Mechanics of User Identification and Authentication: Fundamentals of Identity Management

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanis...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Todorov, Dobromir
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1534
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1534
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-15342009-12-04T01:27:07Z Mechanics of User Identification and Authentication: Fundamentals of Identity Management Todorov, Dobromir User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario. USER IDENTIFICATION AND AUTHENTICATION CONCEPTS Security Landscape Authentication, Authorization, and Accounting Threats to User Identification and Authentication Rainbow Attacks Authentication Credentials Enterprise User Identification and Authentication Challenges Authenticating Access to Services and the Infrastructure Delegation and Impersonation Cryptology, Cryptography, and Cryptanalysis UNIX USER AUTHENTICATION ARCHITECTURE Users and Groups Simple User Credential Stores Name Services Switch (NSS) Pluggable Authentication Modules (PAM) The UNIX Authentication Process User Impersonation Case Study: User Authentication Against LDAP Case Study: Using Hesiod for User Authentication in Linux WINDOWS USER AUTHENTICATION ARCHITECTURE Security Principals Stand-Alone Authentication Windows Domain Authentication Federated Trusts Impersonation AUTHENTICATING ACCESS TO SERVICES AND APPLICATIONS Security Programming Interfaces Authentication Protocols Transport Layer Security (TLS) and Secure Sockets Layer (SSL) Telnet Authentication HTTP Authentication POP3/IMAP Authentication SMTP Authentication SSH Authentication Sun RPC Authentication SMB/CIFS Authentication NFS Authentication Microsoft Remote Procedure Calls MS SQL Authentication Oracle Database Server Authentication Oracle Legacy Authentication Database MS Exchange MAPI Authentication SAML, WS-Security, and Federated Identity AUTHENTICATING ACCESS TO THE INFRASTRUCTURE User Authentication on Cisco Routers and Switches Authenticating Remote Access to the Infrastructure Port-Based Access Control Authenticating Access to the Wireless Infrastructure IPSec, IKE, and VPN Client Authentication Centralized User Authentication APPENDICES References Lab Configuration Indices of Tables and Figures 2009-12-04T01:27:07Z 2009-12-04T01:27:07Z 2007 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1534 en application/rar CRC Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.
format Book
author Todorov, Dobromir
spellingShingle Todorov, Dobromir
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
author_facet Todorov, Dobromir
author_sort Todorov, Dobromir
title Mechanics of User Identification and Authentication: Fundamentals of Identity Management
title_short Mechanics of User Identification and Authentication: Fundamentals of Identity Management
title_full Mechanics of User Identification and Authentication: Fundamentals of Identity Management
title_fullStr Mechanics of User Identification and Authentication: Fundamentals of Identity Management
title_full_unstemmed Mechanics of User Identification and Authentication: Fundamentals of Identity Management
title_sort mechanics of user identification and authentication: fundamentals of identity management
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1534
_version_ 1757665647847800832