Muutke küpsiste eelistusi

Identity Management: A Primer [Pehme köide]

  • Formaat: Paperback / softback, 200 pages, kõrgus x laius x paksus: 229x178x13 mm, kaal: 363 g
  • Ilmumisaeg: 15-Sep-2009
  • Kirjastus: MC Press, LLC
  • ISBN-10: 158347093X
  • ISBN-13: 9781583470930
Teised raamatud teemal:
  • Formaat: Paperback / softback, 200 pages, kõrgus x laius x paksus: 229x178x13 mm, kaal: 363 g
  • Ilmumisaeg: 15-Sep-2009
  • Kirjastus: MC Press, LLC
  • ISBN-10: 158347093X
  • ISBN-13: 9781583470930
Teised raamatud teemal:
In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist in focusing on the key issues in each chapter—ranging from role-based access control to single sign-ons and electronic identity smart cards—this text provides students and professionals alike with a valuable tool for understanding the complexity of identity in a virtual world.

In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist in focusing on the key issues in each chapter—ranging from role-based access control to single sign-ons and electronic identity smart cards—this text provides students and professionals alike with a valuable tool for understanding the complexity of identity in a virtual world.

Foreword xi
Introduction 1(8)
Identity
9(12)
What Are the Components of a Person's Identity?
10(1)
So Where Does Privacy Fit In?
11(5)
Where Do Roles Fit Into the Concept of an Identity?
16(1)
Can I Have Multiple Identities in an Identity Management Environment?
17(2)
Discussion Questions
19(1)
Case Study
19(2)
Managing Identities and Identity Stores
21(16)
Identities and User Accounts
22(1)
What Is an Identity Store?
23(1)
Why Multiple Stores Are a Fact of Life
24(3)
Strategies for Multiple-Store Environments
27(3)
Managing Roles
30(2)
Role Modeling
32(1)
Delegated Administration and Self-Service
32(1)
Discussion Questions
33(1)
Case Study
34(3)
Directories
37(20)
Schemas and Namespace Planning
38(8)
The Power of a DIT
46(1)
Issues to Be Aware Of
46(1)
Authoritative Sources
47(1)
Directory and Database Design
48(1)
Virtual Directory
49(2)
The ``M'' Word
51(1)
Selecting a Configuration
52(3)
Discussion Questions
55(1)
Case Study
55(2)
Authentication and Access Control
57(18)
Methods of Authentication
59(5)
Levels of Authentication
64(1)
Authentication Assurance Levels
65(1)
Registration Assurance Levels
66(1)
Access Control
67(5)
Discussion Questions
72(1)
Case Study
73(2)
Provisioning
75(14)
The Mark of a Robust Process
76(2)
Zero-day Start
78(1)
Business System Issues
78(3)
Workflow
81(1)
The Role of Roles
81(2)
The Benefits of Roles
83(1)
Automating a Provisioning System
84(3)
Sequential and Parallel Authorization
87(1)
Discussion Questions
87(1)
Case Study
88(1)
Role-Based Access Control
89(12)
So What Is RBAC?
89(3)
Why Is RBAC Important?
92(3)
How Should RBAC Be Implemented?
95(2)
Role Discovery
97(1)
A Word of Caution
98(1)
Discussion Questions
98(1)
Case Study
99(2)
Single Sign-on and Federated Authentication
101(14)
Single Sign-on for the Enterprise
102(3)
Web SSO
105(4)
Federated Authentication
109(5)
Discussion Questions
114(1)
Case Study
114(1)
Governance, Risk, and Compliance
115(14)
HR Pattern-based Auditing
117(1)
Pattern Reporting
118(2)
Business Policies (IT Controls and SoD Rules)
120(1)
Best Practices for System Cleansing and Auditing
121(2)
Sample Graphs
123(3)
Federated Authentication Auditing
126(1)
Discussion Questions
127(1)
Case Study
128(1)
Implementation and Roadmap
129(18)
Getting Started
130(5)
Setting Out
135(1)
Physical Implementation
135(1)
Typical Project Structure
136(2)
Sample Roadmap
138(2)
Navigating the Political Landscape
140(1)
Challenges
141(5)
Discussion Questions
146(1)
Case Study
146(1)
Public Key Infrastructure
147(20)
Why Do We Need PKI?
149(1)
How Does PKI Work?
150(2)
How Is PKI Used?
152(1)
The Components
153(7)
Key Generation
160(1)
Certificate Management
160(1)
Certificate Issues
161(1)
Implementation Considerations
161(4)
A Final Comment
165(1)
Discussion Questions
166(1)
Case Study
166(1)
Electronic Identity Smartcards
167(12)
History
167(2)
Interoperability
169(1)
Privacy
170(1)
Deployment Issues
171(5)
An Ideal Platform
176(1)
Discussion Questions
176(1)
Case Study
177(2)
Appendix A: Case Scenario
179(16)
Background
179(1)
The ``As-Is'' Situation
179(1)
The ``To-Be'' Requirement
180(1)
Constraints
181(1)
System Descriptions
182(3)
Data Repositories
185(2)
Program of Work
187(4)
Exercise
191(4)
Appendix B: Standards
195(4)
Directory Standards
195(1)
Authentication Standards
196(3)
Appendix C: Glossary
199(4)
Appendix D: Public Key Cryptography Standards
203(2)
Appendix E: X.509 Specification
205(2)
Appendix F: Key Lengths
207