The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential qhackers.q If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with qbest practicesq on directory architecture, implementation, and enterprise security strategies.When the user attempts to access a resource on the network, like the Web server, the plug-in will log on to the requested resource with the proper credentials for that resources. ... Kerberos is a network authentication system targeted for use on physically insecure networks. ... secure communication Network FIGURE 10.4 Single Sign-on Solution 444 4 4 2 CHAPTER 10 ac Enterprise Security Scenarios 165.
|Title||:||Enterprise Directory and Security Implementation Guide|
|Author||:||Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper|
|Publisher||:||Academic Press - 2002-09-08|