Incremental Software Architecture: A Method for Saving Failing IT Implementations by Michael Bell
Author:Michael Bell [Bell, Michael]
Language: eng
Format: azw3, epub
ISBN: 9781119213697
Publisher: Wiley
Published: 2016-01-18T16:00:00+00:00
Authentication Server Manages Access
The next step in our technical profiling process is to understand what the authentication server's features are and how they contribute to the deployed environment in organization 2, depicted in Figure 9.1.
The authentication server is utterly central to organization 2's production environment, an integral design component that manages access to enterprise assets. The server authenticates user and process credentials to grant a variety of access privileges to production facilities, systems, and related applications. Authorized parties are then allowed to access deployed services in certain capacities and permission levels. Moreover, repudiating services from consumers triggers monitoring alerts that are addressed urgently to protect organizational assets.
After looking deeper into the end-state architecture illustration in Figure 9.1, it is apparent that applications 4, 5, and 6 are linked to the authentication server in organization 2. The ESB and the data aggregator are linked to it too. Even the identity server in organization 1 exchanges messages with the authentication server. This formation creates a tight dependency between the message exchange parties. In this scheme, the authentication server along with its direct consumers resembles a star formation, a centralized design style. This arrangement on the network implies that the server offers vital services that almost every architecture element must use.
Remember the chief contribution of the authentication server to the end-state architecture:
Access control management
User and process authentication
User and process authorization
Download
Incremental Software Architecture: A Method for Saving Failing IT Implementations by Michael Bell.epub
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8304)
Test-Driven Development with Java by Alan Mellor(6754)
Data Augmentation with Python by Duc Haba(6667)
Principles of Data Fabric by Sonia Mezzetta(6419)
Learn Blender Simulations the Right Way by Stephen Pearson(6313)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6189)
Hadoop in Practice by Alex Holmes(5962)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5809)
RPA Solution Architect's Handbook by Sachin Sahgal(5588)
Big Data Analysis with Python by Ivan Marin(5375)
The Infinite Retina by Robert Scoble Irena Cronin(5276)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5152)
Pretrain Vision and Large Language Models in Python by Emily Webber(4345)
Infrastructure as Code for Beginners by Russ McKendrick(4104)
Functional Programming in JavaScript by Mantyla Dan(4040)
The Age of Surveillance Capitalism by Shoshana Zuboff(3960)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3819)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3623)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3597)
