Applied Oracle Security: Developing Secure Database and Middleware Environments- P41

Applied Oracle Security: Developing Secure Database and Middleware Environments- P41:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | 374 Part III Identity Management Oracle Directory Management LDAP OID OVD Meta-directory Visualization OID OVD Data storage OID FIGURE 8-7 Oracle Directory Management r offers the virtualization within Oracle Virtual Directory OVD . OVD offers any LDAP clients the ability to query a single LDAP proxy to query many physical LDAP and non-LDAP identity repositories. The technique of directory virtualization is being rapidly adopted over synchronization and meta-directory techniques since it does not require information to be physically synchronized between servers and so results in a cheaper and faster approach to identity data integration. Oracle Directory Management architecture is shown in Figure 8-7. NOTE Chapter 9 discusses the Oracle Directory Management story in more detail and shows how you can apply OID and OVD together and independently to solve the basic challenges of creating a central logical location for accessing identity information related to any user in your enterprise. Authentication Management Authentication management is a category of solutions for identifying and verifying a user s identity. The tactics for the identification process can vary widely but they always focus on proving that a user is who he or she claims to be. Authentication management does not try to solve the issue of verifying authorizations which is a separate category altogether. The following types of solutions are included in this category Single sign-on SSO The ability to reuse an authenticated session in more than one application. Enterprise single sign-on ESSO The ability to integrate an operating system-level authentication or a thick desktop client s authentication with that of your web SSO. Chapter 8 Architecting Identity Management 375 Authentication Management SSO Oracle Access Manager eSSO Oracle eSSO Strong Authentication Federation Database Authentication Oracle Adaptive Access Manager Oracle Identity Federation Enterprise User Security FIGURE 8-8 Authentication .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.