|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910810924303321 |
|
|
Autore |
Bucker Axel |
|
|
Titolo |
Federated identity management and web services security with IBM tivoli security solutions / / Axel Buecker et al |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
San Jose, CA, : IBM, International Technical Support Organization, 2005 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
FilipWerner |
HintonHeather |
HippensteilHeinz Peter |
HollinMark |
NeucomRay |
WeedenShane |
WestmanJohan |
|
|
|
|
|
|
|
|
Soggetti |
|
IBM software |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"October 2005." |
"SG24-6394-01." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Part 1 Architecture and design -- Chapter 1. Business context for identity federation -- 1.1 Federated identity -- 1.2 Business environment -- 1.2.1 Deconstruction of the enterprise -- 1.2.2 Enterprise re-aggregation -- 1.2.3 High-level example of a re-aggregated business -- 1.2.4 Business models for federated identity -- 1.2.5 The relationship - Trust and assurance -- 1.3 IT environment -- 1.3.1 The role of identity management -- 1.3.2 Dealing with identities -- 1.3.3 User life cycle management -- 1.3.4 Inter-enterprise application to application integration -- 1.3.5 Open standards -- 1.4 Conclusion -- Chapter 2. Architecting an identity federation -- 2.1 Federation example -- 2.2 Federated identity management architecture -- 2.2.1 Background to federation -- 2.2.2 Architecture overview -- 2.2.3 Roles -- 2.2.4 Identity models -- 2.2.5 Identity attributes -- |
|
|
|
|