The Resource Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book)
Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book)
Resource Information
The item Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.
This item is available to borrow from 1 library branch.
- Language
- eng
- Extent
- 1 online resource (383 p.)
- Note
-
- Description based upon print version of record
- AppAuth Mobile Applications
- Contents
-
- Intro; Table of Contents; About the Authors; Acknowledgments; Chapter 1: Introduction; Components of an Identity Service; Identity Management; Identity and Access Management; Identity and Access Governance; Directory Services; Is IAM a Good Place to Start?; Identity Standards; Gluu Server; Why Free Open Source?; Where to Start?; Conclusion; Chapter 2: LDAP; History; Why Use LDAP Today?; Basics; Entries, DNs, and RDNs; Namespace; Schema; Filters; LDIF; LDAP Configuration; Indexing; LDAP Security; Managing Data; Command-Line Tools; ldapsearch; ldapmodify; ldapdelete; GUI Tools
- Apache Directory StudioJXplorer; Web2LDAP; phpLDAPAdmin; FusionDirectory; SDKs; Operational Considerations; Replication; Benchmark; Backup/Restore; Monitoring; Synchronization; Sets and Hashing; Manually Synchronizing Data; Gluu Server Cache Refresh; LSC-LDAP Synchronization Connector; LDAP Proxy; Conclusion; Chapter 3: SAML; Assertions, Bindings, Protocols, and Profiles; Assertions; Protocols; IDP-Initiated vs SP-Initiated Authentication; Protocol Bindings; HTTP Redirect Binding; HTTP POST Binding; Profiles; Web Browser SSO Profile; Single Logout Profile (SLO); Attribute Profile
- Basic AttributesSAML V2.0 X.500/LDAP Attributes; SAML Metadata; Open Source SAML Software; Gluu Server Shibboleth Identity Provider Overview; Shibboleth Service Provider Example; Installing the Web Server, Certificates, and SP Metadata; Configure the Shibboleth SP; Configure the Gluu Server Shibboleth IDP; simpleSAMLphp Service Provider Example; Python-SAML; Inbound SAML; Conclusion; Chapter 4: OAuth; Scopes; OAuth Roles; Authorization Server; Resource Server; Client; Tokens; Bearer Tokens; JSON Web Token (JWT); Proof-of-Possession Tokens; Token Binding; Registration; Grants
- Authorization Code GrantImplicit Grant; Resource Owner Password Credential Grant; Client Credential Grant; Token Introspection; OAuth Client Example: Calling a Google API; Obtaining Client Credentials; Calling the Google API; Client Credential Grant Example with the Gluu Server; Configuring the Gluu Server; OAuth Glossary and IANA Registry Terms; Conclusion; References; Chapter 5: OpenID Connect; OpenID Connect Overview; OpenID Connect Authorization Server Endpoints; id_token; OpenID Authentication on the Fly; OpenID Connect Discovery; Client Registration; Authentication/Authorization
- Response TypesScopes; Authorization Code Flow; Code Flow Step 1: Redirect to Authorization Endpoint; Code Flow Step 2: Get Tokens; Step 3: Call Userinfo; Implicit Flow; Hybrid Flow; Request Object; Userinfo Endpoint; Logout; Pairwise Identifiers; ACR/AMR Parameters; The Gluu Server OpenID Connect Provider; Developing OpenID Connect Client Code; Easy JavaScript Client; Apache httpd Module; Basic Web Server Installation; SSL Configuration; Configure Apache to Use SSL; Configuration of mod_auth_openid; Client Registration; Configuring the Apache VirtualHost; Install CGI script; oxAuth RP
- Isbn
- 9781484226018
- Label
- Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software
- Title
- Securing the Perimeter
- Title remainder
- Deploying Identity and Access Management with Free Open Source Software
- Language
- eng
- Cataloging source
- EBLCP
- http://library.link/vocab/creatorName
- Schwartz, Michael
- Dewey number
- 005.8
- Index
- no index present
- LC call number
- TK5105.597
- Literary form
- non fiction
- Nature of contents
- dictionaries
- http://library.link/vocab/relatedWorkOrContributorName
- Machulak, M. P.
- http://library.link/vocab/subjectName
-
- Computer networks
- Computers
- Open source software
- Label
- Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book)
- Note
-
- Description based upon print version of record
- AppAuth Mobile Applications
- Antecedent source
- file reproduced from an electronic resource
- Contents
-
- Intro; Table of Contents; About the Authors; Acknowledgments; Chapter 1: Introduction; Components of an Identity Service; Identity Management; Identity and Access Management; Identity and Access Governance; Directory Services; Is IAM a Good Place to Start?; Identity Standards; Gluu Server; Why Free Open Source?; Where to Start?; Conclusion; Chapter 2: LDAP; History; Why Use LDAP Today?; Basics; Entries, DNs, and RDNs; Namespace; Schema; Filters; LDIF; LDAP Configuration; Indexing; LDAP Security; Managing Data; Command-Line Tools; ldapsearch; ldapmodify; ldapdelete; GUI Tools
- Apache Directory StudioJXplorer; Web2LDAP; phpLDAPAdmin; FusionDirectory; SDKs; Operational Considerations; Replication; Benchmark; Backup/Restore; Monitoring; Synchronization; Sets and Hashing; Manually Synchronizing Data; Gluu Server Cache Refresh; LSC-LDAP Synchronization Connector; LDAP Proxy; Conclusion; Chapter 3: SAML; Assertions, Bindings, Protocols, and Profiles; Assertions; Protocols; IDP-Initiated vs SP-Initiated Authentication; Protocol Bindings; HTTP Redirect Binding; HTTP POST Binding; Profiles; Web Browser SSO Profile; Single Logout Profile (SLO); Attribute Profile
- Basic AttributesSAML V2.0 X.500/LDAP Attributes; SAML Metadata; Open Source SAML Software; Gluu Server Shibboleth Identity Provider Overview; Shibboleth Service Provider Example; Installing the Web Server, Certificates, and SP Metadata; Configure the Shibboleth SP; Configure the Gluu Server Shibboleth IDP; simpleSAMLphp Service Provider Example; Python-SAML; Inbound SAML; Conclusion; Chapter 4: OAuth; Scopes; OAuth Roles; Authorization Server; Resource Server; Client; Tokens; Bearer Tokens; JSON Web Token (JWT); Proof-of-Possession Tokens; Token Binding; Registration; Grants
- Authorization Code GrantImplicit Grant; Resource Owner Password Credential Grant; Client Credential Grant; Token Introspection; OAuth Client Example: Calling a Google API; Obtaining Client Credentials; Calling the Google API; Client Credential Grant Example with the Gluu Server; Configuring the Gluu Server; OAuth Glossary and IANA Registry Terms; Conclusion; References; Chapter 5: OpenID Connect; OpenID Connect Overview; OpenID Connect Authorization Server Endpoints; id_token; OpenID Authentication on the Fly; OpenID Connect Discovery; Client Registration; Authentication/Authorization
- Response TypesScopes; Authorization Code Flow; Code Flow Step 1: Redirect to Authorization Endpoint; Code Flow Step 2: Get Tokens; Step 3: Call Userinfo; Implicit Flow; Hybrid Flow; Request Object; Userinfo Endpoint; Logout; Pairwise Identifiers; ACR/AMR Parameters; The Gluu Server OpenID Connect Provider; Developing OpenID Connect Client Code; Easy JavaScript Client; Apache httpd Module; Basic Web Server Installation; SSL Configuration; Configure Apache to Use SSL; Configuration of mod_auth_openid; Client Registration; Configuring the Apache VirtualHost; Install CGI script; oxAuth RP
- Dimensions
- unknown
- Extent
- 1 online resource (383 p.)
- File format
- one file format
- Form of item
- online
- Isbn
- 9781484226018
- Level of compression
- unknown
- Quality assurance targets
- unknown
- Reformatting quality
- unknown
- Specific material designation
- remote
- System control number
-
- on1080078199
- (OCoLC)1080078199
- Label
- Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book)
- Note
-
- Description based upon print version of record
- AppAuth Mobile Applications
- Antecedent source
- file reproduced from an electronic resource
- Contents
-
- Intro; Table of Contents; About the Authors; Acknowledgments; Chapter 1: Introduction; Components of an Identity Service; Identity Management; Identity and Access Management; Identity and Access Governance; Directory Services; Is IAM a Good Place to Start?; Identity Standards; Gluu Server; Why Free Open Source?; Where to Start?; Conclusion; Chapter 2: LDAP; History; Why Use LDAP Today?; Basics; Entries, DNs, and RDNs; Namespace; Schema; Filters; LDIF; LDAP Configuration; Indexing; LDAP Security; Managing Data; Command-Line Tools; ldapsearch; ldapmodify; ldapdelete; GUI Tools
- Apache Directory StudioJXplorer; Web2LDAP; phpLDAPAdmin; FusionDirectory; SDKs; Operational Considerations; Replication; Benchmark; Backup/Restore; Monitoring; Synchronization; Sets and Hashing; Manually Synchronizing Data; Gluu Server Cache Refresh; LSC-LDAP Synchronization Connector; LDAP Proxy; Conclusion; Chapter 3: SAML; Assertions, Bindings, Protocols, and Profiles; Assertions; Protocols; IDP-Initiated vs SP-Initiated Authentication; Protocol Bindings; HTTP Redirect Binding; HTTP POST Binding; Profiles; Web Browser SSO Profile; Single Logout Profile (SLO); Attribute Profile
- Basic AttributesSAML V2.0 X.500/LDAP Attributes; SAML Metadata; Open Source SAML Software; Gluu Server Shibboleth Identity Provider Overview; Shibboleth Service Provider Example; Installing the Web Server, Certificates, and SP Metadata; Configure the Shibboleth SP; Configure the Gluu Server Shibboleth IDP; simpleSAMLphp Service Provider Example; Python-SAML; Inbound SAML; Conclusion; Chapter 4: OAuth; Scopes; OAuth Roles; Authorization Server; Resource Server; Client; Tokens; Bearer Tokens; JSON Web Token (JWT); Proof-of-Possession Tokens; Token Binding; Registration; Grants
- Authorization Code GrantImplicit Grant; Resource Owner Password Credential Grant; Client Credential Grant; Token Introspection; OAuth Client Example: Calling a Google API; Obtaining Client Credentials; Calling the Google API; Client Credential Grant Example with the Gluu Server; Configuring the Gluu Server; OAuth Glossary and IANA Registry Terms; Conclusion; References; Chapter 5: OpenID Connect; OpenID Connect Overview; OpenID Connect Authorization Server Endpoints; id_token; OpenID Authentication on the Fly; OpenID Connect Discovery; Client Registration; Authentication/Authorization
- Response TypesScopes; Authorization Code Flow; Code Flow Step 1: Redirect to Authorization Endpoint; Code Flow Step 2: Get Tokens; Step 3: Call Userinfo; Implicit Flow; Hybrid Flow; Request Object; Userinfo Endpoint; Logout; Pairwise Identifiers; ACR/AMR Parameters; The Gluu Server OpenID Connect Provider; Developing OpenID Connect Client Code; Easy JavaScript Client; Apache httpd Module; Basic Web Server Installation; SSL Configuration; Configure Apache to Use SSL; Configuration of mod_auth_openid; Client Registration; Configuring the Apache VirtualHost; Install CGI script; oxAuth RP
- Dimensions
- unknown
- Extent
- 1 online resource (383 p.)
- File format
- one file format
- Form of item
- online
- Isbn
- 9781484226018
- Level of compression
- unknown
- Quality assurance targets
- unknown
- Reformatting quality
- unknown
- Specific material designation
- remote
- System control number
-
- on1080078199
- (OCoLC)1080078199
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Securing-the-Perimeter--Deploying-Identity-and/1E2_Fa1u1Bc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Securing-the-Perimeter--Deploying-Identity-and/1E2_Fa1u1Bc/">Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Securing-the-Perimeter--Deploying-Identity-and/1E2_Fa1u1Bc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Securing-the-Perimeter--Deploying-Identity-and/1E2_Fa1u1Bc/">Securing the Perimeter : Deploying Identity and Access Management with Free Open Source Software, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>