Open Source Identity Management Patterns and Practices Using OpenAM 10.x:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2013
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 |
Beschreibung: | This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Identity Management Patterns and Principles; Defining Identity Management; How claims relate to identity; Understanding identity contexts; Why Identity Management is important?; Examples of identity levels; Pseudonymous identities; Trusted identities; Trusted identities with multiple contexts; Federated identities; How Identity Management works; Key components of Identity Management; Identity Service Providers; Identity policy agents; Identity providers Identity data storesIdentity managers; Summary; Chapter 2: Installing OpenAM 10.x; Downloading OpenAM 10.x; Prerequisites for OpenAM; Creating a fully qualified domain name; Installing the Java Runtime Environment; Downloading the Tomcat application server; Configuring Tomcat for OpenAM; Installing OpenAM 10.1.0; Summary; Chapter 3: Cross-Domain Single Sign On; An introduction to Cross-Domain Single Sign On; Securing an Apache 2.4 local domain website; Creating an Apache Policy Agent profile in OpenAM; Securing Apache with the OpenAM Policy Agent; Securing a Tomcat 6 remote domain website Configuring Tomcat and creating a Tomcat Policy Agent profileSecuring Tomcat with the OpenAM Policy Agent; Configuring a Tomcat Agent Profile for Cross Domain Single Sign On; Summary; Chapter 4: Distributed Authentication; Understanding distributed authentication; How policy agents communicate with OpenAM; Understanding defense-in-depth architectures; Preparing OpenAM for distributed authentication; Configuring the distributed authentication application server; Configuring the distributed authentication application; Testing distributed authentication; Summary Chapter 5: Application Authentication with FedletsUnderstanding Fedlets; Advantages of Fedlets over Policy Agents; Disadvantages of Fedlets over policy agents; Configuring the Fedlet application server; Creating a SAML hosted identity provider; Creating a Fedlet; Deploying Fedlet.zip onto our Java application server; Validating Fedlet setup; More information about Fedlets; Summary; Chapter 6: Implementing SAML2 Federation Patterns; Understanding SAML; Understanding Identity Providers; Understanding Service Providers; Understanding a Circle of Trust Configuring OpenAM as a SAML Identity ProviderInstalling SimpleSAMLphp; Configuring SimpleSAMLphp as a Service Provider; Configuring OpenAM to trust a SimpleSAMLphp SP; Testing our SAML Circle of Trust; Summary; Chapter 7: OAuth Authentication; Understanding OAuth; Preparing Facebook as an OAuth Provider; Configuring an OAuth Authentication Module; Configuring the Authentication Chaining; Testing our OAuth Client against Facebook as an OAuth Provider; Summary; Chapter 8: Two Factor Authentication; Understanding two factor authentication; Understanding OATH and how it relates to OpenAM. |
ISBN: | 9781299832435 1299832431 9781782166832 1782166831 9781782166825 1782166823 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043777199 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160920s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781299832435 |9 978-1-299-83243-5 | ||
020 | |a 1299832431 |9 1-299-83243-1 | ||
020 | |a 9781782166832 |9 978-1-78216-683-2 | ||
020 | |a 1782166831 |9 1-78216-683-1 | ||
020 | |a 9781782166825 |9 978-1-78216-682-5 | ||
020 | |a 1782166831 |9 1-78216-683-1 | ||
020 | |a 1782166823 |9 1-78216-682-3 | ||
035 | |a (ZDB-4-EBA)ocn857713040 | ||
035 | |a (ZDB-4-ITC)ocn857713040 | ||
035 | |a (OCoLC)857713040 | ||
035 | |a (DE-599)BVBBV043777199 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Kenning, Waylon |e Verfasser |4 aut | |
245 | 1 | 0 | |a Open Source Identity Management Patterns and Practices Using OpenAM 10.x |c Waylon Kenning |
264 | 1 | |a Birmingham |b Packt Publishing |c 2013 | |
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat | ||
500 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Identity Management Patterns and Principles; Defining Identity Management; How claims relate to identity; Understanding identity contexts; Why Identity Management is important?; Examples of identity levels; Pseudonymous identities; Trusted identities; Trusted identities with multiple contexts; Federated identities; How Identity Management works; Key components of Identity Management; Identity Service Providers; Identity policy agents; Identity providers | ||
500 | |a Identity data storesIdentity managers; Summary; Chapter 2: Installing OpenAM 10.x; Downloading OpenAM 10.x; Prerequisites for OpenAM; Creating a fully qualified domain name; Installing the Java Runtime Environment; Downloading the Tomcat application server; Configuring Tomcat for OpenAM; Installing OpenAM 10.1.0; Summary; Chapter 3: Cross-Domain Single Sign On; An introduction to Cross-Domain Single Sign On; Securing an Apache 2.4 local domain website; Creating an Apache Policy Agent profile in OpenAM; Securing Apache with the OpenAM Policy Agent; Securing a Tomcat 6 remote domain website | ||
500 | |a Configuring Tomcat and creating a Tomcat Policy Agent profileSecuring Tomcat with the OpenAM Policy Agent; Configuring a Tomcat Agent Profile for Cross Domain Single Sign On; Summary; Chapter 4: Distributed Authentication; Understanding distributed authentication; How policy agents communicate with OpenAM; Understanding defense-in-depth architectures; Preparing OpenAM for distributed authentication; Configuring the distributed authentication application server; Configuring the distributed authentication application; Testing distributed authentication; Summary | ||
500 | |a Chapter 5: Application Authentication with FedletsUnderstanding Fedlets; Advantages of Fedlets over Policy Agents; Disadvantages of Fedlets over policy agents; Configuring the Fedlet application server; Creating a SAML hosted identity provider; Creating a Fedlet; Deploying Fedlet.zip onto our Java application server; Validating Fedlet setup; More information about Fedlets; Summary; Chapter 6: Implementing SAML2 Federation Patterns; Understanding SAML; Understanding Identity Providers; Understanding Service Providers; Understanding a Circle of Trust | ||
500 | |a Configuring OpenAM as a SAML Identity ProviderInstalling SimpleSAMLphp; Configuring SimpleSAMLphp as a Service Provider; Configuring OpenAM to trust a SimpleSAMLphp SP; Testing our SAML Circle of Trust; Summary; Chapter 7: OAuth Authentication; Understanding OAuth; Preparing Facebook as an OAuth Provider; Configuring an OAuth Authentication Module; Configuring the Authentication Chaining; Testing our OAuth Client against Facebook as an OAuth Provider; Summary; Chapter 8: Two Factor Authentication; Understanding two factor authentication; Understanding OATH and how it relates to OpenAM. | ||
650 | 4 | |a Identification / Computer programs | |
650 | 4 | |a Online identities | |
650 | 4 | |a Open source software | |
650 | 4 | |a Computer systems / Verification | |
650 | 7 | |a COMPUTERS / Programming / Open Source |2 bisacsh | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 4 | |a Identification |x Computer programs | |
650 | 4 | |a Online identities | |
650 | 4 | |a Open source software | |
650 | 4 | |a Computer systems |x Verification | |
912 | |a ZDB-4-EBA |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029188259 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=637221 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=637221 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176604546465792 |
---|---|
any_adam_object | |
author | Kenning, Waylon |
author_facet | Kenning, Waylon |
author_role | aut |
author_sort | Kenning, Waylon |
author_variant | w k wk |
building | Verbundindex |
bvnumber | BV043777199 |
collection | ZDB-4-EBA ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn857713040 (ZDB-4-ITC)ocn857713040 (OCoLC)857713040 (DE-599)BVBBV043777199 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05392nmm a2200589zc 4500</leader><controlfield tag="001">BV043777199</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160920s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299832435</subfield><subfield code="9">978-1-299-83243-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299832431</subfield><subfield code="9">1-299-83243-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782166832</subfield><subfield code="9">978-1-78216-683-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782166831</subfield><subfield code="9">1-78216-683-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782166825</subfield><subfield code="9">978-1-78216-682-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782166831</subfield><subfield code="9">1-78216-683-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782166823</subfield><subfield code="9">1-78216-682-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn857713040</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn857713040</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)857713040</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043777199</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kenning, Waylon</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Open Source Identity Management Patterns and Practices Using OpenAM 10.x</subfield><subfield code="c">Waylon Kenning</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Identity Management Patterns and Principles; Defining Identity Management; How claims relate to identity; Understanding identity contexts; Why Identity Management is important?; Examples of identity levels; Pseudonymous identities; Trusted identities; Trusted identities with multiple contexts; Federated identities; How Identity Management works; Key components of Identity Management; Identity Service Providers; Identity policy agents; Identity providers</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Identity data storesIdentity managers; Summary; Chapter 2: Installing OpenAM 10.x; Downloading OpenAM 10.x; Prerequisites for OpenAM; Creating a fully qualified domain name; Installing the Java Runtime Environment; Downloading the Tomcat application server; Configuring Tomcat for OpenAM; Installing OpenAM 10.1.0; Summary; Chapter 3: Cross-Domain Single Sign On; An introduction to Cross-Domain Single Sign On; Securing an Apache 2.4 local domain website; Creating an Apache Policy Agent profile in OpenAM; Securing Apache with the OpenAM Policy Agent; Securing a Tomcat 6 remote domain website</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Configuring Tomcat and creating a Tomcat Policy Agent profileSecuring Tomcat with the OpenAM Policy Agent; Configuring a Tomcat Agent Profile for Cross Domain Single Sign On; Summary; Chapter 4: Distributed Authentication; Understanding distributed authentication; How policy agents communicate with OpenAM; Understanding defense-in-depth architectures; Preparing OpenAM for distributed authentication; Configuring the distributed authentication application server; Configuring the distributed authentication application; Testing distributed authentication; Summary</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 5: Application Authentication with FedletsUnderstanding Fedlets; Advantages of Fedlets over Policy Agents; Disadvantages of Fedlets over policy agents; Configuring the Fedlet application server; Creating a SAML hosted identity provider; Creating a Fedlet; Deploying Fedlet.zip onto our Java application server; Validating Fedlet setup; More information about Fedlets; Summary; Chapter 6: Implementing SAML2 Federation Patterns; Understanding SAML; Understanding Identity Providers; Understanding Service Providers; Understanding a Circle of Trust</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Configuring OpenAM as a SAML Identity ProviderInstalling SimpleSAMLphp; Configuring SimpleSAMLphp as a Service Provider; Configuring OpenAM to trust a SimpleSAMLphp SP; Testing our SAML Circle of Trust; Summary; Chapter 7: OAuth Authentication; Understanding OAuth; Preparing Facebook as an OAuth Provider; Configuring an OAuth Authentication Module; Configuring the Authentication Chaining; Testing our OAuth Client against Facebook as an OAuth Provider; Summary; Chapter 8: Two Factor Authentication; Understanding two factor authentication; Understanding OATH and how it relates to OpenAM.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identification / Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online identities</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer systems / Verification</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming / Open Source</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identification</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online identities</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer systems</subfield><subfield code="x">Verification</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029188259</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=637221</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=637221</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043777199 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:34:49Z |
institution | BVB |
isbn | 9781299832435 1299832431 9781782166832 1782166831 9781782166825 1782166823 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029188259 |
oclc_num | 857713040 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
psigel | ZDB-4-EBA ZDB-4-ITC ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Kenning, Waylon Verfasser aut Open Source Identity Management Patterns and Practices Using OpenAM 10.x Waylon Kenning Birmingham Packt Publishing 2013 txt rdacontent c rdamedia cr rdacarrier Community experience distilled This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x. Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what's possible and how to quickly implement a prototype. It's assumed that you've had experience with web applications and some knowledge of Apache and Tomcat Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Identity Management Patterns and Principles; Defining Identity Management; How claims relate to identity; Understanding identity contexts; Why Identity Management is important?; Examples of identity levels; Pseudonymous identities; Trusted identities; Trusted identities with multiple contexts; Federated identities; How Identity Management works; Key components of Identity Management; Identity Service Providers; Identity policy agents; Identity providers Identity data storesIdentity managers; Summary; Chapter 2: Installing OpenAM 10.x; Downloading OpenAM 10.x; Prerequisites for OpenAM; Creating a fully qualified domain name; Installing the Java Runtime Environment; Downloading the Tomcat application server; Configuring Tomcat for OpenAM; Installing OpenAM 10.1.0; Summary; Chapter 3: Cross-Domain Single Sign On; An introduction to Cross-Domain Single Sign On; Securing an Apache 2.4 local domain website; Creating an Apache Policy Agent profile in OpenAM; Securing Apache with the OpenAM Policy Agent; Securing a Tomcat 6 remote domain website Configuring Tomcat and creating a Tomcat Policy Agent profileSecuring Tomcat with the OpenAM Policy Agent; Configuring a Tomcat Agent Profile for Cross Domain Single Sign On; Summary; Chapter 4: Distributed Authentication; Understanding distributed authentication; How policy agents communicate with OpenAM; Understanding defense-in-depth architectures; Preparing OpenAM for distributed authentication; Configuring the distributed authentication application server; Configuring the distributed authentication application; Testing distributed authentication; Summary Chapter 5: Application Authentication with FedletsUnderstanding Fedlets; Advantages of Fedlets over Policy Agents; Disadvantages of Fedlets over policy agents; Configuring the Fedlet application server; Creating a SAML hosted identity provider; Creating a Fedlet; Deploying Fedlet.zip onto our Java application server; Validating Fedlet setup; More information about Fedlets; Summary; Chapter 6: Implementing SAML2 Federation Patterns; Understanding SAML; Understanding Identity Providers; Understanding Service Providers; Understanding a Circle of Trust Configuring OpenAM as a SAML Identity ProviderInstalling SimpleSAMLphp; Configuring SimpleSAMLphp as a Service Provider; Configuring OpenAM to trust a SimpleSAMLphp SP; Testing our SAML Circle of Trust; Summary; Chapter 7: OAuth Authentication; Understanding OAuth; Preparing Facebook as an OAuth Provider; Configuring an OAuth Authentication Module; Configuring the Authentication Chaining; Testing our OAuth Client against Facebook as an OAuth Provider; Summary; Chapter 8: Two Factor Authentication; Understanding two factor authentication; Understanding OATH and how it relates to OpenAM. Identification / Computer programs Online identities Open source software Computer systems / Verification COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Internet / Security bisacsh Identification Computer programs Computer systems Verification |
spellingShingle | Kenning, Waylon Open Source Identity Management Patterns and Practices Using OpenAM 10.x Identification / Computer programs Online identities Open source software Computer systems / Verification COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Internet / Security bisacsh Identification Computer programs Computer systems Verification |
title | Open Source Identity Management Patterns and Practices Using OpenAM 10.x |
title_auth | Open Source Identity Management Patterns and Practices Using OpenAM 10.x |
title_exact_search | Open Source Identity Management Patterns and Practices Using OpenAM 10.x |
title_full | Open Source Identity Management Patterns and Practices Using OpenAM 10.x Waylon Kenning |
title_fullStr | Open Source Identity Management Patterns and Practices Using OpenAM 10.x Waylon Kenning |
title_full_unstemmed | Open Source Identity Management Patterns and Practices Using OpenAM 10.x Waylon Kenning |
title_short | Open Source Identity Management Patterns and Practices Using OpenAM 10.x |
title_sort | open source identity management patterns and practices using openam 10 x |
topic | Identification / Computer programs Online identities Open source software Computer systems / Verification COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Internet / Security bisacsh Identification Computer programs Computer systems Verification |
topic_facet | Identification / Computer programs Online identities Open source software Computer systems / Verification COMPUTERS / Programming / Open Source COMPUTERS / Internet / Security Identification Computer programs Computer systems Verification |
work_keys_str_mv | AT kenningwaylon opensourceidentitymanagementpatternsandpracticesusingopenam10x |