did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781583470930

Identity Management A Primer

by ; ; ;
  • ISBN13:

    9781583470930

  • ISBN10:

    158347093X

  • Format: Paperback
  • Copyright: 2009-09-15
  • Publisher: MC Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $53.28 Save up to $39.22
  • Rent Book $33.57
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

The boundaries between the real and the virtual are becoming increasingly blurred. In a corporate setting, it is more important than ever to identify and control the way the organization deals with customers, suppliers, employees, and other users who may interact with information systems.

Author Biography

Dave Kibble is the director of information systems (academic support and ancillaries) at the University of Waterloo. He has more than three-decades worth of experience in the identity-management field. Ilan Sharoni has extensive experience in identity- and access-management consulting work, particularly in the area of role management. He currently works for Eurekify with their flagship product Sage, a leading worldwide role-management tool. Graham Williamson is the CEO of Internet Commerce Australia. David Yip is an identity-management specialist with extensive experience in the field. He is a director of Gamatech, a specialist identity-management consultancy and systems-integrator firm based in Hong Kong.

Table of Contents

Forewordp. xi
Introductionp. 1
Identityp. 9
What Are the Components of a Person's Identity?p. 10
So Where Does Privacy Fit In?p. 11
Where Do Roles Fit Into the Concept of an Identity?p. 16
Can I Have Multiple Identities in an Identity Management Environment?p. 17
Discussion Questionsp. 19
Case Studyp. 19
Managing Identities and Identity Storesp. 21
Identities and User Accountsp. 22
What Is an Identity Store?p. 23
Why Multiple Stores Are a Fact of Lifep. 24
Strategies for Multiple-Store Environmentsp. 27
Managing Rolesp. 30
Role Modelingp. 32
Delegated Administration and Self-Servicep. 32
Discussion Questionsp. 33
Case Studyp. 34
Directoriesp. 37
Schemas and Namespace Planningp. 38
The Power of a DITp. 46
Issues to Be Aware Ofp. 46
Authoritative Souresp. 47
Directory and Database Designp. 48
Virtual Directoryp. 49
The "M" Wordp. 51
Selecting a Configurationp. 52
Discussion Questionsp. 55
Case Studyp. 55
Authentication and Access Controlp. 57
Methods of Authenticationp. 59
Levels of Authenticationp. 64
Authentication Assurance Levelsp. 65
Registration Assurance Levelsp. 66
Access Controlp. 67
Discussion Questionsp. 72
Case Studyp. 73
Provisioningp. 75
The Mark of a Robust Processp. 76
Zero-day Startp. 78
Business System Issuesp. 78
Workflowp. 81
The Role of Rolesp. 81
The Benefits of Roles 83
Automating a Provisioning Systemp. 84
Sequential and Parallel Authorizationp. 87
Discussion Questionsp. 87
Case Studyp. 88
Role-Based Access Controlp. 89
So What Is RBAC?p. 89
Why Is RBAC Important?p. 92
How Should RBAC Be Implemented?p. 95
Role Discoveryp. 97
A Word of Cautionp. 98
Discussion Questionsp. 98
Case Studyp. 99
Single Sign-on and Federated Authenticationp. 101
Single Sign-on for the Enterprisep. 102
Web SSOp. 105
Federated Authenticationp. 109
Discussion Questionsp. 114
Case Studyp. 114
Governance, Risk, and Compliancep. 115
HR Pattern-based Auditingp. 117
Pattern Reportingp. 118
Business Policies (IT Controls and SoD Rules)p. 120
Best Practices for System Cleansing and Auditingp. 121
Sample Graphsp. 123
Federated Authentication Auditingp. 126
Discussion Questionsp. 127
Case Studyp. 128
Implementation and Roadmapp. 129
Getting Startedp. 130
Setting Outp. 135
Physical Implementationp. 135
Typical Project Structurep. 136
Sample Roadmapp. 138
Navigating the Political Landscapep. 140
Challengesp. 141
Discussion Questionsp. 146
Case Studyp. 146
Public Key Infrastructurep. 147
Why Do We Need PKI?p. 149
How Does PKI Work?p. 150
How Is PKI Used?p. 152
The Componentsp. 153
Key Generationp. 160
Certificate Managementp. 160
Certificate Issuesp. 161
Implementation Considerationsp. 161
A Final Commentp. 165
Discussion Questionsp. 166
Case Studyp. 166
Electronic identity Smartcardsp. 167
Historyp. 167
Interoperabilityp. 169
Privacyp. 170
Deployment Issuesp. 171
An Ideal Platformp. 176
Discussion Questionsp. 176
Case Studyp. 177
Case Scenariop. 179
Backgroundp. 179
The "As-Is" Situtationp. 179
The "To-Be" Requirementp. 180
Constraintsp. 181
System Descriptionsp. 182
Data Repositoriesp. 185
Program of Workp. 187
Exercisep. 191
Standardsp. 195
Directory Standardsp. 195
Authentication Standardsp. 196
Glossaryp. 199
Public Key Cryptography Standardsp. 203
X.509 Specificationp. 205
Key Lengthsp. 207
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program