Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel |
Autore | Nickel Jochen |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
Descrizione fisica | 1 online resource (146 p.) |
Collana | Professional expertise distilled |
Soggetto topico | Client/server computing |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78217-819-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims
Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR - a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD - using Dynamic Access Control; Summary; Chapter 8: Automating the Solution Identifying the complete solution |
Record Nr. | UNINA-9910453409103321 |
Nickel Jochen | ||
Birmingham : , : Packt Publishing, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel |
Autore | Nickel Jochen |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
Descrizione fisica | 1 online resource (146 p.) |
Collana | Professional expertise distilled |
Soggetto topico | Client/server computing |
ISBN | 1-78217-819-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims
Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR - a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD - using Dynamic Access Control; Summary; Chapter 8: Automating the Solution Identifying the complete solution |
Record Nr. | UNINA-9910790717103321 |
Nickel Jochen | ||
Birmingham : , : Packt Publishing, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Learning Microsoft Windows Server 2012 dynamic access control / / Jochen Nickel |
Autore | Nickel Jochen |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
Descrizione fisica | 1 online resource (146 p.) |
Disciplina | 005.713 |
Collana | Professional expertise distilled |
Soggetto topico | Client/server computing |
ISBN | 1-78217-819-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims
Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR - a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD - using Dynamic Access Control; Summary; Chapter 8: Automating the Solution Identifying the complete solution |
Record Nr. | UNINA-9910827445203321 |
Nickel Jochen | ||
Birmingham : , : Packt Publishing, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel |
Autore | Nickel Jochen |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Birmingham, England ; ; Mumbai : , : Packt, , 2019 |
Descrizione fisica | 1 online resource (681 pages) |
Disciplina | 004.6782 |
Soggetto topico | Cloud computing - Data processing |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78913-115-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910493237803321 |
Nickel Jochen | ||
Birmingham, England ; ; Mumbai : , : Packt, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel |
Autore | Nickel Jochen |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Birmingham, England ; ; Mumbai : , : Packt, , 2019 |
Descrizione fisica | 1 online resource (681 pages) |
Disciplina | 004.6782 |
Soggetto topico | Cloud computing - Data processing |
ISBN | 1-78913-115-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Building and Managing Azure Active Directory -- Chapter 2: Understanding Identity Synchronization -- Chapter 3: Exploring Advanced Synchronization Concepts -- Chapter 4: Monitoring Your Identity Bridge -- Chapter 5: Configuring and Managing Identity Protection -- Chapter 6: Managing Authentication Protocols -- Chapter 7: Deploying Solutions on Azure AD and ADFS -- Chapter 8: Using the Azure AD App Proxy and the Web Application Proxy -- Chapter 9: Deploying Additional Applications on Azure AD -- Chapter 10: Exploring Azure AD Identity Services -- Chapter 11: Creating Identity Life Cycle Management in Azure -- Chapter 12: Creating a Security Culture -- Chapter 13: Identifying and Detecting Sensitive Data -- Chapter 14: Understanding Encryption Key Management Strategies -- Chapter 15: Configuring Azure Information Protection Solutions -- Chapter 16: Azure Information Protection Development. |
Record Nr. | UNINA-9910793482603321 |
Nickel Jochen | ||
Birmingham, England ; ; Mumbai : , : Packt, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data / / Jochen Nickel |
Autore | Nickel Jochen |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Birmingham, England ; ; Mumbai : , : Packt, , 2019 |
Descrizione fisica | 1 online resource (681 pages) |
Disciplina | 004.6782 |
Soggetto topico | Cloud computing - Data processing |
ISBN | 1-78913-115-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Building and Managing Azure Active Directory -- Chapter 2: Understanding Identity Synchronization -- Chapter 3: Exploring Advanced Synchronization Concepts -- Chapter 4: Monitoring Your Identity Bridge -- Chapter 5: Configuring and Managing Identity Protection -- Chapter 6: Managing Authentication Protocols -- Chapter 7: Deploying Solutions on Azure AD and ADFS -- Chapter 8: Using the Azure AD App Proxy and the Web Application Proxy -- Chapter 9: Deploying Additional Applications on Azure AD -- Chapter 10: Exploring Azure AD Identity Services -- Chapter 11: Creating Identity Life Cycle Management in Azure -- Chapter 12: Creating a Security Culture -- Chapter 13: Identifying and Detecting Sensitive Data -- Chapter 14: Understanding Encryption Key Management Strategies -- Chapter 15: Configuring Azure Information Protection Solutions -- Chapter 16: Azure Information Protection Development. |
Record Nr. | UNINA-9910808854503321 |
Nickel Jochen | ||
Birmingham, England ; ; Mumbai : , : Packt, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|