity; 1.3 The Internet Identity Problem; 1.4 Summary; 2 What Is Federated Identity?; 2.1 Introduction."@en ;
   schema:description "Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree Explains the concepts of digital identity Describes the technology behind and implementation of federated identity sy."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1184230284> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/1184230284#CreativeWork/federated_identity_primer> ;
   schema:name "Federated Identity Primer."@en ;
   schema:productID "823729237" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/823729237#PublicationEvent/burlington_elsevier_science_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1184230284#Agent/elsevier_science> ; # Elsevier Science
   schema:url <http://www.totalboox.com/book/id-825525687769692160> ;
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=485319> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1081145> ;
   schema:url <http://www.123library.org/book_details/?id=58559> ;
   schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=1081145> ;
   schema:url <http://cdn.totalboox.com/static/covers/ELS/b74db3d3c78f800-b.jpg> ;
   schema:workExample <http://worldcat.org/isbn/9780124072077> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/823729237> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1184230284#Agent/elsevier_science> # Elsevier Science
    a bgn:Agent ;
   schema:name "Elsevier Science" ;
    .

<http://experiment.worldcat.org/entity/work/data/1184230284#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1184230284#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1184230284#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2007008424> # Computer networks--Access control
    a schema:Intangible ;
   schema:name "Computer networks--Access control"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029553> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/872298> # Computer networks--Access control
    a schema:Intangible ;
   schema:name "Computer networks--Access control"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://viaf.org/viaf/155203189> # Derrick Rountree
    a schema:Person ;
   schema:familyName "Rountree" ;
   schema:givenName "Derrick" ;
   schema:name "Derrick Rountree" ;
    .

<http://worldcat.org/isbn/9780124072077>
    a schema:ProductModel ;
   schema:isbn "0124072070" ;
   schema:isbn "9780124072077" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.