Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source Identity Management Patterns and Practices Using OpenAM 10.x

Buy

An intuitive guide to learning OpenAM access management capabilities for web and application servers

Overview

  • Learn patterns, practices, and the terminology of Identity Management
  • Learn how to install OpenAM 10.x
  • Protect web and application servers using policy agents
  • Protect applications using the Security Assertion Markup Language (SAML)
  • Integrated OAuth 2 logins like Facebook with OpenAM protected applications

In Detail

OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. It also provides the foundation for integrating diverse web applications that might typically operate against a disparate set of identity repositories and that are hosted on a variety of platforms such as web application servers.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x is a condensed, practical guide on installing OpenAM to protect your web applications. This book will teach you how to integrate to different identity sources such as Active Directory or Facebook using two-factor authentications.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x looks at Identity Management and how to implement it using OpenAM 10.x. It specifically focuses on providing authentication to your web application using either a local identity source or a cloud-based identity source, so you don’t have to worry about authentication in your application.

You will learn how to install OpenAM, and then how to install policy agents against your web and application servers to do authentication. In addition, we’ll focus on integrating to applications directly using SAML, either through the use of a small preconfigured application, or through a third-party SAML library. Finally, we’ll focus on integrating to cloud identity providers using OAuth 2.0 and utilizing two-factor authentication.

If you want a scalable robust identity management infrastructure, Open Source Identity Management Principles and Patterns Using OpenAM 10.x will get you up and running in the least amount of time possible.

What you will learn from this book

  • Understand Identity Management principles
  • Install OpenAM 10.x
  • Install policy agents against Apache Web Server and Tomcat Servlet Container
  • Implement cross-domain authentication
  • Implement distributed authentication using DMZs
  • Deploy Java application authentication quickly using Fedlets
  • Understand the federation of applications to OpenAM using SAML
  • Integrate to cloud-based identity providers using OAuth 2.0
  • Configure two-factor authentication
  • Implement entitlements with REST and XACML

Approach

This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.

Who this book is written for

Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what’s possible and how to quickly implement a prototype. It’s assumed that you’ve had experience with web applications and some knowledge of Apache and Tomcat.

(HTML tags aren't allowed.)

Graphs and Networks: Multilevel Modeling
Graphs and Networks: Multilevel Modeling

Completely updated and containing two new chapters, this title covers spatial analysis and urban management using graph theory simulation.  Highly practical, the simulation approach allows readers to solve classic problems such as placement of high-speed roads, the capacity of a network, pollution emission control, and more.

...
Flexibility and Robustness in Scheduling
Flexibility and Robustness in Scheduling

Scheduling is a broad research area and scheduling problems arise from several application domains (production systems, logistic, computer science, etc.). Solving scheduling problems requires tools of combinatorial optimization, exact or approximated algorithms. Flexibility is at the frontier between predictive deterministic approaches and...

Model Driven Engineering for Distributed Real-Time Embedded Systems 2009: Advances, Standards, Applications and Perspectives
Model Driven Engineering for Distributed Real-Time Embedded Systems 2009: Advances, Standards, Applications and Perspectives

Model-based development methods, and supporting technologies, can provide the techniques and tools needed to address the dilemma between reducing system development costs and time, and developing increasingly complex systems. This book provides the information needed to understand and apply model-drive engineering (MDE) and model-drive...


Spring in Practice: Covers Spring 3
Spring in Practice: Covers Spring 3

Summary

Spring in Practice shows you how to tackle the challenges you face when you build Spring-based applications. The book empowers software developers to solve concrete business problems by mapping application-level issues to Spring-centric solutions. It diverges from other cookbooks because it presents...

PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)
PMP® Exam Practice Test and Study Guide, Ninth Edition (ESI International Project Management Series)

PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiple-choice practice questions in each of the ten knowledge areas and in the...

Kivy Blueprints
Kivy Blueprints

Build your very own app-store-ready, multi-touch games and applications with Kivy!

About This Book

  • Learn how to create simple to complex functional apps quickly and easily with the Kivy framework
  • Bend Kivy according to your needs by customizing, overriding, and bypassing the built-in...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy