O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How Identity Management works

So as you can see, Identity Management is everywhere. But how does Identity Management work? Well, let's walk through the process together to think about a login ID to a system. Let's pick a banking website.

The first step is to access some secure content. Not all parts of a system are secure, for instance, the homepage of the bank website. But the Internet Banking section is secure and will ask for your identity credentials.

Entering identity credentials, such as a username or some other unique identifier and a password, is the second step. This would identify that someone knows your credentials.

The next step is to take those credentials and validate them against a directory. A directory contains a list of users and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required