Security Assertion Markup Language (Saml)

Overview

Security Assertion Markup Language (SAML) is an XML-based open standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions).

This book is your ultimate resource for Security Assertion Markup Language (SAML). Here you will find the most up-to-date information, analysis, background and everything you need ...

See more details below
Other sellers (Paperback)
  • All (2) from $57.82   
  • New (1) from $57.82   
  • Used (1) from $57.82   
Sending request ...

More About This Book

Overview

Security Assertion Markup Language (SAML) is an XML-based open standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions).

This book is your ultimate resource for Security Assertion Markup Language (SAML). Here you will find the most up-to-date information, analysis, background and everything you need to know.

In easy to read chapters, with extensive references and links to get you to know all there is to know about Security Assertion Markup Language (SAML) right away, covering: Security Assertion Markup Language, Access control list, Access Control Matrix, Atomic authorization, Authentication, Authorization, Bell-LaPadula model, Closed-loop authentication, Comparison of privilege authorization features, Computational trust, Context-based access control, Copy protection, Cryptographic log on, DACL, Database audit, DataLock Technology, Delegated administration, Delegation of Control, Digipass, Digital identity, Directory service, Discretionary access control, Distributed Access Control System, Draw a Secret, EAuthentication, Federated identity, Federated identity management, Form-based authentication, Global Trust Council, HERAS-AF, HTTP cookie, HTTP+HTML form-based authentication, IBM Lightweight Third-Party Authentication, IBM Tivoli Access Manager, Identity Assertion Provider, Identity driven networking, Initiative For Open Authentication, Integrated Windows Authentication, Internet Authentication Service, Java Authentication and Authorization Service, Location-based authentication, Logical access control, Login, LOMAC, Mandatory access control, MicroID, Microsoft Fingerprint Reader, Mobilegov, Multi-factor authentication, Mutual authentication, NemID, NIST RBAC model, OAuth, Object-capability model, One-time authorization code, One-time password, Organisation-based access control, PassWindow, Pre-boot authentication, Registered user, Restricting Access to Databases, Richacls, Risk-based authentication, Role hierarchy, Rootkit, Salute picture, Secure attention key, Security question, Security store, Security token, Single sign-on, SiteKey, Software token, Spring Security, Strong authentication, Subscriber Identity Module, Time-based One-time Password Algorithm, Transaction authentication, Transaction authentication number, Tripcode, TUPAS, Two-factor authentication, Universal controls, Vidoop, Voms, Wilmagate, Windows credentials, ADL Registry, Advanced Distributed Learning, AppML, AS4, Atom (standard), Attention Profiling Mark-up Language, Auto-lead Data Format, Binary Format Description language, BlogML, BPEL script, BPEL4People, Business Process Execution Language, Call Control eXtensible Markup Language, Canonical XML, CellML, Channel Definition Format, CityGML, COLLADA, Common Alerting Protocol, Consegi declaration, Content Assembly Mechanism, Content Management Interoperability Services, Context management, Continuous Media Markup Language, CXML, DAISY Digital Talking Book, Darwin Information Typing Architecture, DGML, DicML, Digital Item Declaration Language, Digital Signature Services, Directory Services Markup Language, DisplayML, DITA Open Toolkit, Document Definition Markup Language, Document Object Model, Document Schema Definition Languages, Document Structure Description, Document Type Declaration, Document Type Definition, EbXML, EbXML Messaging Services, EbXML RegRep, Election Markup Language, Embedded RDF, EMML, EMML (Motorola), Emotion Markup Language, Enterprise Privacy Authorization Language, EventsML-G2, EXSLT...and much more

This book explains in-depth the real drivers and workings of Security Assertion Markup Language (SAML). It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Security Assertion Markup Language (SAML) with the objectivity of experienced professionals.

Read More Show Less

Product Details

  • ISBN-13: 9781743046258
  • Publisher: Emereo Pty Ltd
  • Publication date: 6/17/2011
  • Pages: 834
  • Sales rank: 651,838
  • Product dimensions: 8.27 (w) x 11.69 (h) x 1.65 (d)

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)