Литмир - Электронная Библиотека
Литмир - Электронная Библиотека > Roebuck Kevin (EN) > Single sign-on (SSO): High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Single sign-on (SSO): High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Добавить похожую книгу
Talking Irish
Автор: Delsohn Steve (EN)
Похожа
Непохожа
Ivor Horton's Beginning Java 2
Автор: Horton Ivor (EN)
Похожа
Непохожа
Single sign-on (SSO): High-impact Strategies – What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors
Author:Roebuck Kevin (EN)
A introductory fragment is available
Language of a book: Английский
Publisher: Gardners Books

    Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Single sign-off is the reverse property whereby a single action of signing out terminates access to multiple software systems. As different applications and resources support different authentication mechanisms, single sign-on has to internally translate to and store different credentials compared to what is used for initial authentication. This book is your ultimate resource for Single sign-on (SSO). Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Single sign-on (SSO) right away, covering: Single sign-on, Password, 1dl, 2D Key, ATM SafetyPIN software, Canonical account, Challenge-Handshake Authentication Protocol, Challenge-response authentication, Cognitive password, Default password, Diceware, Draw a Secret, Duress code, LM hash, Munged password, One-time password, OpenID, OTPW, Partial Password, Passmap, PassPattern system, Passphrase, Password authentication protocol, Password cracking, Password fatigue, Password length parameter, Password management, Password manager, Password notification e-mail, Password policy, Password strength, Password synchronization, Password-authenticated key agreement, PBKDF2, Personal identification number, Pre-shared key, Privileged password management, Random password generator, Risk-based authentication, S/KEY, Secure Password Authentication, Secure Remote Password protocol, SecurID, Self-service password reset, Shadow password, Swordfish (password), Windows credentials, Zero-knowledge password proof, Federated identity, Federated identity management, Apple ID, Athens (access and identity management service), CoSign single sign on, Credential Service Provider, Crowd (software), Digital identity, E-Authentication, Enterprise Sign On Engine, EZproxy, Facebook Platform, Google Account, Higgins project, Identity Governance Framework, Identity metasystem, Information Card, Information Card Foundation, Janrain, JOSSO, Light-Weight Identity, Novell Access Manager, OneLogin, OpenAM, OpenSSO, Point of Access for Providers of Information, Pubcookie, Shibboleth (Internet2), Sun Java System Access Manager, Ubuntu Single Sign On, Windows CardSpace, Windows Live ID, Yadis, Access control list, Access Control Matrix, Atomic authorization, Authentication, Authorization, Bell-LaPadula model, Closed-loop authentication, Comparison of privilege authorization features, Computational trust, Context-based access control, Copy protection, Cryptographic log on, DACL, Database audit, DataLock Technology, Delegated administration, Delegation of Control, Digipass, Directory service, Discretionary access control, Distributed Access Control System, EAuthentication, Form-based authentication, Global Trust Council, HERAS-AF, HTTP cookie, HTTP+HTML form-based authentication, IBM Lightweight Third-Party Authentication, IBM Tivoli Access Manager, Identity Assertion Provider, Identity driven networking, Initiative For Open Authentication, Integrated Windows Authentication, Internet Authentication Service, Java Authentication and Authorization Service, Location-based authentication, Logical access control, Login, LOMAC, Mandatory access control, MicroID, Microsoft Fingerprint Reader, Mobilegov, Multi-factor authentication, Mutual authentication, NemID, NIST RBAC model, OAuth, Object-capability model...and much moreThis book explains in-depth the real drivers and workings of Single sign-on (SSO). It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Single sign-on (SSO) with the objectivity of experienced professionals.

    Поделиться:
    ]]>Facebook :0]]>  ]]>Twitter :0]]>  ]]>В контакте :2]]>  ]]>Livejournal :2]]>  ]]>Мой мир :2]]>  ]]>Gmail :2]]>  Email :0  ]]>Скачать :2]]>  
    Мой статус книги:
    Чтобы оставить свою оценку и комментарий вам нужно зайти на сайт или зарегистрироваться

    {"b":"459182","o":30}