Mechanics of User Identification and Authentication: Fundamentals of Identity ManagementUser identification and authentication are absolutely essential to modern security. Mechanics of User Identification and Authentication presents the general philosophy of user authentication and access control. Introducing key concepts, this text outlines the process of controlled access to resources through authentication, authorization, and accounting. It provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is presented with a specific authentication scenario. |
Contents
1 | |
Chapter 2 UNIX User Authentication Architecture | 65 |
Chapter 3 Windows User Authentication Architecture | 139 |
Chapter 4 Authenticating Access to Services and Applications | 301 |
Chapter 5 Authenticating Access to the Infrastructure | 583 |
References | 691 |
Other editions - View all
Mechanics of User Identification and Authentication: Fundamentals of ... Dobromir Todorov No preview available - 2007 |
Common terms and phrases
Active Directory administrator algorithm allows application attacker Attribute authentication mechanism authentication protocol authorization bytes captured bytes on wire calculated called certificate challenge channel client command communication configuration connect contains continued created credentials database default defined domain controller Dst Port encryption Ethernet exchange field Figure forest Frame GSS-API hash host identifier identity IMAP implementations integrity Internet Protocol Kerberos layer LDAP Length logon Manager method Microsoft mode negotiate NTLM objects operating system option packet parameters parties password password hashes perform plaintext privileges protection Protocol public key RADIUS reply request Response result secret sends server session session key signing specific Src Port stored string Table ticket token trust Type typically user account user authentication user password username Value Version
Popular passages
Page ii - The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Douglas J Landoll ISBN: 0-8493-2998-1 Strategic Information Security John Wylder ISBN...
Page ii - ISBN: 1-4200-5219-5 Practical Hacking Techniques and Countermeasures Mark D. Spivey ISBN: 0-8493-7057-4 Securing Converged IP Networks Tyson Macaulay ISBN: 0-8493-7580-0 The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Douglas J. Landoll ISBN: 0-8493-2998-1 Testing Code Security Maura A.
Page ii - Port-Based Authentication Edwin Lyle Brown ISBN: 1-4200-4464-8 Audit and Trace Log Management: Consolidation and Analysis Phillip Q. Maier ISBN: 0-8493-2725-3 The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile, Ron Collette and Thomas D. August ISBN: 0-8493-1 952-8 Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann ISBN: 0-8493-5402-1 Crisis Management Planning and Execution Edward S. Devlin...
Page ii - Arnason and Keith D. Willett ISBN: 0-8493-3648-1 Information Security: Design, Implementation, Measurement, and Compliance Timothy P. Layton ISBN: 0-8493-7087-6 Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Jan Killmeyer ISBN: 0-8493-1 549-2 Information Security Cost Management loana V. Bazavan and Ian Lim ISBN: 0-8493-9275-6 Information Security Fundamentals Thomas R. Peltier, Justin Peltier, and John A. Blackley ISBN: 0-8493-1 957-9 Information...