O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Key components of Identity Management

We briefly touched upon one component of an Identity Management system, the directory. But there are a few more components. Let's go through some common components and understand their purpose.

Identity Service Providers

The first component is the system with the secure resource that an identity is trying to access. This is known as a Service Provider. Think of this as a system that is providing a service to an identity, such as internet banking or online billing. In smaller systems, you may find the system with the secure resource to also have an Identity Management function. In fact, most systems these days have their own in-built Identity Management functions, which is fine and well, but this is the reason ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required