Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
14Activity

Table Of Contents

Single sign-on
Password
2D Key
ATM SafetyPIN software
Canonical account
Challenge-Handshake Authentication Protocol
Challenge-response authentication
Cognitive password
Default password
Diceware
Draw a Secret
Duress code
LM hash
Munged password
One-time password
OpenID
OTPW
Partial Password
Passmap
PassPattern system
Passphrase
Password authentication protocol
Password cracking
Password fatigue
Password length parameter
Password management
Password manager
Password notification e-mail
Password policy
Password strength
Password synchronization
Password-authenticated key agreement
PBKDF2
Personal identification number
Pre-shared key
Privileged password management
Random password generator
Risk-based authentication
S/KEY
Secure Password Authentication
Secure Remote Password protocol
SecurID
Self-service password reset
Shadow password
Swordfish (password)
Windows credentials
Zero-knowledge password proof
Federated identity
Federated identity management
Federation Identity Management
Apple ID
Athens (access and identity management service)
CoSign single sign on
Credential Service Provider
Crowd (software)
Digital identity
E-Authentication
Enterprise Sign On Engine
EZproxy
Facebook Platform
Google Account
Higgins project
Identity Governance Framework
Identity metasystem
Information Card
Information Card Foundation
the Information Card Foundation
Janrain
JOSSO
Light-Weight Identity
OpenAM
OpenSSO
Point of Access for Providers of Information
Pubcookie
Shibboleth (Internet2)
Sun Java System Access Manager
Ubuntu Single Sign On
Windows CardSpace
Windows Live ID
Yadis
Access control list
Access Control Matrix
Atomic authorization
Authentication
Authorization
Bell–LaPadula model
Closed-loop authentication
Comparison of privilege authorization features
Computational trust
Context-based access control
Copy protection
Cryptographic log on
DACL
Database audit
DataLock Technology
Delegated administration
Delegation of Control
Digipass
Directory service
Discretionary access control
Distributed Access Control System
EAuthentication
Form-based authentication
Global Trust Council
HERAS-AF
HTTP cookie
HTTP+HTML form-based authentication
IBM Lightweight Third-Party Authentication
IBM Tivoli Access Manager
Identity Assertion Provider
Identity driven networking
Initiative For Open Authentication
Integrated Windows Authentication
Internet Authentication Service
Java Authentication and Authorization Service
Location-based authentication
Logical access control
Login
LOMAC
Mandatory access control
MicroID
Microsoft Fingerprint Reader
Mobilegov
Multi-factor authentication
True multi-factor authentication
Mutual authentication
NemID
NIST RBAC model
OAuth
Object-capability model
One-time authorization code
Organisation-based access control
PassWindow
Pre-boot authentication
Registered user
Restricting Access to Databases
Richacls
Role hierarchy
Rootkit
Salute picture
Secure attention key
Security Assertion Markup Language
Security question
Security store
Security token
SiteKey
Software token
Spring Security
Strong authentication
Subscriber Identity Module
Time-based One-time Password Algorithm
Transaction authentication
Transaction authentication number
Two-factor authentication
Universal controls
Article Sources and Contributors
Image Sources, Licenses and Contributors
P. 1
Single sign-on (SSO): High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Single sign-on (SSO): High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

Ratings:

5.0

(1)
|Views: 2,624 |Likes:
Published by Emereo Publishing
Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Single sign-off is the reverse property whereby a single action of signing out terminates access to multiple software systems.

As different applications and resources support different authentication mechanisms, single sign-on has to internally translate to and store different credentials compared to what is used for initial authentication.

This book is your ultimate resource for Single sign-on (SSO). Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Single sign-on (SSO) right away, covering: Single sign-on, Password, 1dl, 2D Key, ATM SafetyPIN software, Canonical account, Challenge-Handshake Authentication Protocol, Challenge-response authentication, Cognitive password, Default password, Diceware, Draw a Secret, Duress code, LM hash, Munged password, One-time password, OpenID, OTPW, Partial Password, Passmap, PassPattern system, Passphrase, Password authentication protocol, Password cracking, Password fatigue, Password length parameter, Password management, Password manager, Password notification e-mail, Password policy, Password strength, Password synchronization, Password-authenticated key agreement, PBKDF2, Personal identification number, Pre-shared key, Privileged password management, Random password generator, Risk-based authentication, S/KEY, Secure Password Authentication, Secure Remote Password protocol, SecurID, Self-service password reset, Shadow password, Swordfish (password), Windows credentials, Zero-knowledge password proof, Federated identity, Federated identity management, Apple ID, Athens (access and identity management service), CoSign single sign on, Credential Service Provider, Crowd (software), Digital identity, E-Authentication, Enterprise Sign On Engine, EZproxy, Facebook Platform, Google Account, Higgins project, Identity Governance Framework, Identity metasystem, Information Card, Information Card Foundation, Janrain, JOSSO, Light-Weight Identity, Novell Access Manager, OneLogin, OpenAM, OpenSSO, Point of Access for Providers of Information, Pubcookie, Shibboleth (Internet2), Sun Java System Access Manager, Ubuntu Single Sign On, Windows CardSpace, Windows Live ID, Yadis, Access control list, Access Control Matrix, Atomic authorization, Authentication, Authorization, Bell–LaPadula model, Closed-loop authentication, Comparison of privilege authorization features, Computational trust, Context-based access control, Copy protection, Cryptographic log on, DACL, Database audit, DataLock Technology, Delegated administration, Delegation of Control, Digipass, Directory service, Discretionary access control, Distributed Access Control System, EAuthentication, Form-based authentication, Global Trust Council, HERAS-AF, HTTP cookie, HTTP+HTML form-based authentication, IBM Lightweight Third-Party Authentication, IBM Tivoli Access Manager, Identity Assertion Provider, Identity driven networking, Initiative For Open Authentication, Integrated Windows Authentication, Internet Authentication Service, Java Authentication and Authorization Service, Location-based authentication, Logical access control, Login, LOMAC, Mandatory access control, MicroID, Microsoft Fingerprint Reader, Mobilegov, Multi-factor authentication, Mutual authentication, NemID, NIST RBAC model, OAuth, Object-capability model...and much more.

This book explains in-depth the real drivers and workings of Single sign-on (SSO). It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Single sign-on (SSO) with the objectivity of experienced professionals.
Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Single sign-off is the reverse property whereby a single action of signing out terminates access to multiple software systems.

As different applications and resources support different authentication mechanisms, single sign-on has to internally translate to and store different credentials compared to what is used for initial authentication.

This book is your ultimate resource for Single sign-on (SSO). Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Single sign-on (SSO) right away, covering: Single sign-on, Password, 1dl, 2D Key, ATM SafetyPIN software, Canonical account, Challenge-Handshake Authentication Protocol, Challenge-response authentication, Cognitive password, Default password, Diceware, Draw a Secret, Duress code, LM hash, Munged password, One-time password, OpenID, OTPW, Partial Password, Passmap, PassPattern system, Passphrase, Password authentication protocol, Password cracking, Password fatigue, Password length parameter, Password management, Password manager, Password notification e-mail, Password policy, Password strength, Password synchronization, Password-authenticated key agreement, PBKDF2, Personal identification number, Pre-shared key, Privileged password management, Random password generator, Risk-based authentication, S/KEY, Secure Password Authentication, Secure Remote Password protocol, SecurID, Self-service password reset, Shadow password, Swordfish (password), Windows credentials, Zero-knowledge password proof, Federated identity, Federated identity management, Apple ID, Athens (access and identity management service), CoSign single sign on, Credential Service Provider, Crowd (software), Digital identity, E-Authentication, Enterprise Sign On Engine, EZproxy, Facebook Platform, Google Account, Higgins project, Identity Governance Framework, Identity metasystem, Information Card, Information Card Foundation, Janrain, JOSSO, Light-Weight Identity, Novell Access Manager, OneLogin, OpenAM, OpenSSO, Point of Access for Providers of Information, Pubcookie, Shibboleth (Internet2), Sun Java System Access Manager, Ubuntu Single Sign On, Windows CardSpace, Windows Live ID, Yadis, Access control list, Access Control Matrix, Atomic authorization, Authentication, Authorization, Bell–LaPadula model, Closed-loop authentication, Comparison of privilege authorization features, Computational trust, Context-based access control, Copy protection, Cryptographic log on, DACL, Database audit, DataLock Technology, Delegated administration, Delegation of Control, Digipass, Directory service, Discretionary access control, Distributed Access Control System, EAuthentication, Form-based authentication, Global Trust Council, HERAS-AF, HTTP cookie, HTTP+HTML form-based authentication, IBM Lightweight Third-Party Authentication, IBM Tivoli Access Manager, Identity Assertion Provider, Identity driven networking, Initiative For Open Authentication, Integrated Windows Authentication, Internet Authentication Service, Java Authentication and Authorization Service, Location-based authentication, Logical access control, Login, LOMAC, Mandatory access control, MicroID, Microsoft Fingerprint Reader, Mobilegov, Multi-factor authentication, Mutual authentication, NemID, NIST RBAC model, OAuth, Object-capability model...and much more.

This book explains in-depth the real drivers and workings of Single sign-on (SSO). It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Single sign-on (SSO) with the objectivity of experienced professionals.

More info:

Published by: Emereo Publishing on Aug 02, 2011
Copyright:Traditional Copyright: All rights reserved
List Price: $39.95

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
This book can be read on up to 6 mobile devices.
Full version available to subscribers
See more
See less

04/05/2014

You're Reading a Free Preview
Pages 4 to 158 are not shown in this preview.
You're Reading a Free Preview
Pages 162 to 195 are not shown in this preview.
You're Reading a Free Preview
Pages 199 to 237 are not shown in this preview.
You're Reading a Free Preview
Pages 241 to 242 are not shown in this preview.
You're Reading a Free Preview
Pages 246 to 367 are not shown in this preview.

Activity (14)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Francisco Jelves liked this
kausar_suleman_1 liked this
Rados Kovac added this note
this paper looks interesting on first look...looking forward to get more into it
Chu Nguyen liked this
Manuel Sandoval liked this
Sashi Kanth T liked this

You're Reading a Free Preview

Download