Open Source Identity Management Patterns and Practices Using OpenAM 10.x


Open Source Identity Management Patterns and Practices Using OpenAM 10.x
eBook: $14.99
Formats: PDF, PacktLib, ePub and Mobi formats
$12.74
save 15%!
Print + free eBook + free PacktLib access to the book: $49.98    Print cover: $34.99
$34.99
save 30%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Overview
Table of Contents
Author
Support
Sample Chapters
  • Learn patterns, practices, and the terminology of Identity Management
  • Learn how to install OpenAM 10.x
  • Protect web and application servers using policy agents
  • Protect applications using the Security Assertion Markup Language (SAML)
  • Integrated OAuth 2 logins like Facebook with OpenAM protected applications

Book Details

Language : English
Paperback : 116 pages [ 235mm x 191mm ]
Release Date : August 2013
ISBN : 1782166823
ISBN 13 : 9781782166825
Author(s) : Waylon Kenning
Topics and Technologies : All Books, Application Development, Open Source, Oracle


Table of Contents

Preface
Chapter 1: Identity Management Patterns and Principles
Chapter 2: Installing OpenAM 10.x
Chapter 3: Cross-Domain Single Sign On
Chapter 4: Distributed Authentication
Chapter 5: Application Authentication with Fedlets
Chapter 6: Implementing SAML2 Federation Patterns
Chapter 7: OAuth Authentication
Chapter 8: Two Factor Authentication
Chapter 9: Adaptive Risk Authentication
Index
  • Chapter 1: Identity Management Patterns and Principles
    • Defining Identity Management
      • How claims relate to identity
      • Understanding identity contexts
    • Why Identity Management is important?
      • Examples of identity levels
        • Pseudonymous identities
        • Trusted identities
        • Trusted identities with multiple contexts
        • Federated identities
    • How Identity Management works
    • Key components of Identity Management
      • Identity Service Providers
      • Identity policy agents
      • Identity providers
      • Identity data stores
      • Identity managers
    • Summary
  • Chapter 2: Installing OpenAM 10.x
    • Downloading OpenAM 10.x
    • Prerequisites for OpenAM
      • Creating a fully qualified domain name
      • Installing the Java Runtime Environment
      • Downloading the Tomcat application server
      • Configuring Tomcat for OpenAM
    • Installing OpenAM 10.1.0
    • Summary
  • Chapter 3: Cross-Domain Single Sign On
    • An introduction to Cross-Domain Single Sign On
    • Securing an Apache 2.4 local domain website
      • Creating an Apache Policy Agent profile in OpenAM
      • Securing Apache with the OpenAM Policy Agent
    • Securing a Tomcat 6 remote domain website
      • Configuring Tomcat and creating a Tomcat Policy Agent profile
      • Securing Tomcat with the OpenAM Policy Agent
      • Configuring a Tomcat Agent profile for Cross-Domain Single Sign On
    • Summary
  • Chapter 4: Distributed Authentication
    • Understanding distributed authentication
      • How policy agents communicate with OpenAM
      • Understanding defense-in-depth architectures
    • Preparing OpenAM for distributed authentication
    • Configuring the distributed authentication application server
    • Configuring the distributed authentication application
    • Testing distributed authentication
    • Summary
  • Chapter 5: Application Authentication with Fedlets
    • Understanding Fedlets
      • Advantages of Fedlets over policy agents
      • Disadvantages of Fedlets over policy agents
    • Configuring the Fedlet application server
    • Creating a SAML hosted identity provider
    • Creating a Fedlet
    • Deploying Fedlet.zip onto our Java application server
    • Validating the Fedlet setup
    • More information about Fedlets
    • Summary
  • Chapter 6: Implementing SAML2 Federation Patterns
    • Understanding SAML
      • Understanding Identity Providers
      • Understanding Service Providers
      • Understanding a Circle of Trust
    • Configuring OpenAM as a SAML Identity Provider
    • Installing SimpleSAMLphp
    • Configuring SimpleSAMLphp as a Service Provider
    • Configuring OpenAM to trust a SimpleSAMLphp SP
    • Testing our SAML Circle of Trust
    • Summary
  • Chapter 7: OAuth Authentication
    • Understanding OAuth
    • Preparing Facebook as an OAuth Provider
    • Configuring an OAuth authentication module
    • Configuring Authentication Chaining
    • Testing our OAuth Client against Facebook as an OAuth Provider
    • Summary
  • Chapter 8: Two Factor Authentication
    • Understanding two factor authentication
    • Understanding OATH and how it relates to OpenAM
    • Configuring OpenAM for two factor authentication
      • Configuring OpenAM to use additional LDAP attributes
      • Installing an OATH HOTP token generator
      • Populating our LDAP attributes with values
      • Configuring the OATH authentication module
    • Testing two factor authentication
    • Summary
  • Chapter 9: Adaptive Risk Authentication
    • Understanding Adaptive Risk authentication
    • Understanding how Adaptive Risk authentication works
    • Adding the Adaptive Risk module
    • Configuring the Adaptive Risk module
    • Adding adaptive risk to the authentication chain
    • Potential authentication patterns
    • Summary

Waylon Kenning

Waylon Kenning is an Enterprise and Solutions Architect for a large Australasian utility company with an interest in Identity Management. He currently evaluates technologies and their applicability within large corporate organizations.

He has worked on one of the largest identity management projects in New Zealand based on Sun Access Manager, which evolved into OpenAM. He is currently writing a book on Practical Enterprise Architecture.

Sorry, we don't have any reviews for this title yet.

Submit Errata

Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.

Sample chapters

You can view our sample chapters and prefaces of this title on PacktLib or download sample chapters in PDF format.

Frequently bought together

Open Source Identity Management Patterns and Practices Using OpenAM 10.x +    WordPress 2.8 Themes Cookbook =
50% Off
the second eBook
Price for both: $27.90

Buy both these recommended eBooks together and get 50% off the cheapest eBook.

What you will learn from this book

  • Understand Identity Management principles
  • Install OpenAM 10.x
  • Install policy agents against Apache Web Server and Tomcat Servlet Container
  • Implement cross-domain authentication
  • Implement distributed authentication using DMZs
  • Deploy Java application authentication quickly using Fedlets
  • Understand the federation of applications to OpenAM using SAML
  • Integrate to cloud-based identity providers using OAuth 2.0
  • Configure two-factor authentication
  • Implement entitlements with REST and XACML

In Detail

OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. It also provides the foundation for integrating diverse web applications that might typically operate against a disparate set of identity repositories and that are hosted on a variety of platforms such as web application servers.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x is a condensed, practical guide on installing OpenAM to protect your web applications. This book will teach you how to integrate to different identity sources such as Active Directory or Facebook using two-factor authentications.

Open Source Identity Management Patterns and Practices Using OpenAM 10.x looks at Identity Management and how to implement it using OpenAM 10.x. It specifically focuses on providing authentication to your web application using either a local identity source or a cloud-based identity source, so you don’t have to worry about authentication in your application.

You will learn how to install OpenAM, and then how to install policy agents against your web and application servers to do authentication. In addition, we’ll focus on integrating to applications directly using SAML, either through the use of a small preconfigured application, or through a third-party SAML library. Finally, we’ll focus on integrating to cloud identity providers using OAuth 2.0 and utilizing two-factor authentication.

If you want a scalable robust identity management infrastructure, Open Source Identity Management Principles and Patterns Using OpenAM 10.x will get you up and running in the least amount of time possible.

Approach

This is a Packt Mini in a tutorial format that provides multiple examples on Identity Management using OpenAM 10.x.

Who this book is for

Open Source Identity Management Patterns and Practices Using OpenAM 10.x is great for developers and architects who are new to Identity Management, and who want a brief overview of what’s possible and how to quickly implement a prototype. It’s assumed that you’ve had experience with web applications and some knowledge of Apache and Tomcat.

Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software