Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source Identity Management Patterns and Practices Using OpenAM 10.x

Buy

An intuitive guide to learning OpenAM access management capabilities for web and application servers

Overview

  • Learn patterns, practices, and the terminology of Identity Management
  • Learn how to install OpenAM 10.x
  • Protect web and application servers using policy agents
  • Protect applications using the Security Assertion Markup Language (SAML)
  • Integrated OAuth 2 logins like Facebook with OpenAM protected applications

In Detail

OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. It also provides the foundation for integrating diverse web applications that might typically operate against a disparate set of identity repositories and that are hosted on a variety of platforms such as web application servers.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x is a condensed, practical guide on installing OpenAM to protect your web applications. This book will teach you how to integrate to different identity sources such as Active Directory or Facebook using two-factor authentications.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x looks at Identity Management and how to implement it using OpenAM 10.x. It specifically focuses on providing authentication to your web application using either a local identity source or a cloud-based identity source, so you don’t have to worry about authentication in your application.

You will learn how to install OpenAM, and then how to install policy agents against your web and application servers to do authentication. In addition, we’ll focus on integrating to applications directly using SAML, either through the use of a small preconfigured application, or through a third-party SAML library. Finally, we’ll focus on integrating to cloud identity providers using OAuth 2.0 and utilizing two-factor authentication.

If you want a scalable robust identity management infrastructure, Open Source Identity Management Principles and Patterns Using OpenAM 10.x will get you up and running in the least amount of time possible.

What you will learn from this book

  • Understand Identity Management principles
  • Install OpenAM 10.x
  • Install policy agents against Apache Web Server and Tomcat Servlet Container
  • Implement cross-domain authentication
  • Implement distributed authentication using DMZs
  • Deploy Java application authentication quickly using Fedlets
  • Understand the federation of applications to OpenAM using SAML
  • Integrate to cloud-based identity providers using OAuth 2.0
  • Configure two-factor authentication
  • Implement entitlements with REST and XACML

Approach

This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.

Who this book is written for

Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what’s possible and how to quickly implement a prototype. It’s assumed that you’ve had experience with web applications and some knowledge of Apache and Tomcat.

(HTML tags aren't allowed.)

Linux Shell Scripting Essentials
Linux Shell Scripting Essentials

Learn shell scripting to solve complex shell-related problems and to efficiently automate your day-to-day tasks

About This Book

  • Familiarize yourself with the terminal by learning about powerful shell features
  • Automate tasks by writing shell scripts for repetitive work
  • ...
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
The Practice of Network Security Monitoring: Understanding Incident Detection and Response

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

In
...

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...


Arquillian Testing Guide
Arquillian Testing Guide

Get familiarized with the Arquillian framework and its capabilities to carry out integration and functional testing on a Java virtual machine

Overview

  • Build effective unit tests and integration using Arquillian and JUnit
  • Leverage Arquillian to test all aspects of your application –...
Python Unlocked
Python Unlocked

Key Features

  • Write smarter, bug-free, high performance code with minimal effort
  • Uncover the best tools and options available to Python developers today
  • Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively

Book...

Doing Math with Python: Use Programming to Explore Algebra, Statistics, Calculus, and More!
Doing Math with Python: Use Programming to Explore Algebra, Statistics, Calculus, and More!

Doing Math with Python shows you how to use Python to delve into high school–level math topics like statistics, geometry, probability, and calculus. You’ll start with simple projects, like a factoring program and a quadratic-equation solver, and then create more complex projects once you’ve gotten the hang of...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy