Share

Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario

Download Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario PDF Online Free

Author :
Release : 2013-10-16
Genre :
Kind : eBook
Book Rating : /5 ( reviews)

GET EBOOK


Book Synopsis Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario by : Gilles Rubens Badouet

Download or read book Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario written by Gilles Rubens Badouet. This book was released on 2013-10-16. Available in PDF, EPUB and Kindle. Book excerpt: This work titled ‘Investigation and implementation of Shibboleth SSO mechanism through a case scenario’ presents, discusses, describes and explains the major aspects and concepts of Shibboleth protocol and provides two related prototypes implementations of the protocol within a set of chosen tools and environments. The implementation relies on the project client specifications and recommendations and therefore follows some imposed deployment infrastructures. The work report first focuses on the research investigation in Shibboleth concepts, its relationship with similar mechanisms and its particularities in the Single Sign On mechanism alongside with its federation principles. It also emphasizes on the SAML (Security Assertion Mark-up Language), the protocol that Shibboleth implements and on which it relies. The second major part of this report describes step by step the installation, deployment and configurations of Shibboleth in working prototypes within Windows based Operating Systems. The primary prototype implementation is a sort of initial deployment carried out within a self-defined ad-hoc environment helping to implement the second prototype. Considered in this project as the real time prototype as it has been conducted within the client premises, the second prototype has some similar steps of the primary implementation and is much more complete in terms of applications integrations and the Shibboleth log out mechanism. It also focuses more on the client specifications. The end of this real time prototype provides the integration strategy of 247lib.com/247libDE application. A testing approach is then provided to demonstrate how successful sample of simple applications have been integrated into the implementation. The test illustrates with details description the main use case scenario of authentication through the Shibboleth based single sign on mechanism. The appendix part of this report and the CD bound to the report include the configuration files of the project implementation, the testing data and other project details. The project report finally discusses the encountered risks and issues faced throughout the project progress alongside with a critical appraisal and recommendations for future works.

Electronic Resource Management in Libraries: Research and Practice

Download Electronic Resource Management in Libraries: Research and Practice PDF Online Free

Author :
Release : 2008-02-28
Genre : Health & Fitness
Kind : eBook
Book Rating : 922/5 ( reviews)

GET EBOOK


Book Synopsis Electronic Resource Management in Libraries: Research and Practice by : Yu, Holly

Download or read book Electronic Resource Management in Libraries: Research and Practice written by Yu, Holly. This book was released on 2008-02-28. Available in PDF, EPUB and Kindle. Book excerpt: A pronounced move from print subscriptions to electronic resources in all types of libraries has fundamentally impacted the library and its users. With the influx of resources such as e-journals; e-books; index, abstract, and/or full-text databases; aggregated databases; and others, the shift to electronic resources is rapidly changing library operational and organizational procedures. Electronic Resource Management in Libraries: Research and Practice provides comprehensive coverage of the issues, methods, theories, and challenges connected with the provision of electronic resources in libraries, with emphasis on strategic planning, operational guidelines, and practices. This book primarily focuses on management practices of the life-cycle of commercially acquired electronic resources from selection and ordering to cataloging, Web presentation, user support, usage evaluation, and more.

Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications

Download Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications PDF Online Free

Author :
Release : 2016-02-17
Genre : Business & Economics
Kind : eBook
Book Rating : 257/5 ( reviews)

GET EBOOK


Book Synopsis Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications by : Management Association, Information Resources

Download or read book Leadership and Personnel Management: Concepts, Methodologies, Tools, and Applications written by Management Association, Information Resources. This book was released on 2016-02-17. Available in PDF, EPUB and Kindle. Book excerpt: ###############################################################################################################################################################################################################################################################

Proceedings of International Seminar on Application of Communication and Information Technology in Library

Download Proceedings of International Seminar on Application of Communication and Information Technology in Library PDF Online Free

Author :
Release : 2014-07-09
Genre :
Kind : eBook
Book Rating : 152/5 ( reviews)

GET EBOOK


Book Synopsis Proceedings of International Seminar on Application of Communication and Information Technology in Library by : Anirban De

Download or read book Proceedings of International Seminar on Application of Communication and Information Technology in Library written by Anirban De. This book was released on 2014-07-09. Available in PDF, EPUB and Kindle. Book excerpt: The proceeding focuses on the adoption and use of information and communication technology that have resulted in the globalization of information and knowledge resources in modern libraries. The diverse set of technological tools and resources to create, communicate, disseminate, store and manage information have been discussed. Other topics include semantic tools and techniques, collection development, data and content management in digital era, the role of the digital librarian and the next generation library management, ethics for professionals, licensing issues, information access, repository projects for organizations. The book covers information management, problems and prospects of digitization in scientific institutes, emerging technologies in e-library & technology enhanced e-learning, ethics for library professionals & users in the digital environment, technology enhanced services in digital environment.

Implementing X.509 Security Certificate Based Authentication in a Virtual Organization

Download Implementing X.509 Security Certificate Based Authentication in a Virtual Organization PDF Online Free

Author :
Release : 2011
Genre : Electronic Dissertations
Kind : eBook
Book Rating : /5 ( reviews)

GET EBOOK


Book Synopsis Implementing X.509 Security Certificate Based Authentication in a Virtual Organization by : Veerendra Shirole

Download or read book Implementing X.509 Security Certificate Based Authentication in a Virtual Organization written by Veerendra Shirole. This book was released on 2011. Available in PDF, EPUB and Kindle. Book excerpt: In recent years, research institutions have shown great interest in forming Virtual Organizations (VO) as a cost effective alternative to maintaining dedicated resources for computationally intensive tasks. Shibboleth is an infrastructure used to provide the facility of single sign-on in many VOs. However, implementation of the Shibboleth infrastructure is a huge challenge that entails conformance to the policies of the institution that participates in the VO. Therefore in the absence of a Shibboleth authentication mechanism at a user's home institution, it may not be possible for users of a participating institution to access resources belonging to other institutions in the VO. This thesis addresses the issue of authenticating users who do not possess Shibboleth credentials, but are authentic users that need access to the resources in a VO. Lately, X.509 security certificates have gained immense popularity as a method for verifying the identity of a person. These certificates can be used to authenticate users on any system that trusts the certificate's signing Certificate Authority. Incorporating support for certificate-based authentication in the VO helps to authenticate users that belong to the research environment, but do not necessarily have Shibboleth credentials. Thus, certificate-based authentication increases the resource providing capability of the research environment by servicing all the users that are entitled to use resources in the VO.

You may also like...