This document is aimed at Security and IT practitioners (especially architects) in end-user organisations who are responsible for implementing an enterprise-wide Identity and Access Management (IAM) system. It is neither a conceptual treatment of Identity (for which we would refer the reader to Kim Cameron's excellent work on the Laws of Identity) nor a detailed technical manual on a particular product. It describes a pragmatic and cost-effective architectural approach to implementing IAM within an organisation, based on the experience of the authors.
Our background and experience are largely with Java-based technologies, so Java shops would probably be best positioned to benefit from our suggestions, but we are sure these general principles can be suitably adapted to other technology platforms. As with any piece of unsolicited advice, the usual caveats apply. No guarantees or warranties are provided or implied. The reader is expected to apply commonsense and sound design judgement when developing a solution based on this approach.
Our background and experience are largely with Java-based technologies, so Java shops would probably be best positioned to benefit from our suggestions, but we are sure these general principles can be suitably adapted to other technology platforms. As with any piece of unsolicited advice, the usual caveats apply. No guarantees or warranties are provided or implied. The reader is expected to apply commonsense and sound design judgement when developing a solution based on this approach.
Title Identity Management on a Shoestring
Author(s) Ganesh Prasad, Umesh Rajbhandari
Publisher: InfoQ (Mar 19, 2012)
Language: English
ISBN-13: 987–1–105-55863-4
eBook: http://www.infoq.com/minibooks/Identity-Management-Shoestring
Author(s) Ganesh Prasad, Umesh Rajbhandari
Publisher: InfoQ (Mar 19, 2012)
Language: English
ISBN-13: 987–1–105-55863-4
eBook: http://www.infoq.com/minibooks/Identity-Management-Shoestring
No comments:
Post a Comment