CHAPTER 8Architecting Identity Management
This chapter discusses the architectural processes and methods used for solving the identity management problems that many enterprises face today when trying to secure access to their applications and information. “Architecting” a solution requires that you understand the functional nature of the problem (such as protecting customer data from privacy threats, and so on) and create a technical solution to address those problems.
Often, as technical people, we can get caught up with possible technological solutions before we fully understand the possible ways of solving the problem from a practical perspective. Subsequently, this chapter covers common techniques and patterns that help you quickly and easily ...
Get Applied Oracle Security: Developing Secure Database and Middleware Environments now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.