
by Vittorio Bertocci, Garrett Serack , Caleb Baker 384 pages
Publisher: Addison-Wesley Professional; 1 book (January 6, 2008)
ISBN-10: 0321496841
ISBN-13: 978-0321496843
Windows CardSpace empowers organizations to forestall temperament burglary as well as evenly residence a extended spectrum of confidence as well as remoteness challenges. Understanding Windows CardSpaceis a initial insider’s beam to Windows CardSpace as well as a broader subject of temperament government for technical as well as commercial operation professionals. Drawing upon a authors’ forlorn knowledge warranted by operative with a CardSpace product group as well as by implementing state-of-the-art CardSpace-based systems during heading enterprises, it offers rare discernment in to a realities of temperament management: from formulation as well as pattern by deployment.
Part we introduces a elemental concepts of user-centered temperament management, explains a context in which Windows CardSpace operates, as well as reviews a problems CardSpace aims to solve. Next, a authors travel by CardSpace from a technical standpoint, describing a technologies, elements, artifacts, operations as well as growth practices, as well as make use of scenarios. Finally, they delicately examination a pattern as well as commercial operation considerations compared with architecting solutions formed upon CardSpace or any alternative user-centered temperament management
system. Coverage includes
The stipulations of stream approaches to authentication as well as temperament management
Detailed report upon modernized Web services
The Identity Metasystem, a laws of identity, as well as a preferred authentication system
Windows CardSpace: What it is, how it works, as well as how developers as well as managers can make use of it in their organizations
CardSpace technology: user experience, Information Cards, in isolation desktops, as well as formation with .NET 3.5 as well as Windows Vista
CardSpace implementation: from HTML formation by federation, Web services integration, as well as beyond
Adding personal label await to a website: a detailed, scenario-based explanation
Choosing or apropos an temperament provider: opportunities, commercial operation impacts, operational issues, as well as pitfalls to avoid
Using CardSpace to precedence certitude relations as well as strike phishing
Whether you’re a developer, confidence specialist, or commercial operation decision-maker, this book will answer your many consequential questions about temperament management, so we can strengthen all which matters: your people, your assets, your partners, as well as your customers.
Foreword xv
Preface xviii
Part we Setting a Context
Chapter 1: The Problem 3
The Advent of Profitable Digital Crime 4
Passwords: Ascent as well as Decline 29
The Babel of Cryptography 36
The Babel of Web User Interfaces 79
Summary 84
Chapter 2: Hints Toward a Solution 87
A World Without a Center 89
The Seven Laws of Identity 92
The Identity Metasystem 110
Trust 115
WS-* Web Services Specifications: The Reification of a Identity Metasystem 136
Presenting Windows CardSpace 161
Summary 164
Part II THE TECHNOLOGY
Chapter 3: Windows CardSpace 169
CardSpace Walkthroughs 169
Is CardSpace Just for Websites? 175
System Requirements 176
What CardSpace Provides 177
A Deeper Look during Information Cards 184
Features of a CardSpace UI 204
Common CardSpace Management Tasks 210
User Experience Changes in .NET Framework 3.5 218
Summary 221
Chapter 4: CardSpace Implementation 223
Using CardSpace in a Browser 224
Federation with CardSpace 248
CardSpace as well as Windows Communication Foundation 252
CardSpace Without Web Services 262
Summary 268
Chapter 5: Guidance for a Relying Party 269
Deciding to Be a Relying Party 270
Putting CardSpace to Work 274
Privacy as well as Liability 299
Summary 302
Part III PRACTICAL CONSIDERATIONS
Chapter 6: Identity Consumers 305
Common Misconceptions about Becoming an Identity Provider 306
Criteria for Selecting an Identity Provider 309
Relying upon an IP 315
Migration Issues 320
Summary 321
Chapter 7: Identity Providers 323
Uncovering a Rationale for Becoming an Identity Provider 324
What Does an Identity Provider Have to Offer? 334
Walking a Mile in a User’s Shoes 338
An Organization’s Identity 341
Summary 342
Index 343
No comments:
Post a Comment