Todorov | Mechanics of User Identification and Authentication | E-Book | sack.de
E-Book

E-Book, Englisch, 760 Seiten

Todorov Mechanics of User Identification and Authentication

Fundamentals of Identity Management
Erscheinungsjahr 2012
ISBN: 978-1-4200-5220-6
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Fundamentals of Identity Management

E-Book, Englisch, 760 Seiten

ISBN: 978-1-4200-5220-6
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another?

Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works.

This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.

Todorov Mechanics of User Identification and Authentication jetzt bestellen!

Zielgruppe


IT security architects, CISOs, and IT security consultants, CFOs.


Autoren/Hrsg.


Weitere Infos & Material


USER IDENTIFICATION AND AUTHENTICATION CONCEPTS
Security Landscape
Authentication, Authorization, and Accounting
Threats to User Identification and Authentication Rainbow Attacks
Authentication Credentials
Enterprise User Identification and Authentication Challenges
Authenticating Access to Services and the Infrastructure
Delegation and Impersonation
Cryptology, Cryptography, and Cryptanalysis

UNIX USER AUTHENTICATION ARCHITECTURE
Users and Groups
Simple User Credential Stores
Name Services Switch (NSS)
Pluggable Authentication Modules (PAM)
The UNIX Authentication Process
User Impersonation
Case Study: User Authentication Against LDAP
Case Study: Using Hesiod for User Authentication in Linux

WINDOWS USER AUTHENTICATION ARCHITECTURE
Security Principals
Stand-Alone Authentication
Windows Domain Authentication
Federated Trusts
Impersonation

AUTHENTICATING ACCESS TO SERVICES AND APPLICATIONS
Security Programming Interfaces
Authentication Protocols
Transport Layer Security (TLS) and Secure Sockets Layer (SSL)
Telnet Authentication
HTTP Authentication
POP3/IMAP Authentication
SMTP Authentication
SSH Authentication
Sun RPC Authentication
SMB/CIFS Authentication
NFS Authentication
Microsoft Remote Procedure Calls
MS SQL Authentication
Oracle Database Server Authentication
Oracle Legacy Authentication Database
MS Exchange MAPI Authentication
SAML, WS-Security, and Federated Identity

AUTHENTICATING ACCESS TO THE INFRASTRUCTURE
User Authentication on Cisco Routers and Switches
Authenticating Remote Access to the Infrastructure
Port-Based Access Control
Authenticating Access to the Wireless Infrastructure
IPSec, IKE, and VPN Client Authentication
Centralized User Authentication

APPENDICES
References
Lab Configuration
Indices of Tables and Figures



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.