Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Buy

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it’s more valuable to prevent than to detect a security breach. That’s why Identity and Access Management (IAM) is a critical component of an organization’s security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as “suites” because IAM is not just one component. It’s a number of components working together, including web, authentication, authorization, cryptographic, and persistence services. 

Securing the Perimeter documents a recipe to take advantage of open standards to build an enterprise-class IAM service using free open source software. This recipe can be adapted to meet the needs of both small and large organizations. While not a comprehensive guide for every application, this book provides the key concepts and patterns to help administrators and developers leverage a central security infrastructure.

Cloud IAM service providers would have you believe that managing an IAM is too hard. Anything unfamiliar is hard, but with the right road map, it can be mastered. You may find SaaS identity solutions too rigid or too expensive. Or perhaps you don’t like the idea of a third party holding the credentials of your users?the keys to your kingdom. Open source IAM provides an alternative. Take control of your IAM infrastructure if digital services are key to your organization’s success. 

What You’ll Learn

  • Understand why you should deploy a centralized authentication and policy management infrastructure
  • Use the SAML or Open ID Standards for web or single sign-on, and OAuth for API Access Management
  • Synchronize data from existing identity repositories such as Active Directory
  • Deploy two-factor authentication services

Who This Book Is For

Security architects (CISO, CSO), system engineers/administrators, and software developers

(HTML tags aren't allowed.)

Dams in Brazil: Social and Demographical Impacts (SpringerBriefs in Latin American Studies)
Dams in Brazil: Social and Demographical Impacts (SpringerBriefs in Latin American Studies)
The book focuses on the human and social effects of the construction of hydroelectric dams in Brazil. It discusses themes such as forced migrations, how the families of the victims of the dams adapt to new living areas, the struggle of families with the relocation of their homes and the fact that they are neglected by builders and government....
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

Passionate & Profitable: Why Customer Strategies Fail and 10 Steps to Do Them Right!
Passionate & Profitable: Why Customer Strategies Fail and 10 Steps to Do Them Right!
This book is about making the choice for the customer, making a choice
beyond the superficial slogans and choosing an operational, actionable strategy.
Our experience has shown that although companies focus their customer
programs on cross-selling and loyalty initiatives, the issue is much
more fundamental. They fail in their
...

Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition
Business Process Execution Language for Web Services BPEL and BPEL4WS 2nd Edition
This book is a comprehensive guide to the usage and syntax of the Business Process Execution Language for Web Services (BPEL4WS). Two major BPEL4WS servers, the Oracle BPEL Process Manager and Microsoft BizTalk Server 2004 are covered in detail, and an overview of other major BPEL4WS servers is provided. The book contains practical examples on...
Complexity Economics: Building a New Approach to Ancient Economic History (Palgrave Studies in Ancient Economies)
Complexity Economics: Building a New Approach to Ancient Economic History (Palgrave Studies in Ancient Economies)

Economic archaeology and ancient economic history have boomed the past decades. The former thanks to greatly enhanced techniques to identify, collect, and interpret material remains as proxies for economic interactions and performance; the latter by embracing the frameworks of new institutional economics. Both disciplines, however,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy