Identity, Authentication, and Access Management in OpenStack

Identity, Authentication, and Access Management in OpenStack
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
Implementing and Deploying Keystone
 EPUB
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 19,23 €

Jetzt 19,22 €* EPUB

Artikel-Nr:
9781491940785
Veröffentl:
2015
Einband:
EPUB
Seiten:
130
Autor:
Steve Martinelli
eBook Typ:
EPUB
eBook Format:
EPUB
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

KeystoneOpenStack's Identity serviceprovides secure controlled access to a clouds resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layeras well as key practices for safeguarding your cloud's ongoing security.Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after featuressupport for federated identity
KeystoneOpenStack's Identity serviceprovides secure controlled access to a clouds resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layeras well as key practices for safeguarding your cloud's ongoing security.Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access ManagementPerform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity APIUnderstand Keystone's unique support for multiple token formats, including how it has evolved over timeGet an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAPLearn about one of Keystone's most sought-after featuressupport for federated identity

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.