Mechanics of User Identification and Authentication: Fundamentals of Identity Management

Front Cover
CRC Press, Jun 18, 2007 - Business & Economics - 760 pages
User identification and authentication are absolutely essential to modern security. Mechanics of User Identification and Authentication presents the general philosophy of user authentication and access control. Introducing key concepts, this text outlines the process of controlled access to resources through authentication, authorization, and accounting. It provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is presented with a specific authentication scenario.
 

Contents

Chapter 1 User Identification and Authentication Concepts
1
Chapter 2 UNIX User Authentication Architecture
65
Chapter 3 Windows User Authentication Architecture
139
Chapter 4 Authenticating Access to Services and Applications
301
Chapter 5 Authenticating Access to the Infrastructure
583
References
691
Lab Configuration
701
Indices of Tables and Figures
705
Index
713
Back cover
729
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page ii - The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Douglas J Landoll ISBN: 0-8493-2998-1 Strategic Information Security John Wylder ISBN...
Page ii - ISBN: 1-4200-5219-5 Practical Hacking Techniques and Countermeasures Mark D. Spivey ISBN: 0-8493-7057-4 Securing Converged IP Networks Tyson Macaulay ISBN: 0-8493-7580-0 The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Douglas J. Landoll ISBN: 0-8493-2998-1 Testing Code Security Maura A.
Page ii - Port-Based Authentication Edwin Lyle Brown ISBN: 1-4200-4464-8 Audit and Trace Log Management: Consolidation and Analysis Phillip Q. Maier ISBN: 0-8493-2725-3 The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile, Ron Collette and Thomas D. August ISBN: 0-8493-1 952-8 Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann ISBN: 0-8493-5402-1 Crisis Management Planning and Execution Edward S. Devlin...
Page ii - Arnason and Keith D. Willett ISBN: 0-8493-3648-1 Information Security: Design, Implementation, Measurement, and Compliance Timothy P. Layton ISBN: 0-8493-7087-6 Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Jan Killmeyer ISBN: 0-8493-1 549-2 Information Security Cost Management loana V. Bazavan and Ian Lim ISBN: 0-8493-9275-6 Information Security Fundamentals Thomas R. Peltier, Justin Peltier, and John A. Blackley ISBN: 0-8493-1 957-9 Information...

About the author (2007)

Dobromir Todorov

Bibliographic information