Identity and Access Management by Ertem Osmanoglu

Identity and Access Management by Ertem Osmanoglu

Author:Ertem Osmanoglu
Language: eng
Format: epub
ISBN: 9780124104334
Publisher: Elsevier Inc.
Published: 2013-11-21T05:00:00+00:00


Authentication Implementation Approaches

Authentication infrastructure is made complex by the need to cover multiple locations; a variety of customer and employee devices; network, email, database, application, and Web components; and transaction with third-party resources and environments. Typically, organizations end up with multiple authentication systems and subsystems. Most common authentication approaches in the enterprise include the following capabilities:

Risk-based adaptive authentication

Single sign on (SSO)

Desktop SSO and operating system and platform (i.e., Windows, UNIX) authentication for local usage

Web SSO

Federation with business partners, third-party service providers

Remote access authentication (dial-in, Web, and wireless)

Physical security controls for protected environments (i.e., offices, data centers).



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.