Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Foreword | p. xi |
Introduction | p. 1 |
Identity | p. 9 |
What Are the Components of a Person's Identity? | p. 10 |
So Where Does Privacy Fit In? | p. 11 |
Where Do Roles Fit Into the Concept of an Identity? | p. 16 |
Can I Have Multiple Identities in an Identity Management Environment? | p. 17 |
Discussion Questions | p. 19 |
Case Study | p. 19 |
Managing Identities and Identity Stores | p. 21 |
Identities and User Accounts | p. 22 |
What Is an Identity Store? | p. 23 |
Why Multiple Stores Are a Fact of Life | p. 24 |
Strategies for Multiple-Store Environments | p. 27 |
Managing Roles | p. 30 |
Role Modeling | p. 32 |
Delegated Administration and Self-Service | p. 32 |
Discussion Questions | p. 33 |
Case Study | p. 34 |
Directories | p. 37 |
Schemas and Namespace Planning | p. 38 |
The Power of a DIT | p. 46 |
Issues to Be Aware Of | p. 46 |
Authoritative Soures | p. 47 |
Directory and Database Design | p. 48 |
Virtual Directory | p. 49 |
The "M" Word | p. 51 |
Selecting a Configuration | p. 52 |
Discussion Questions | p. 55 |
Case Study | p. 55 |
Authentication and Access Control | p. 57 |
Methods of Authentication | p. 59 |
Levels of Authentication | p. 64 |
Authentication Assurance Levels | p. 65 |
Registration Assurance Levels | p. 66 |
Access Control | p. 67 |
Discussion Questions | p. 72 |
Case Study | p. 73 |
Provisioning | p. 75 |
The Mark of a Robust Process | p. 76 |
Zero-day Start | p. 78 |
Business System Issues | p. 78 |
Workflow | p. 81 |
The Role of Roles | p. 81 |
The Benefits of Roles 83 | |
Automating a Provisioning System | p. 84 |
Sequential and Parallel Authorization | p. 87 |
Discussion Questions | p. 87 |
Case Study | p. 88 |
Role-Based Access Control | p. 89 |
So What Is RBAC? | p. 89 |
Why Is RBAC Important? | p. 92 |
How Should RBAC Be Implemented? | p. 95 |
Role Discovery | p. 97 |
A Word of Caution | p. 98 |
Discussion Questions | p. 98 |
Case Study | p. 99 |
Single Sign-on and Federated Authentication | p. 101 |
Single Sign-on for the Enterprise | p. 102 |
Web SSO | p. 105 |
Federated Authentication | p. 109 |
Discussion Questions | p. 114 |
Case Study | p. 114 |
Governance, Risk, and Compliance | p. 115 |
HR Pattern-based Auditing | p. 117 |
Pattern Reporting | p. 118 |
Business Policies (IT Controls and SoD Rules) | p. 120 |
Best Practices for System Cleansing and Auditing | p. 121 |
Sample Graphs | p. 123 |
Federated Authentication Auditing | p. 126 |
Discussion Questions | p. 127 |
Case Study | p. 128 |
Implementation and Roadmap | p. 129 |
Getting Started | p. 130 |
Setting Out | p. 135 |
Physical Implementation | p. 135 |
Typical Project Structure | p. 136 |
Sample Roadmap | p. 138 |
Navigating the Political Landscape | p. 140 |
Challenges | p. 141 |
Discussion Questions | p. 146 |
Case Study | p. 146 |
Public Key Infrastructure | p. 147 |
Why Do We Need PKI? | p. 149 |
How Does PKI Work? | p. 150 |
How Is PKI Used? | p. 152 |
The Components | p. 153 |
Key Generation | p. 160 |
Certificate Management | p. 160 |
Certificate Issues | p. 161 |
Implementation Considerations | p. 161 |
A Final Comment | p. 165 |
Discussion Questions | p. 166 |
Case Study | p. 166 |
Electronic identity Smartcards | p. 167 |
History | p. 167 |
Interoperability | p. 169 |
Privacy | p. 170 |
Deployment Issues | p. 171 |
An Ideal Platform | p. 176 |
Discussion Questions | p. 176 |
Case Study | p. 177 |
Case Scenario | p. 179 |
Background | p. 179 |
The "As-Is" Situtation | p. 179 |
The "To-Be" Requirement | p. 180 |
Constraints | p. 181 |
System Descriptions | p. 182 |
Data Repositories | p. 185 |
Program of Work | p. 187 |
Exercise | p. 191 |
Standards | p. 195 |
Directory Standards | p. 195 |
Authentication Standards | p. 196 |
Glossary | p. 199 |
Public Key Cryptography Standards | p. 203 |
X.509 Specification | p. 205 |
Key Lengths | p. 207 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.