Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software Book

ISBN: 1484226003

ISBN13: 9781484226001

Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Very Good

$6.19
Save $38.80!
List Price $44.99
Almost Gone, Only 2 Left!

You Might Also Enjoy

The Naturopathic Healing Handbook
The Naturopathic Healing Handbook
Michael Schwartz

from: $6.59

Michael's Genuine Food
Michael's Genuine Food
Michael Schwartz, JoAnn Cianciulli

from: $6.09

Health and Disease Symbology Handbook
Health and Disease Symbology Handbook
Michael Schwartz

from: $8.49

Genuine Pizza: Better Pizza at Home
Genuine Pizza: Better Pizza at Home
Michael Schwartz, Olga Massov

from: $11.39

Dream Symbology Dictionary
Dream Symbology Dictionary
Michael Schwartz

from: $7.39

War Without End: The Iraq War in Context
War Without End: The Iraq War in Context
Michael Schwartz

from: $6.69

Cuisine à Latina: Fresh Tastes and a World of Flavors from Michy's Miami Kitchen
Cuisine à Latina: Fresh Tastes and a World of Flavors from Michy's Miami Kitchen
Michelle Bernstein, Andrew Friedman

from: $6.19

Encyclopedia of Natural Medicine
Encyclopedia of Natural Medicine
Joseph E. Pizzorno, Michael T. Murray

from: $5.89

Pocket Guide to Naturopathic Medicine (The Crossing Press Pocket Series)
Pocket Guide to Naturopathic Medicine (The Crossing Press Pocket Series)
Judith Boice

from: $5.19

The Healing Herbs: The Ultimate Guide To The Curative Power Of Nature's Medicines
The Healing Herbs: The Ultimate Guide To The Curative Power Of Nature's Medicines
Michael Castleman, Michael Castleman

from: $5.29

Naturopathic Handbook of Herbal Formulas : A Concise Herbal Dispensatory and Therapeutic Repertory Guide
Naturopathic Handbook of Herbal Formulas : A Concise Herbal Dispensatory and Therapeutic Repertory Guide
Richard Scalzo

from: $4.89

The Green Pharmacy: New Discoveries in Herbal Remedies for Common Diseases and Conditions from the World's Foremost Authority on Healing Herbs
The Green Pharmacy: New Discoveries in Herbal Remedies for Common Diseases and Conditions from the World's Foremost Authority on Healing Herbs
James A. Duke

from: $4.39

Miette: Recipes from San Francisco's Most Charming Pastry Shop
Miette: Recipes from San Francisco's Most Charming Pastry Shop
Meg Ray, Frankie Frankeny, Leslie Jonath

from: $5.29

Southern Pies: A Gracious Plenty of Pie Recipes, From Lemon Chess to Chocolate Pecan
Southern Pies: A Gracious Plenty of Pie Recipes, From Lemon Chess to Chocolate Pecan
Nancie McDermott

from: $7.19

The Great Transformation
The Great Transformation
Karl Polanyi

from: $26.99

The Way of Herbs
The Way of Herbs
Michael Tierra

from: $7.69

Naturopathic Handbook of Herbal Formulas 4ED
Naturopathic Handbook of Herbal Formulas 4ED
Herbal Research Pub, Herbal Research Publications

from: $4.49

Southern Cakes: Sweet and Irresistible Recipes for Everyday Celebrations
Southern Cakes: Sweet and Irresistible Recipes for Everyday Celebrations
Nancie McDermott

from: $7.29

Radical Protest and Social Structure: The Southern Farmers' Alliance and Cotton Tenancy, 1880-1890
Radical Protest and Social Structure: The Southern Farmers' Alliance and Cotton Tenancy, 1880-1890
Michael Schwartz

Out of Stock

Book Overview

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack.

The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it's more valuable to prevent than to detect a security breach. That's why Identity and Access Management (IAM) is a critical component of an organization's security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as "suites" because IAM is not just one component. It's a number of components working together, including web, authentication, authorization, cryptographic, and persistence services.

Securing the Perimeter documents a recipe to take advantage of open standards to build an enterprise-class IAM service using free open source software. This recipe can be adapted to meet the needs of both small and large organizations. While not a comprehensive guide for every application, this book provides the key concepts and patterns to help administrators and developers leverage a central security infrastructure.

Cloud IAM service providers would have you believe that managing an IAM is too hard. Anything unfamiliar is hard, but with the right road map, it can be mastered. You may find SaaS identity solutions too rigid or too expensive. Or perhaps you don't like the idea of a third party holding the credentials of your users--the keys to your kingdom. Open source IAM provides an alternative. Take control of your IAM infrastructure if digital services are key to your organization's success.

What You'll Learn

Understand why you should deploy a centralized authentication and policy management infrastructure
Use the SAML or Open ID Standards for web or single sign-on, and OAuth for API Access ManagementSynchronize data from existing identity repositories such as Active Directory
Deploy two-factor authentication services

Who This Book Is For

Security architects (CISO, CSO), system engineers/administrators, and software developers

Customer Reviews

0 customer rating | 0 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured