SlideShare a Scribd company logo
1 of 7
What is it, exactly, that you’re focusing on?
Deploying an application access management suite is currently too expensive for any but
the largest enterprises who can afford platforms like Oracle Access Manager, IBM Tivoli
Access Manager or CA Site Minder. These security suites use proprietary protocols which
frequently result in “vendor lock-in.” This book would document a recipe to leverage open
standards to build an enterprise class web access management using 100% open source
components. This recipe has been developed by Gluu over the last five years, and is proven
to work in a variety of deployments around the globe that vary in size from small to
humongous.
Why does the community use this tool?
People–employees, customers, and partners–need to be identified to interact electronically
with an organization. Authentication (authn) and authorization (authz) is a challenge
faced by almost every organization large enough to register an Internet domain. And it’s
not just people that need to be authenticated and authorized. “Clients” are online agents
that can interact with services on your behalf. With the emergence of the IoT and the API
economy, developers and system administrators are urgently searching for standards
based solutions and best practices to improve the security of web and mobile applications.
While commercial solutions exist, there are many organizations that prefer the do-it-
yourself approach. Authentication impacts the integrity of every transaction performed
by a person or client on the network. In some cases, web authentication is the
organization’s keys to the kingdom. There are many organizations that will never
outsource this function. And there are many organizations that see excellence in
authentication–which is the front door to their Internet presence–as a competitive
advantage to drive adoption of their products and services. For these organizations, a
recipe for open source access management would be extremely helpful.
What are people doing with it on a daily basis?
Application security is a very difficult and scary topic for the average system
administrator. Authentication and authorization is the first step for almost any content
of value. If the central authn/authz service is down, even the CEO of the company may
not be able to read her email. Or worse, a security breach may result in a financial loss
for the organization or even dismissal. This book would document a proven solution to
enable sysadmins to confidently deploy a modern, flexible authn/authz service that
would be available day after day for many years to come.
What are its benefits to users, compared to a new/old rival?
The recipe documented in the book is a proven stack of wam software used by
universities, governments, large companies and websites.
This stack has more features and is easier to manage than commercial alternatives. If you
are paranoid about the NSA spying on you, then you can read all the code. This recipe
includes some of the most widely deployed and some of the most cutting edge security
solutions available anywhere.
Organizations who don’t use open source may use expensive commercial software or a
SaaS service. As application security is a universal requirement, both of these options will
make sense for some organizations.
The recipe documented in this book is not the only open source recipe possible the book is
not intended to be a compendium of all open source security solutions. It’s a curated recipe
of a suite of software proven to work together to satisfy the requirements of many
organizations large and small.
What issues does your community face, day to day?
A recent Verizon study indicated that 80% of Internet breaches were the direct result of
bad password security. But how can organizations reduce reliance on passwords, without
tightly coupling authentication technology into applications? How can the deploy ability
issues of strong authentication be addressed?
Mobile applications are creating new requirements for companies. There has been a
paradigm shift where enterprise services are published with JSON/REST APIs to support both
web sites and mobile apps. Organizations are using more services hosted by third parties.
Some web sites are facing requirements to support the standards based security
infrastructures of their customers or partners.
It’s impossible for the average system administrator to patch together a solution to address
all these challenges. It’s time for an open source alternative.
What else can it do?
The solution is very flexible. It is solving a wide range of use cases today. One area that could
be expanded is “enrollment,” which involves creating an internal profile for a person who is
authenticated at another domain (like Google). Another extra-credit topic that is not needed
by the average domain is multi-party federation hosting. This enables an organization to vet
a list of trusted, autonomous partners who publish applications or authenticate people.
What do its friends look like?
Many governments are anxious to see open source alternatives for security. The Internet will
not become a safer place if only big companies can afford security. Higher Education has
also been early adopters of open standards for security
. Part of the solution is based on open source software already popular in this segment.
Finally, many companies are anxious for more cost effective solutions to recommend to
partners. If you need your partners to support secure open standards for security, you
can’t ask them to buy expensive enterprise software. Finally, privacy advocates around
the globe prefer open source security solutions, especially in light of recent revelations
regarding US government spying.
What does the future look like?
There is a major paradigm shift happening right now. In the past, there were too many
Internet standards for web authentication: Opined 2.0, OAuth 1.0, WS-Federation, CAS,
and many other protocols are on the trash heap of failed or fading efforts. Finally, new
standards have arisen that use the OAuth2 pattern, leveraging a JSON/REST API
architecture that is friendly to application developers. There is more consensus than
ever on how to achieve interoperable security. If authentication and authorization
becomes a decentralized Internet infrastructure like SMTP or DNS, the know-how for
how to launch a manage these services will be in high demand across the globe.
Product Proposal
API and Mobile Access Management
What is the vision and purpose of this product?
While the vision for securing the Internet is clear to the “identerati”–the experts who
developed the standards–we need to get the information into the hands of a much wider
audience. It is imperative for our society that we decentralize identity.
Face book and Google have bridged our inability to identify our friends on the Internet
by providing a centralized solution–you can share a Google doc with someone only
because they also have a Google account. With a myriad of vendors producing hardware
and software that interact on our behalf, we cannot build our society on these central
identity silos. Like enlightened despotism, it seems efficient. But over time, it
undermines the original design goal of the Internet… the largest federation of
autonomous entities ever assembled into one network. The Internet was made possible
by standards like TCP/IP, DNS, http and ssl. After 20 years, we have an Internet identity
infrastructure, and it’s time to get the word out. For this, we need paper!
Who is the reader/viewer at the start?
The basic profile of the person is a “Unix system administrator.” However, others in the
organization who use or rely on the infrastructure may also want to read it.
To read this book, the person will need to understand the current infrastructure of the
Internet: TCP/IP, DNS, SMTP, HTTP, and SSL. Some knowledge of private-public key
cryptography would also helpful, although the required concepts will be reviewed–it’s
so critical, it can’t be assumed. No programming is assumed, although some additional
material will be referenced, as many programmers will certainly read this book.
Who is the reader/viewer at the end?
After reading the book, the reader should be ready to deploy the components to enable
application testing and development to proceed. The roadmap for security should be
clear, including which services are needed to meet the requirements of the reader’s
organization. Importantly, after reading this book, the programmers, system
administrators, and Chief Information Security Officer should be able to get alignment
much more quickly on the important standards, and the moving pieces that need to be
addressed from a business perspective, not just a technical perspective.
Article resource:-https://sites.google.com/site/thegluuserver/packt-publishing-book-
proposal-api-and-mobile-access-management

More Related Content

What's hot

Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
Securing Oracle Database 12c
Securing Oracle Database 12cSecuring Oracle Database 12c
Securing Oracle Database 12cInprise Group
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web ServicesAshish Jain
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_securityAnil Pandey
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breachCloudMask inc.
 
LinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security PolicyLinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security PolicyChris Niggel
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share PointArt Upton
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Dana Gardner
 

What's hot (20)

Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
Case study
Case studyCase study
Case study
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
Securing Oracle Database 12c
Securing Oracle Database 12cSecuring Oracle Database 12c
Securing Oracle Database 12c
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_security
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
LinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security PolicyLinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security Policy
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share Point
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
 

Viewers also liked

Publishing presentation
Publishing presentationPublishing presentation
Publishing presentationagswallow
 
Cona project jean report
Cona project jean reportCona project jean report
Cona project jean reportashwani916
 
Get your next book published
Get your next book publishedGet your next book published
Get your next book publishedLee Constantine
 
Publishing 101: How it all Works and How You Fit In
Publishing 101: How it all Works and How You Fit InPublishing 101: How it all Works and How You Fit In
Publishing 101: How it all Works and How You Fit InMelanie Rigney
 
Book publishing for cvl book fair 8 25 10
Book publishing for cvl book fair 8 25 10Book publishing for cvl book fair 8 25 10
Book publishing for cvl book fair 8 25 10Esther Grassian
 
Spectrum Publishing PPT draft.pptx.pptx
Spectrum Publishing PPT draft.pptx.pptxSpectrum Publishing PPT draft.pptx.pptx
Spectrum Publishing PPT draft.pptx.pptxRebecca Mbanugo
 
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...Melanie Rigney
 
El diablo de los numeros 1 VALDERRAMA
El diablo de los numeros 1 VALDERRAMAEl diablo de los numeros 1 VALDERRAMA
El diablo de los numeros 1 VALDERRAMAjehosua97
 
Understanding Your Options in Book Publishing
Understanding Your Options in Book PublishingUnderstanding Your Options in Book Publishing
Understanding Your Options in Book PublishingSarah O'Keefe
 
Writing Book Proposals
Writing Book ProposalsWriting Book Proposals
Writing Book ProposalsGavin Harper
 
Why You Should Write a Book Proposal
Why You Should Write a Book ProposalWhy You Should Write a Book Proposal
Why You Should Write a Book ProposalKim Wolterman
 
Wiki Use Case: Publishing
Wiki Use Case: PublishingWiki Use Case: Publishing
Wiki Use Case: PublishingStewart Mader
 
2013 flex billing pt2- final version
2013 flex billing  pt2- final version2013 flex billing  pt2- final version
2013 flex billing pt2- final versionDylanRao
 
Training and development Program
Training and development ProgramTraining and development Program
Training and development ProgramZAINI ABDUL WAHAB
 
Writing in MLA Style
Writing in MLA StyleWriting in MLA Style
Writing in MLA StyleBrooksie Lane
 

Viewers also liked (20)

Publishing presentation
Publishing presentationPublishing presentation
Publishing presentation
 
Roma GLB
Roma GLBRoma GLB
Roma GLB
 
Cuadro 9
Cuadro 9 Cuadro 9
Cuadro 9
 
Cona project jean report
Cona project jean reportCona project jean report
Cona project jean report
 
Get your next book published
Get your next book publishedGet your next book published
Get your next book published
 
Publishing 101: How it all Works and How You Fit In
Publishing 101: How it all Works and How You Fit InPublishing 101: How it all Works and How You Fit In
Publishing 101: How it all Works and How You Fit In
 
Book publishing for cvl book fair 8 25 10
Book publishing for cvl book fair 8 25 10Book publishing for cvl book fair 8 25 10
Book publishing for cvl book fair 8 25 10
 
Spectrum Publishing PPT draft.pptx.pptx
Spectrum Publishing PPT draft.pptx.pptxSpectrum Publishing PPT draft.pptx.pptx
Spectrum Publishing PPT draft.pptx.pptx
 
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
 
El diablo de los numeros 1 VALDERRAMA
El diablo de los numeros 1 VALDERRAMAEl diablo de los numeros 1 VALDERRAMA
El diablo de los numeros 1 VALDERRAMA
 
Researching Grants
Researching GrantsResearching Grants
Researching Grants
 
Understanding Your Options in Book Publishing
Understanding Your Options in Book PublishingUnderstanding Your Options in Book Publishing
Understanding Your Options in Book Publishing
 
Ge80 c damron 4 11 10
Ge80 c damron 4 11 10Ge80 c damron 4 11 10
Ge80 c damron 4 11 10
 
Writing Book Proposals
Writing Book ProposalsWriting Book Proposals
Writing Book Proposals
 
7710311 book proposal-sample
7710311 book proposal-sample7710311 book proposal-sample
7710311 book proposal-sample
 
Why You Should Write a Book Proposal
Why You Should Write a Book ProposalWhy You Should Write a Book Proposal
Why You Should Write a Book Proposal
 
Wiki Use Case: Publishing
Wiki Use Case: PublishingWiki Use Case: Publishing
Wiki Use Case: Publishing
 
2013 flex billing pt2- final version
2013 flex billing  pt2- final version2013 flex billing  pt2- final version
2013 flex billing pt2- final version
 
Training and development Program
Training and development ProgramTraining and development Program
Training and development Program
 
Writing in MLA Style
Writing in MLA StyleWriting in MLA Style
Writing in MLA Style
 

Similar to Deploy Open Source Access Management

Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling modelJose Guerrero
 
Learn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentLearn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentStave
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?Jane Brewer
 
OAuth big picture
OAuth big pictureOAuth big picture
OAuth big pictureMin Li
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Black Duck by Synopsys
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The CloudPeter Coffee
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7Charles Rey
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsWhite Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsSonatype
 
KnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented ArchitectureKnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented Architecturerohitkhare
 
Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?John Newton
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...Black Duck by Synopsys
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
Saa S Overview For Legal Eighty Twenty
Saa S Overview For Legal Eighty TwentySaa S Overview For Legal Eighty Twenty
Saa S Overview For Legal Eighty TwentyEighty_Twenty
 

Similar to Deploy Open Source Access Management (20)

Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling model
 
Learn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentLearn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow Investment
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?
 
OAuth big picture
OAuth big pictureOAuth big picture
OAuth big picture
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Oauth ebook-2012-02
Oauth ebook-2012-02Oauth ebook-2012-02
Oauth ebook-2012-02
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The Cloud
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsWhite Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
 
KnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented ArchitectureKnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented Architecture
 
Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
Saa S Overview For Legal Eighty Twenty
Saa S Overview For Legal Eighty TwentySaa S Overview For Legal Eighty Twenty
Saa S Overview For Legal Eighty Twenty
 

More from Gluu

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutionsGluu
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot awardGluu
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiersGluu
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management pocGluu
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationGluu
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuGluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for artGluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s visionGluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers iiGluu
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Gluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxGluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Gluu
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submissionGluu
 
Go west young federation
Go west young federationGo west young federation
Go west young federationGluu
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxyGluu
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013Gluu
 

More from Gluu (20)

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
 

Recently uploaded

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Deploy Open Source Access Management

  • 1. What is it, exactly, that you’re focusing on? Deploying an application access management suite is currently too expensive for any but the largest enterprises who can afford platforms like Oracle Access Manager, IBM Tivoli Access Manager or CA Site Minder. These security suites use proprietary protocols which frequently result in “vendor lock-in.” This book would document a recipe to leverage open standards to build an enterprise class web access management using 100% open source components. This recipe has been developed by Gluu over the last five years, and is proven to work in a variety of deployments around the globe that vary in size from small to humongous. Why does the community use this tool? People–employees, customers, and partners–need to be identified to interact electronically with an organization. Authentication (authn) and authorization (authz) is a challenge faced by almost every organization large enough to register an Internet domain. And it’s not just people that need to be authenticated and authorized. “Clients” are online agents that can interact with services on your behalf. With the emergence of the IoT and the API economy, developers and system administrators are urgently searching for standards based solutions and best practices to improve the security of web and mobile applications.
  • 2. While commercial solutions exist, there are many organizations that prefer the do-it- yourself approach. Authentication impacts the integrity of every transaction performed by a person or client on the network. In some cases, web authentication is the organization’s keys to the kingdom. There are many organizations that will never outsource this function. And there are many organizations that see excellence in authentication–which is the front door to their Internet presence–as a competitive advantage to drive adoption of their products and services. For these organizations, a recipe for open source access management would be extremely helpful. What are people doing with it on a daily basis? Application security is a very difficult and scary topic for the average system administrator. Authentication and authorization is the first step for almost any content of value. If the central authn/authz service is down, even the CEO of the company may not be able to read her email. Or worse, a security breach may result in a financial loss for the organization or even dismissal. This book would document a proven solution to enable sysadmins to confidently deploy a modern, flexible authn/authz service that would be available day after day for many years to come. What are its benefits to users, compared to a new/old rival? The recipe documented in the book is a proven stack of wam software used by universities, governments, large companies and websites.
  • 3. This stack has more features and is easier to manage than commercial alternatives. If you are paranoid about the NSA spying on you, then you can read all the code. This recipe includes some of the most widely deployed and some of the most cutting edge security solutions available anywhere. Organizations who don’t use open source may use expensive commercial software or a SaaS service. As application security is a universal requirement, both of these options will make sense for some organizations. The recipe documented in this book is not the only open source recipe possible the book is not intended to be a compendium of all open source security solutions. It’s a curated recipe of a suite of software proven to work together to satisfy the requirements of many organizations large and small. What issues does your community face, day to day? A recent Verizon study indicated that 80% of Internet breaches were the direct result of bad password security. But how can organizations reduce reliance on passwords, without tightly coupling authentication technology into applications? How can the deploy ability issues of strong authentication be addressed?
  • 4. Mobile applications are creating new requirements for companies. There has been a paradigm shift where enterprise services are published with JSON/REST APIs to support both web sites and mobile apps. Organizations are using more services hosted by third parties. Some web sites are facing requirements to support the standards based security infrastructures of their customers or partners. It’s impossible for the average system administrator to patch together a solution to address all these challenges. It’s time for an open source alternative. What else can it do? The solution is very flexible. It is solving a wide range of use cases today. One area that could be expanded is “enrollment,” which involves creating an internal profile for a person who is authenticated at another domain (like Google). Another extra-credit topic that is not needed by the average domain is multi-party federation hosting. This enables an organization to vet a list of trusted, autonomous partners who publish applications or authenticate people. What do its friends look like? Many governments are anxious to see open source alternatives for security. The Internet will not become a safer place if only big companies can afford security. Higher Education has also been early adopters of open standards for security
  • 5. . Part of the solution is based on open source software already popular in this segment. Finally, many companies are anxious for more cost effective solutions to recommend to partners. If you need your partners to support secure open standards for security, you can’t ask them to buy expensive enterprise software. Finally, privacy advocates around the globe prefer open source security solutions, especially in light of recent revelations regarding US government spying. What does the future look like? There is a major paradigm shift happening right now. In the past, there were too many Internet standards for web authentication: Opined 2.0, OAuth 1.0, WS-Federation, CAS, and many other protocols are on the trash heap of failed or fading efforts. Finally, new standards have arisen that use the OAuth2 pattern, leveraging a JSON/REST API architecture that is friendly to application developers. There is more consensus than ever on how to achieve interoperable security. If authentication and authorization becomes a decentralized Internet infrastructure like SMTP or DNS, the know-how for how to launch a manage these services will be in high demand across the globe. Product Proposal API and Mobile Access Management
  • 6. What is the vision and purpose of this product? While the vision for securing the Internet is clear to the “identerati”–the experts who developed the standards–we need to get the information into the hands of a much wider audience. It is imperative for our society that we decentralize identity. Face book and Google have bridged our inability to identify our friends on the Internet by providing a centralized solution–you can share a Google doc with someone only because they also have a Google account. With a myriad of vendors producing hardware and software that interact on our behalf, we cannot build our society on these central identity silos. Like enlightened despotism, it seems efficient. But over time, it undermines the original design goal of the Internet… the largest federation of autonomous entities ever assembled into one network. The Internet was made possible by standards like TCP/IP, DNS, http and ssl. After 20 years, we have an Internet identity infrastructure, and it’s time to get the word out. For this, we need paper! Who is the reader/viewer at the start? The basic profile of the person is a “Unix system administrator.” However, others in the organization who use or rely on the infrastructure may also want to read it.
  • 7. To read this book, the person will need to understand the current infrastructure of the Internet: TCP/IP, DNS, SMTP, HTTP, and SSL. Some knowledge of private-public key cryptography would also helpful, although the required concepts will be reviewed–it’s so critical, it can’t be assumed. No programming is assumed, although some additional material will be referenced, as many programmers will certainly read this book. Who is the reader/viewer at the end? After reading the book, the reader should be ready to deploy the components to enable application testing and development to proceed. The roadmap for security should be clear, including which services are needed to meet the requirements of the reader’s organization. Importantly, after reading this book, the programmers, system administrators, and Chief Information Security Officer should be able to get alignment much more quickly on the important standards, and the moving pieces that need to be addressed from a business perspective, not just a technical perspective. Article resource:-https://sites.google.com/site/thegluuserver/packt-publishing-book- proposal-api-and-mobile-access-management