Identity, Authentication, and Access Management in OpenStack Identity, Authentication, and Access Management in OpenStack

Identity, Authentication, and Access Management in OpenStack

Implementing and Deploying Keystone

    • $21.99
    • $21.99

Descripción editorial

Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.

Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer—as well as key practices for safeguarding your cloud's ongoing security.
Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after features—support for federated identity

GÉNERO
Computers & Internet
PUBLICADO
2015
8 de diciembre
IDIOMA
EN
Inglés
EXTENSIÓN
130
Páginas
EDITORIAL
O'Reilly Media
VENDEDOR
O Reilly Media, Inc.
TAMAÑO
3,9
MB

Más libros como este

Cloud Identity Patterns and Strategies Cloud Identity Patterns and Strategies
2022
Microsoft Windows Security Fundamentals Microsoft Windows Security Fundamentals
2011
Windows Server 2003 Security Infrastructures (Enhanced Edition) Windows Server 2003 Security Infrastructures (Enhanced Edition)
2004
SOA Security SOA Security
2007
Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
Security Guide for IBM i V6.1 Security Guide for IBM i V6.1
2009