书目名称 | Securing the Perimeter | 副标题 | Deploying Identity a | 编辑 | Michael Schwartz,Maciej Machulak | 视频video | | 概述 | Allows you to save money buying a book and using free open source options vs. licensing expensive enterprise software that can cost six figures.Presents technical information in an easy-to-understand | 图书封面 |  | 描述 | .Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack..The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it’s more valuable to prevent than to detect a security breach. That’s why Identity and Access Management (IAM) is a critical component of an organization’s security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as “suites” because IAM is not just one component. It’s a number of components working together, including web, authentication, authorization, cryptographic, and persistence services. .Securing the Perimeter. documents a recipe to take advantage of open standards to build an enterprise-class IAM service using free open source software. This recipe can be adapted to meet the needs of both small and large organizat | 出版日期 | Book 2018 | 关键词 | OAuth; SAML; LDAP; OpenID; 2FA; MFA; SSO; Federation; IAM; Mobile; Security; Identity; PKI; X; 509; U2F; FIDO; Free O | 版次 | 1 | doi | https://doi.org/10.1007/978-1-4842-2601-8 | isbn_softcover | 978-1-4842-2600-1 | isbn_ebook | 978-1-4842-2601-8 | copyright | Michael Schwartz, Maciej Machulak 2018 |
The information of publication is updating
|
|