Securing the Perimeter Deploying Identity and Access Management with Free Open Source Software /

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack. The most co...

Full description

Bibliographic Details
Main Authors: Schwartz, Michael (Author, http://id.loc.gov/vocabulary/relators/aut), Machulak, Maciej (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2018.
Edition:1st ed. 2018.
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Chapter 1: Introduction
  • Chapter 2: LDAP
  • Chapter 3: SAML
  • Chapter 4: Oauth
  • Chapter 5: OpenID Connect
  • Chapter 6: Proxy
  • Chapter 7: Strong Authentication
  • Chapter 8: User-Managed Access
  • Chapter 9: Identity Management
  • Chapter 10: Multiparty Federation.-.