A Guide to Claims-Based Identity and Access Control (Paperback)
暫譯: 基於聲明的身份與存取控制指南 (平裝本)

Dominick Baier, Vittorio Bertocci, Keith Brown, Matias Woloski, Eugenio Pace

  • 出版商: MicroSoft
  • 出版日期: 2010-04-24
  • 售價: $1,360
  • 貴賓價: 9.5$1,292
  • 語言: 英文
  • 頁數: 196
  • 裝訂: Paperback
  • ISBN: 0735640599
  • ISBN-13: 9780735640597
  • 已過版

相關主題

商品描述

As systems have become interconnected and more complicated, programmers needed ways to identify parties across multiple computers. One way to do this was for the parties that used applications on one computer to authenticate to the applications (and/or operating systems) that ran on the other computers. This mechanism is still widely used-for example, when logging on to a great number of Web sites. However, this approach becomes unmanageable when you have many co-operating systems (as is the case, for example, in the enterprise). Therefore, specialized services were invented that would register and authenticate users, and subsequently provide claims about them to interested applications. Some well-known examples are NTLM, Kerberos, Public Key Infrastructure (PKI), and the Security Assertion Markup Language (SAML). Most enterprise applications need some basic user security features. At a minimum, they need to authenticate their users, and many also need to authorize access to certain features so that only privileged users can get to them. Some apps must go further and audit what the user does. On Windows®, these features are built into the operating system and are usually quite easy to integrate into an application. By taking advantage of Windows integrated authentication, you don't have to invent your own authentication protocol or manage a user database. By using access control lists (ACLs), impersonation, and features such as groups, you can implement authorization with very little code. Indeed, this advice applies no matter which OS you are using. It's almost always a better idea to integrate closely with the security features in your OS rather than reinventing those features yourself. But what happens when you want to extend reach to users who don't happen to have Windows accounts? What about users who aren't running Windows at all? More and more applications need this type of reach, which seems to fly in the face of traditional advice. This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or information technology (IT) professional who designs, builds, or operates Web applications and services that require identity information about their users.

商品描述(中文翻譯)

隨著系統變得互聯且更加複雜,程式設計師需要能夠在多台電腦之間識別各方的方法。實現這一點的一種方式是讓在一台電腦上使用應用程式的各方對運行在其他電腦上的應用程式(和/或操作系統)進行身份驗證。這種機制至今仍被廣泛使用,例如,在登錄大量網站時。然而,當有許多協作系統時(例如在企業中),這種方法變得難以管理。因此,發明了專門的服務來註冊和驗證用戶,並隨後向感興趣的應用程式提供有關他們的聲明。一些知名的例子包括 NTLM、Kerberos、公鑰基礎設施(PKI)和安全聲明標記語言(SAML)。大多數企業應用程式需要一些基本的用戶安全功能。至少,它們需要對用戶進行身份驗證,許多還需要授權對某些功能的訪問,以便只有特權用戶才能訪問這些功能。一些應用程式必須進一步審計用戶的行為。在 Windows® 上,這些功能內建於操作系統中,通常相對容易集成到應用程式中。通過利用 Windows 的集成身份驗證,您不必自己發明身份驗證協議或管理用戶數據庫。通過使用訪問控制列表(ACL)、模擬和群組等功能,您可以用非常少的代碼實現授權。事實上,這些建議無論您使用哪種操作系統都適用。與其自己重新發明這些功能,通常更好的做法是與操作系統中的安全功能緊密集成。但是,當您想要擴展到沒有 Windows 帳戶的用戶時會發生什麼?對於完全不運行 Windows 的用戶又該怎麼辦?越來越多的應用程式需要這種類型的擴展,這似乎與傳統建議相悖。本書提供足夠的信息,以便在您計劃新應用程式或對現有應用程式進行更改時評估基於聲明的身份作為可能的選擇。它適合任何設計、構建或運營需要用戶身份信息的 Web 應用程式和服務的架構師、開發人員或信息技術(IT)專業人員。

最後瀏覽商品 (20)