Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanis...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1534 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1534 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-15342009-12-04T01:27:07Z Mechanics of User Identification and Authentication: Fundamentals of Identity Management Todorov, Dobromir User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario. USER IDENTIFICATION AND AUTHENTICATION CONCEPTS Security Landscape Authentication, Authorization, and Accounting Threats to User Identification and Authentication Rainbow Attacks Authentication Credentials Enterprise User Identification and Authentication Challenges Authenticating Access to Services and the Infrastructure Delegation and Impersonation Cryptology, Cryptography, and Cryptanalysis UNIX USER AUTHENTICATION ARCHITECTURE Users and Groups Simple User Credential Stores Name Services Switch (NSS) Pluggable Authentication Modules (PAM) The UNIX Authentication Process User Impersonation Case Study: User Authentication Against LDAP Case Study: Using Hesiod for User Authentication in Linux WINDOWS USER AUTHENTICATION ARCHITECTURE Security Principals Stand-Alone Authentication Windows Domain Authentication Federated Trusts Impersonation AUTHENTICATING ACCESS TO SERVICES AND APPLICATIONS Security Programming Interfaces Authentication Protocols Transport Layer Security (TLS) and Secure Sockets Layer (SSL) Telnet Authentication HTTP Authentication POP3/IMAP Authentication SMTP Authentication SSH Authentication Sun RPC Authentication SMB/CIFS Authentication NFS Authentication Microsoft Remote Procedure Calls MS SQL Authentication Oracle Database Server Authentication Oracle Legacy Authentication Database MS Exchange MAPI Authentication SAML, WS-Security, and Federated Identity AUTHENTICATING ACCESS TO THE INFRASTRUCTURE User Authentication on Cisco Routers and Switches Authenticating Remote Access to the Infrastructure Port-Based Access Control Authenticating Access to the Wireless Infrastructure IPSec, IKE, and VPN Client Authentication Centralized User Authentication APPENDICES References Lab Configuration Indices of Tables and Figures 2009-12-04T01:27:07Z 2009-12-04T01:27:07Z 2007 Book https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1534 en application/rar CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another?
Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works.
This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario. |
format |
Book |
author |
Todorov, Dobromir |
spellingShingle |
Todorov, Dobromir Mechanics of User Identification and Authentication: Fundamentals of Identity Management |
author_facet |
Todorov, Dobromir |
author_sort |
Todorov, Dobromir |
title |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management |
title_short |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management |
title_full |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management |
title_fullStr |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management |
title_full_unstemmed |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management |
title_sort |
mechanics of user identification and authentication: fundamentals of identity management |
publisher |
CRC Press |
publishDate |
2009 |
url |
https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1534 |
_version_ |
1819800996962893824 |