What is Identity and Access Management?
IAM is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrella of IT security and Data Management . Identity and access management systems not only identify, authenticate and authorize individuals who will be utilizing IT resources, but also the hardware and applications employees need to access. Identity and Access Management solutions have become more prevalent and critical in recent years as regulatory compliance requirements have become increasingly more rigorous and complex. It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements
IAM covers issues such as how users gain an identity, the roles and, sometimes, the permissions that identity grants, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).
Reference:
About IAM - https://en.wikipedia.org/wiki/Identity_management
What is Single Sign-On?
Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.
For clarity, it is best to refer to systems requiring authentication for each application but using the same credentials from a directory server as Directory Server Authentication and systems where a single authentication provides access to multiple applications by passing the authentication token seamlessly to configured applications as single sign-on.
Conversely, single sign-off is the property whereby a single action of signing out terminates access to multiple software systems.
As different applications and resources support different authentication mechanisms, single sign-on must internally store the credentials used for initial authentication and translate them to the credentials required for the different mechanisms.
An increasing number of federated social logons, like Facebook Connect do require the user to enter consent choices at first registration with a new resource and so are not always single sign-on in the strictest sense.
References:
1. About Single Sign-On - https://en.wikipedia.org/wiki/Single_sign-on
2. List of SSO Implementations - https://en.wikipedia.org/wiki/List_of_single_sign-on_implementations
What is JOSSO?
JOSSO is an open source Identity and Access Management (IAM) platform for rapid and standards-based Cloud-scale Single Sign-On, web services security, strong authentication and provisioning.
Reference:
JOSSO Official Site - http://www.josso.org
Implementation Structure:
Click here to know how to install JOSSO in your windows system
2. Working with JOSSO
There are three screens in JOSSO environment:
(1) Creating & Modeling Appliance via Identity Appliance Modeler
(2) Managing Users and Groups via Account and Entitlement Management
(3) Building and Deploying Appliances via Identity Appliance Lifecycle Management
Click to find JOSSO Complete Documentation here
IAM is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrella of IT security and Data Management . Identity and access management systems not only identify, authenticate and authorize individuals who will be utilizing IT resources, but also the hardware and applications employees need to access. Identity and Access Management solutions have become more prevalent and critical in recent years as regulatory compliance requirements have become increasingly more rigorous and complex. It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements
IAM covers issues such as how users gain an identity, the roles and, sometimes, the permissions that identity grants, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).
Reference:
About IAM - https://en.wikipedia.org/wiki/Identity_management
What is Single Sign-On?
Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.
For clarity, it is best to refer to systems requiring authentication for each application but using the same credentials from a directory server as Directory Server Authentication and systems where a single authentication provides access to multiple applications by passing the authentication token seamlessly to configured applications as single sign-on.
Conversely, single sign-off is the property whereby a single action of signing out terminates access to multiple software systems.
As different applications and resources support different authentication mechanisms, single sign-on must internally store the credentials used for initial authentication and translate them to the credentials required for the different mechanisms.
An increasing number of federated social logons, like Facebook Connect do require the user to enter consent choices at first registration with a new resource and so are not always single sign-on in the strictest sense.
References:
1. About Single Sign-On - https://en.wikipedia.org/wiki/Single_sign-on
2. List of SSO Implementations - https://en.wikipedia.org/wiki/List_of_single_sign-on_implementations
What is JOSSO?
JOSSO is an open source Identity and Access Management (IAM) platform for rapid and standards-based Cloud-scale Single Sign-On, web services security, strong authentication and provisioning.
Reference:
JOSSO Official Site - http://www.josso.org
Implementation Structure:
The following links will take you to installation and working with JOSSO.
1. Installation of JOSSO
Click here to know how to install JOSSO in your windows system
2. Working with JOSSO
There are three screens in JOSSO environment:
(1) Creating & Modeling Appliance via Identity Appliance Modeler
(2) Managing Users and Groups via Account and Entitlement Management
(3) Building and Deploying Appliances via Identity Appliance Lifecycle Management
Click to find JOSSO Complete Documentation here
Comments
Post a Comment