17

Generic Authentication Architecture and Generic Bootstrapping Architecture

Nowadays, the users of fixed and mobile devices are able to use a huge amount of different services, most of them requiring some kind of authentication. Until now, the user had to have credentials for each service he aimed to use. Either he had to use them by hand, such as by writing his username and password when configuring them into a client application, or they were encased in a smart card, such as the Subscriber Identity Module (SIM) cards in mobile phones. The existence of several credentials is a problem due not only to its inconveniency for the user but also because provisioning these credentials to the users is expensive for the operators and other service ...

Get Identification and Management of Distributed Data now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.