O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter we learned about the Adaptive Risk module, which allows us to craft authentication that changes depending on the risk profile of the access request. We looked at the different types of filters available, and configured the IP address one as an example. Finally we looked at some potential patterns, and raised a caution around introducing too much authentication burden to your users.

We’re now at the end of our book Open Source Identity Management Principles and Patterns using OpenAM 10.x. We learned to install OpenAM, configure it, created multiple instances of Tomcat, Apache, and authenticated against different data sources including Facebook.

OpenAM is professional enterprise quality software. The skills you’ve learned by ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required