Identity Management
John Linn, RSA Laboratories
Identity Management: Motivation, Goals, and Issues
Broadening and Distributing Digital Identity
User Experience and Convenience
Security, Privacy, and Control
Centralized and Distributed Systems
Networking and Application Integration Issues
Identifying and Delimiting Sessions
Identity Management and Web Services
Benefits of Identity Management
Security Assertion Markup Language (SAML)
Liberty Alliance's Identity Federation Framework (ID-FF)
Liberty Alliance Identity Web Services Framework (ID-WSF)
INTRODUCTION
Today's network users are accessing ever-growing numbers of sites. Their accesses involve a widening set of attributes, such as shipping addresses, personal preferences, and authorization rights. Users and their administrators want the ability to control this information conveniently and consistently, according to security and privacy policies. Target sites want standard facilities that enable them (given suitable authorization) to obtain users' identity information without burdening the users involved. In response to these motivations, as of 2004, several initiatives are defining specifications concerned with ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.