Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario is popular PDF and ePub book, written by Gilles Rubens Badouet in 2013-10-16, it is a fantastic choice for those who relish reading online the Uncategoriezed genre. Let's immerse ourselves in this engaging Uncategoriezed book by exploring the summary and details provided below. Remember, Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario can be Read Online from any device for your convenience.

Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario Book PDF Summary

This work titled ‘Investigation and implementation of Shibboleth SSO mechanism through a case scenario’ presents, discusses, describes and explains the major aspects and concepts of Shibboleth protocol and provides two related prototypes implementations of the protocol within a set of chosen tools and environments. The implementation relies on the project client specifications and recommendations and therefore follows some imposed deployment infrastructures. The work report first focuses on the research investigation in Shibboleth concepts, its relationship with similar mechanisms and its particularities in the Single Sign On mechanism alongside with its federation principles. It also emphasizes on the SAML (Security Assertion Mark-up Language), the protocol that Shibboleth implements and on which it relies. The second major part of this report describes step by step the installation, deployment and configurations of Shibboleth in working prototypes within Windows based Operating Systems. The primary prototype implementation is a sort of initial deployment carried out within a self-defined ad-hoc environment helping to implement the second prototype. Considered in this project as the real time prototype as it has been conducted within the client premises, the second prototype has some similar steps of the primary implementation and is much more complete in terms of applications integrations and the Shibboleth log out mechanism. It also focuses more on the client specifications. The end of this real time prototype provides the integration strategy of 247lib.com/247libDE application. A testing approach is then provided to demonstrate how successful sample of simple applications have been integrated into the implementation. The test illustrates with details description the main use case scenario of authentication through the Shibboleth based single sign on mechanism. The appendix part of this report and the CD bound to the report include the configuration files of the project implementation, the testing data and other project details. The project report finally discusses the encountered risks and issues faced throughout the project progress alongside with a critical appraisal and recommendations for future works.

Detail Book of Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario PDF

Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario
  • Author : Gilles Rubens Badouet
  • Release : 16 October 2013
  • Publisher : Gilles Rubens Badouet
  • ISBN : 978186723xxxx
  • Genre : Uncategoriezed
  • Total Page : 183 pages
  • Language : English
  • PDF File Size : 11,6 Mb

If you're still pondering over how to secure a PDF or EPUB version of the book Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario by Gilles Rubens Badouet, don't worry! All you have to do is click the 'Get Book' buttons below to kick off your Download or Read Online journey. Just a friendly reminder: we don't upload or host the files ourselves.

Get Book

Emerging Directions in Embedded and Ubiquitous Computing

Emerging Directions in Embedded and Ubiquitous Computing Author : Mieso Denko,Chi-Sheng Shih,Kuan-Ching Li,Shiao-Li Tsao,Qing-An Zeng,Soo-Hyun Park,Young-Bae Ko,Shih-Hao Hung,Jong Hyuk Park
Publisher : Springer
File Size : 53,8 Mb
Get Book
This book constitutes the refereed proceedings of the EUC 2007 workshops held in conjunction with th...

Virtual Research Environments

Virtual Research Environments Author : Robert N. Allan
Publisher : Elsevier
File Size : 23,7 Mb
Get Book
Virtual Research Environments examines making Information and Communication Technologies (ICT) usabl...

Advances in User Authentication

Advances in User Authentication Author : Dipankar Dasgupta,Arunava Roy,Abhijit Nag
Publisher : Springer
File Size : 16,5 Mb
Get Book
This book is dedicated to advances in the field of user authentication. The book covers detailed des...

Managing Information Security

Managing Information Security Author : John R. Vacca
Publisher : Syngress
File Size : 46,7 Mb
Get Book
Managing Information Security offers focused coverage of how to protect mission critical systems, ho...