Index

A, B

Access policy enforcement
Account requirements
account linking
delegation
impersonation
mergers and acquisitions
progressive profiling
API
add custom claims
authorization
back-end API
client application
extensibility
front end
SeeFront-end functions
front-end application
helper function
Introspection specification
JWT-formatted access
OAuth 2.0 scopes
OpenID Provider
processing request
test
user authorization
Authentication
biometric factors
deployment
identity provider request
knowledge-based authentication
multi-factor authentication
OIDC
private cryptographic key
SAML 2.0
session timeouts
static password
step-down
step-up
stronger forms
Authorization
client applications
attributes
delivery
enforcement
OAuth 2.0 request
policy enforcement
application access
data access
functional access
user authorization
delivery
enforcement
profile attributes
transactional attributes
uservs. client application

C

Center for Internet Security (CIS)
Centralized user repository
Cloud Controls Matrix (CCM)
Cloud Security Alliance (CSA)
Compliance
assessment and certification
competitive advantage
data protection
definition
efficiency
elective compliance frameworks
GDPR
industry
list of activities
privacy compliance
reduce penalties
security compliance
security/privacy standards
Criminal Justice Information Services (CJIS) Security Policy

D

Deprovisioning
account termination
certificate of deletion
data transfer
delete account
preserve account record
preserve identities
reprovision requirements
right to erasure
secure deletion
Document-writing app
code-sharing web sites
compliance requirements
features and services
frameworks
identity provider service
management requirements
access controls
anonymous document creation
API calls
provisioning options
sensitive data
session timeout
single sign-on
user logs out
users log in
web-based single-page application
platform

E

Environment requirements
Identity Provider Discovery
multitenant applications
shared workstations
Exceptions
accounts
authentication mechanism
data restore
decommission
orphaned account
takeover
compromised security information
credentials
personal data
secrets
identity provider
account recovery requests
breached passwords
brute force attack
system outage
administrative access
authentication
provisioning process
External identity service
characteristics
customer types
factors
government-issued online identity
industry consortium
organization-controlled identity
organizations
self-registered identity
social provider accounts

F

Failures
cleartext passwords
encrypt sensitive data
insiders threat
multi-factor authentication
pay attention to process
phishy emails
secure coding practices
security vulnerability
Target’s HVAC
Federal Financial Institutions Examination Council (FFIEC)
Federal Information Security Management Act (FISMA)
Federal Risk and Authorization Management Program (FedRAMP)
Front-end functions
API calls
helper functions
logout
OpenID Connect
sessions
token management
tokens
user authentication

G

General Data Protection Regulation (GDPR)
Gramm-Leach-Bliley Act (GLBA)

H

Health Insurance Portability and Accountability Act (HIPAA)
Health Information Technology for Economic and Clinical Health (HITECH)
HTTP Archive View (HAR file)
Chrome
Google
Fiddler
HTTP trace
Chrome
Firefox
Internet Explorer
Safari

I, J, K

Identifier
Identities
access policy enforcement
account management and recovery
authentication
authorization
autonomous vehicles
definition
deprovisioning
events in life of
evolution of
IoT devices
logout
multi-factor authentication
personal agents
provisioning
robots
sessions
SSO
step-up authentication
Identity and Access Management (IAM) System
Identity attributes
account recovery
advantages/disadvantages
credentials reset
enterprise provider
helpdesk reset
password guidance
SCIM protocol
social providers
user profile data
validation
Identity defederation
Identity management
centralized user repository
design questions
easier adoption
e-identity initiatives
federated identity and SAML 2.0
identity challenges
OAuth 2.0
OIDC
OpenID protocol
per-application identity silo
sample application
smaller devices
SSO servers
standard protocols
stronger authentication
WS-Fed
Identity provisioning
administrative account creation
automated account
cross-domain account
manual account
approaches
invite-only registration flow
leverage external identity service
migration
bulk migration
gradual migration approach
supporting legacy hashing algorithms
progressive profiling
self-registration

L

Logout
application
application session
authentication broker
in designing
identity provider session
multilevel authentication
multiple user sessions
OAuth 2.0
OIDC
back-Channel
front-channel
specification
redirects
relying party client application
SAML 2.0
session termination
SSO
triggers
user sessions

M

Multi-factor authentication

N

National Institute for Standards and Technology (NIST)
Network trace tool
No email address

O

OAuth 2.0
access token
API call
with authorization
authorization code grant
authorization request
+ PKCE
response
token endpoint
client credentials
client profiles
confidentialvs. public clients
implicit grant
authorization request
URL hash fragment
overview
refresh token
resource owner password credentials
authorization request
resource server
roles
tokens and authorization code
without authorization
OpenID Connect (OIDC) protocol
authentication
authorization code and tokens
authorization code flow
authentication request
authentication response
token requests
client types
endpoints
hybrid flow
authentication request
response_types
ID Tokens
implicit flow
authentication request
authentication response
parameters
roles
session management
UserInfo endpoint
OpenID protocol

P, Q, R

Payment Card Industry Data Security Standard (PCI DSS)
People requirements
family account
temporary accounts
Per-application identity silo
Privacy legislation
European Union
other countries
United States
Private key
Proof Key for Code Exchange (PKCE)
Provisioning phase

S

SAML 2.0
assertion
attribute statements
authentication broker
authentication request
authentication response
AuthnStatement
condition
configuration
digital signature
federated identity
identity federation
identity provider
IdP-initiated flow
overview
protocol binding
SAML assertion
SAML profile
service provider
SP-initiated flow
SSO
subject
trust relationship
working principles
Security Assertion Markup Language (SAML) 2.0 protocol
SeeSAML 2.0
Security challenges
diversifying motives
evolving targets
ongoing breaches
Security frameworks
CIS controls
CJIS Security Policy
CSA
FedRAMP
FFIEC
FISMA
HIPAA
HITECH
GLBA
ISO 27000
NIST
PCI DSS
SOC
US Frameworks
Service Organization Control (SOC)
Sessions
application session
authentication broker
continuous authentication
duration
identity provider
multiple sessions
relying parties
renewal
token renewal
Single sign-on (SSO)
authentication mechanisms
benefits
consumer-facing environments
definition
identity provider
login page branding
multiple identity providers
servers
session attributes
session duration
trade-offs
working principles
Status transitions
Step-up authentication
System for Cross-domain Identity Management (SCIM) protocol

T, U

Targets
cars
homes and business
medical implants and monitoring
perimeter protections
robots
Troubleshooting
API calls
application issue
applications impact
authentication/authorization
capture HTTP traces
cross checking
environmental factors
HTTP status code
identity protocol
independent browser windows
intermittent problem
JWTs and SAML tokens
parameters in a request
problem replication
sequence of interaction
symptoms and issues
test environment
token contents
tools
trace of HTTP and API calls
users impacted
validation errors
view HTTP traces

V

View security tokens

W, X, Y, Z

Web Services Federation Language (WS-Fed)
WriteAPaper application
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.173.112