Foreword |
|
xi | |
Introduction |
|
1 | (8) |
|
|
9 | (12) |
|
What Are the Components of a Person's Identity? |
|
|
10 | (1) |
|
So Where Does Privacy Fit In? |
|
|
11 | (5) |
|
Where Do Roles Fit Into the Concept of an Identity? |
|
|
16 | (1) |
|
Can I Have Multiple Identities in an Identity Management Environment? |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
19 | (2) |
|
Managing Identities and Identity Stores |
|
|
21 | (16) |
|
Identities and User Accounts |
|
|
22 | (1) |
|
What Is an Identity Store? |
|
|
23 | (1) |
|
Why Multiple Stores Are a Fact of Life |
|
|
24 | (3) |
|
Strategies for Multiple-Store Environments |
|
|
27 | (3) |
|
|
30 | (2) |
|
|
32 | (1) |
|
Delegated Administration and Self-Service |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (3) |
|
|
37 | (20) |
|
Schemas and Namespace Planning |
|
|
38 | (8) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Directory and Database Design |
|
|
48 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
Selecting a Configuration |
|
|
52 | (3) |
|
|
55 | (1) |
|
|
55 | (2) |
|
Authentication and Access Control |
|
|
57 | (18) |
|
Methods of Authentication |
|
|
59 | (5) |
|
|
64 | (1) |
|
Authentication Assurance Levels |
|
|
65 | (1) |
|
Registration Assurance Levels |
|
|
66 | (1) |
|
|
67 | (5) |
|
|
72 | (1) |
|
|
73 | (2) |
|
|
75 | (14) |
|
The Mark of a Robust Process |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
78 | (3) |
|
|
81 | (1) |
|
|
81 | (2) |
|
|
83 | (1) |
|
Automating a Provisioning System |
|
|
84 | (3) |
|
Sequential and Parallel Authorization |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
Role-Based Access Control |
|
|
89 | (12) |
|
|
89 | (3) |
|
|
92 | (3) |
|
How Should RBAC Be Implemented? |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (2) |
|
Single Sign-on and Federated Authentication |
|
|
101 | (14) |
|
Single Sign-on for the Enterprise |
|
|
102 | (3) |
|
|
105 | (4) |
|
|
109 | (5) |
|
|
114 | (1) |
|
|
114 | (1) |
|
Governance, Risk, and Compliance |
|
|
115 | (14) |
|
HR Pattern-based Auditing |
|
|
117 | (1) |
|
|
118 | (2) |
|
Business Policies (IT Controls and SoD Rules) |
|
|
120 | (1) |
|
Best Practices for System Cleansing and Auditing |
|
|
121 | (2) |
|
|
123 | (3) |
|
Federated Authentication Auditing |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
Implementation and Roadmap |
|
|
129 | (18) |
|
|
130 | (5) |
|
|
135 | (1) |
|
|
135 | (1) |
|
Typical Project Structure |
|
|
136 | (2) |
|
|
138 | (2) |
|
Navigating the Political Landscape |
|
|
140 | (1) |
|
|
141 | (5) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Public Key Infrastructure |
|
|
147 | (20) |
|
|
149 | (1) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (7) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
Implementation Considerations |
|
|
161 | (4) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
Electronic Identity Smartcards |
|
|
167 | (12) |
|
|
167 | (2) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (5) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
Appendix A: Case Scenario |
|
|
179 | (16) |
|
|
179 | (1) |
|
|
179 | (1) |
|
The ``To-Be'' Requirement |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (3) |
|
|
185 | (2) |
|
|
187 | (4) |
|
|
191 | (4) |
|
|
195 | (4) |
|
|
195 | (1) |
|
|
196 | (3) |
|
|
199 | (4) |
|
Appendix D: Public Key Cryptography Standards |
|
|
203 | (2) |
|
Appendix E: X.509 Specification |
|
|
205 | (2) |
|
|
207 | |