Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source Identity Management Patterns and Practices Using OpenAM 10.x

Buy

An intuitive guide to learning OpenAM access management capabilities for web and application servers

Overview

  • Learn patterns, practices, and the terminology of Identity Management
  • Learn how to install OpenAM 10.x
  • Protect web and application servers using policy agents
  • Protect applications using the Security Assertion Markup Language (SAML)
  • Integrated OAuth 2 logins like Facebook with OpenAM protected applications

In Detail

OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. It also provides the foundation for integrating diverse web applications that might typically operate against a disparate set of identity repositories and that are hosted on a variety of platforms such as web application servers.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x is a condensed, practical guide on installing OpenAM to protect your web applications. This book will teach you how to integrate to different identity sources such as Active Directory or Facebook using two-factor authentications.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x looks at Identity Management and how to implement it using OpenAM 10.x. It specifically focuses on providing authentication to your web application using either a local identity source or a cloud-based identity source, so you don’t have to worry about authentication in your application.

You will learn how to install OpenAM, and then how to install policy agents against your web and application servers to do authentication. In addition, we’ll focus on integrating to applications directly using SAML, either through the use of a small preconfigured application, or through a third-party SAML library. Finally, we’ll focus on integrating to cloud identity providers using OAuth 2.0 and utilizing two-factor authentication.

If you want a scalable robust identity management infrastructure, Open Source Identity Management Principles and Patterns Using OpenAM 10.x will get you up and running in the least amount of time possible.

What you will learn from this book

  • Understand Identity Management principles
  • Install OpenAM 10.x
  • Install policy agents against Apache Web Server and Tomcat Servlet Container
  • Implement cross-domain authentication
  • Implement distributed authentication using DMZs
  • Deploy Java application authentication quickly using Fedlets
  • Understand the federation of applications to OpenAM using SAML
  • Integrate to cloud-based identity providers using OAuth 2.0
  • Configure two-factor authentication
  • Implement entitlements with REST and XACML

Approach

This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.

Who this book is written for

Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what’s possible and how to quickly implement a prototype. It’s assumed that you’ve had experience with web applications and some knowledge of Apache and Tomcat.

(HTML tags aren't allowed.)

Windows 10 Absolute Beginner's Guide (includes Content Update Program)
Windows 10 Absolute Beginner's Guide (includes Content Update Program)

Book + Content Update Program

 

Make the most of your new Windows 10 device–without needing to be a technical expert! This book is the fastest way to take control of Windows 10, and use it to create, connect, and...

Predictive Analytics with Microsoft Azure Machine Learning: Build and Deploy Actionable Solutions in Minutes
Predictive Analytics with Microsoft Azure Machine Learning: Build and Deploy Actionable Solutions in Minutes

Data Science and Machine Learning are in high demand, as customers are increasingly looking for ways to glean insights from all their data. More customers now realize that Business Intelligence is not enough as the volume, speed and complexity of data now defy traditional analytics tools. While Business Intelligence addresses descriptive and...

Leadership from the Inside Out: Becoming a Leader for Life
Leadership from the Inside Out: Becoming a Leader for Life

Leadership from the Inside Out, Kevin Cashman’s breakthrough business bestseller that clearly connected personal growth to leadership effectiveness, is now completely revised and updated with:

• an explosion of new validating independent research

• impressive new case studies

...


Unity Virtual Reality Projects: Learn Virtual Reality by developing more than 10 engaging projects with Unity 2018, 2nd Edition
Unity Virtual Reality Projects: Learn Virtual Reality by developing more than 10 engaging projects with Unity 2018, 2nd Edition

Explore the latest features of Unity 2018 to create immersive VR projects for Oculus Rift, HTC Vive, Daydream and Gear VR

Key Features

  • A project-based guide to teach you how to develop immersive and fun VR applications using Unity 3D
  • Build experiences with interactable...
Effective Teaching with Internet Technologies: Pedagogy and Practice
Effective Teaching with Internet Technologies: Pedagogy and Practice
All schools now have internet access, but the potential of internet technology as a teaching and learning tool is still far from fully realised. This timely book helps teachers develop pedagogical skills in using the internet through a series of case studies of good practice, all of which are based on extensive classroom research. Accessible...
Data Structures and Algorithm Analysis in C++
Data Structures and Algorithm Analysis in C++

Mark Weiss uses C++ to provide a smooth introduction to object-oriented design for programmers competent in one other language. Using C++, the book delivers a series of carefully developed examples which illustrate the important concepts of object orientation alongside its main theme of data structures.

...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy