Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario

Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario
Author :
Publisher : Gilles Rubens Badouet
Total Pages : 183
Release :
ISBN-10 :
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario by : Gilles Rubens Badouet

Download or read book Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario written by Gilles Rubens Badouet and published by Gilles Rubens Badouet. This book was released on 2013-10-16 with total page 183 pages. Available in PDF, EPUB and Kindle. Book excerpt: This work titled ‘Investigation and implementation of Shibboleth SSO mechanism through a case scenario’ presents, discusses, describes and explains the major aspects and concepts of Shibboleth protocol and provides two related prototypes implementations of the protocol within a set of chosen tools and environments. The implementation relies on the project client specifications and recommendations and therefore follows some imposed deployment infrastructures. The work report first focuses on the research investigation in Shibboleth concepts, its relationship with similar mechanisms and its particularities in the Single Sign On mechanism alongside with its federation principles. It also emphasizes on the SAML (Security Assertion Mark-up Language), the protocol that Shibboleth implements and on which it relies. The second major part of this report describes step by step the installation, deployment and configurations of Shibboleth in working prototypes within Windows based Operating Systems. The primary prototype implementation is a sort of initial deployment carried out within a self-defined ad-hoc environment helping to implement the second prototype. Considered in this project as the real time prototype as it has been conducted within the client premises, the second prototype has some similar steps of the primary implementation and is much more complete in terms of applications integrations and the Shibboleth log out mechanism. It also focuses more on the client specifications. The end of this real time prototype provides the integration strategy of 247lib.com/247libDE application. A testing approach is then provided to demonstrate how successful sample of simple applications have been integrated into the implementation. The test illustrates with details description the main use case scenario of authentication through the Shibboleth based single sign on mechanism. The appendix part of this report and the CD bound to the report include the configuration files of the project implementation, the testing data and other project details. The project report finally discusses the encountered risks and issues faced throughout the project progress alongside with a critical appraisal and recommendations for future works.


Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario Related Books

Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario
Language: en
Pages: 183
Authors: Gilles Rubens Badouet
Categories:
Type: BOOK - Published: 2013-10-16 - Publisher: Gilles Rubens Badouet

DOWNLOAD EBOOK

This work titled ‘Investigation and implementation of Shibboleth SSO mechanism through a case scenario’ presents, discusses, describes and explains the majo
Electronic Resource Management in Libraries: Research and Practice
Language: en
Pages: 440
Authors: Yu, Holly
Categories: Health & Fitness
Type: BOOK - Published: 2008-02-28 - Publisher: IGI Global

DOWNLOAD EBOOK

A pronounced move from print subscriptions to electronic resources in all types of libraries has fundamentally impacted the library and its users. With the infl
Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications
Language: en
Pages: 2266
Authors: Management Association, Information Resources
Categories: Business & Economics
Type: BOOK - Published: 2016-02-17 - Publisher: IGI Global

DOWNLOAD EBOOK

################################################################################################################################################################
Proceedings of International Seminar on Application of Communication and Information Technology in Library
Language: en
Pages: 214
Authors: Anirban De
Categories:
Type: BOOK - Published: 2014-07-09 - Publisher: Allied Publishers

DOWNLOAD EBOOK

The proceeding focuses on the adoption and use of information and communication technology that have resulted in the globalization of information and knowledge
Mechanics of User Identification and Authentication
Language: en
Pages: 760
Authors: Dobromir Todorov
Categories: Business & Economics
Type: BOOK - Published: 2007-06-18 - Publisher: CRC Press

DOWNLOAD EBOOK

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at