The master thesis is divided into two parts. In the first part, identity management is described on theoretical basis. Particular domains of identity management including authentication, authorization and audit are explained as well as Single Sign-On concept, i.e. using single credentials and entering them just once for access to multiple independent systems or services. In the second part, which forms the main part of this thesis, a practical project was implemented on the infrastructure of the Department of Telecommunications within the Faculty of Electrical Engineering and Communication, Brno University of Technology. The goal of this project was to create an environment for central 4 authentication and Single Sign-On using only open sou...
The Identity Management became to be a real and important problem for distributed environments. Firs...
Abstract: Identity and Access Management (IAM) infrastructures already provide a crucial and establi...
Managing digital identities and access control for enterprise users and applications remains one of ...
Today, one is expected to remember multiple user names and passwords for different domains when one ...
Managing digital identities and access control for enterprise users and applications remains one of ...
Abstract: Today, identity management systems are widely used in different types of organizations, fr...
The Master thesis work will study and propose how workstation identity management can be made more u...
This bachelor thesis deals with the identity management in the SaaS environment. The first part of t...
Many identities are possessed by the user in this digital world. The access rights and the digital...
The thesis Open Authentication aims to present in detail the open authorization protocol that could ...
This paper discusses the implementation of a method for single sign on (SSO) by usingCentral Authent...
Diplomsko delo obravnava področje internetne varnosti. V nalogi opredelimo gradnike sistema, kot so ...
This thesis performs an investigation into issues concerning the broad area ofIdentity and Access Ma...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Most modern web applications need an authentication and user account system. For users this often le...
The Identity Management became to be a real and important problem for distributed environments. Firs...
Abstract: Identity and Access Management (IAM) infrastructures already provide a crucial and establi...
Managing digital identities and access control for enterprise users and applications remains one of ...
Today, one is expected to remember multiple user names and passwords for different domains when one ...
Managing digital identities and access control for enterprise users and applications remains one of ...
Abstract: Today, identity management systems are widely used in different types of organizations, fr...
The Master thesis work will study and propose how workstation identity management can be made more u...
This bachelor thesis deals with the identity management in the SaaS environment. The first part of t...
Many identities are possessed by the user in this digital world. The access rights and the digital...
The thesis Open Authentication aims to present in detail the open authorization protocol that could ...
This paper discusses the implementation of a method for single sign on (SSO) by usingCentral Authent...
Diplomsko delo obravnava področje internetne varnosti. V nalogi opredelimo gradnike sistema, kot so ...
This thesis performs an investigation into issues concerning the broad area ofIdentity and Access Ma...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Most modern web applications need an authentication and user account system. For users this often le...
The Identity Management became to be a real and important problem for distributed environments. Firs...
Abstract: Identity and Access Management (IAM) infrastructures already provide a crucial and establi...
Managing digital identities and access control for enterprise users and applications remains one of ...