Open Source Identity Management Patterns and Practices Using OpenAM 10.x. (2013)
- Record Type:
- Book
- Title:
- Open Source Identity Management Patterns and Practices Using OpenAM 10.x. (2013)
- Main Title:
- Open Source Identity Management Patterns and Practices Using OpenAM 10.x
- Further Information:
- Note: Waylon Kenning.
- Other Names:
- Kenning, Waylon
- Contents:
- Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Identity Management Patterns and Principles; Defining Identity Management; How claims relate to identity; Understanding identity contexts; Why Identity Management is important?; Examples of identity levels; Pseudonymous identities; Trusted identities; Trusted identities with multiple contexts; Federated identities; How Identity Management works; Key components of Identity Management; Identity Service Providers; Identity policy agents; Identity providers. Identity data storesIdentity managers; Summary; Chapter 2: Installing OpenAM 10.x; Downloading OpenAM 10.x; Prerequisites for OpenAM; Creating a fully qualified domain name; Installing the Java Runtime Environment; Downloading the Tomcat application server; Configuring Tomcat for OpenAM; Installing OpenAM 10.1.0; Summary; Chapter 3: Cross-Domain Single Sign On; An introduction to Cross-Domain Single Sign On; Securing an Apache 2.4 local domain website; Creating an Apache Policy Agent profile in OpenAM; Securing Apache with the OpenAM Policy Agent; Securing a Tomcat 6 remote domain website. Configuring Tomcat and creating a Tomcat Policy Agent profileSecuring Tomcat with the OpenAM Policy Agent; Configuring a Tomcat Agent Profile for Cross Domain Single Sign On; Summary; Chapter 4: Distributed Authentication; Understanding distributed authentication; How policy agents communicate with OpenAM;Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Identity Management Patterns and Principles; Defining Identity Management; How claims relate to identity; Understanding identity contexts; Why Identity Management is important?; Examples of identity levels; Pseudonymous identities; Trusted identities; Trusted identities with multiple contexts; Federated identities; How Identity Management works; Key components of Identity Management; Identity Service Providers; Identity policy agents; Identity providers. Identity data storesIdentity managers; Summary; Chapter 2: Installing OpenAM 10.x; Downloading OpenAM 10.x; Prerequisites for OpenAM; Creating a fully qualified domain name; Installing the Java Runtime Environment; Downloading the Tomcat application server; Configuring Tomcat for OpenAM; Installing OpenAM 10.1.0; Summary; Chapter 3: Cross-Domain Single Sign On; An introduction to Cross-Domain Single Sign On; Securing an Apache 2.4 local domain website; Creating an Apache Policy Agent profile in OpenAM; Securing Apache with the OpenAM Policy Agent; Securing a Tomcat 6 remote domain website. Configuring Tomcat and creating a Tomcat Policy Agent profileSecuring Tomcat with the OpenAM Policy Agent; Configuring a Tomcat Agent Profile for Cross Domain Single Sign On; Summary; Chapter 4: Distributed Authentication; Understanding distributed authentication; How policy agents communicate with OpenAM; Understanding defense-in-depth architectures; Preparing OpenAM for distributed authentication; Configuring the distributed authentication application server; Configuring the distributed authentication application; Testing distributed authentication; Summary. Chapter 5: Application Authentication with FedletsUnderstanding Fedlets; Advantages of Fedlets over Policy Agents; Disadvantages of Fedlets over policy agents; Configuring the Fedlet application server; Creating a SAML hosted identity provider; Creating a Fedlet; Deploying Fedlet.zip onto our Java application server; Validating Fedlet setup; More information about Fedlets; Summary; Chapter 6: Implementing SAML2 Federation Patterns; Understanding SAML; Understanding Identity Providers; Understanding Service Providers; Understanding a Circle of Trust. Configuring OpenAM as a SAML Identity ProviderInstalling SimpleSAMLphp; Configuring SimpleSAMLphp as a Service Provider; Configuring OpenAM to trust a SimpleSAMLphp SP; Testing our SAML Circle of Trust; Summary; Chapter 7: OAuth Authentication; Understanding OAuth; Preparing Facebook as an OAuth Provider; Configuring an OAuth Authentication Module; Configuring the Authentication Chaining; Testing our OAuth Client against Facebook as an OAuth Provider; Summary; Chapter 8: Two Factor Authentication; Understanding two factor authentication; Understanding OATH and how it relates to OpenAM. … (more)
- Publisher Details:
- Birmingham : Packt Publishing
- Publication Date:
- 2013
- Extent:
- 1 online resource
- Subjects:
- 005.8
COMPUTERS -- Utilities
Identification -- Computer programs
Online identities
Open source software
Computer systems -- Verification
Identification -- Computer programs
Online identities
Open source software
Computer systems -- Verification
COMPUTERS -- Programming -- Open Source
COMPUTERS -- Internet -- Security
COMPUTERS -- Databases -- General
Electronic books - Languages:
- English
- ISBNs:
- 9781299832435
1299832431
9781782166832
1782166831 - Related ISBNs:
- 9781782166825
1782166831
1782166823 - Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.86750
- Ingest File:
- 01_013.xml