Enterprise Directory and Security Implementation Guide

Enterprise Directory and Security Implementation Guide

4.11 - 1251 ratings - Source

The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential qhackers.q If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with qbest practicesq on directory architecture, implementation, and enterprise security strategies.When the user attempts to access a resource on the network, like the Web server, the plug-in will log on to the requested resource with the proper credentials for that resources. ... Kerberos is a network authentication system targeted for use on physically insecure networks. ... secure communication Network FIGURE 10.4 Single Sign-on Solution 444 4 4 2 CHAPTER 10 a€c Enterprise Security Scenarios 165.

Title:Enterprise Directory and Security Implementation Guide
Author:Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper
Publisher:Academic Press - 2002-09-08


You Must CONTINUE and create a free account to access unlimited downloads & streaming