Kindly log in to use this feature. We’ll take you to the login page automatically.
LoginGeneral Tech Technology & Software 3 years ago
User submissions are the sole responsibility of contributors, with TuteeHUB disclaiming liability for accuracy, copyrights, or consequences of use; content is for informational purposes only and not professional advice.
No matter what stage you're at in your education or career, TuteeHUB will help you reach the next level that you're aiming for. Simply,Choose a subject/topic and get started in self-paced practice sessions to improve your knowledge and scores.
Kindly log in to use this feature. We’ll take you to the login page automatically.
LoginReady to take your education and career to the next level? Register today and join our growing community of learners and professionals.
Your experience on this site will be improved by allowing cookies. Read Cookie Policy
Your experience on this site will be improved by allowing cookies. Read Cookie Policy
manpreet
Best Answer
3 years ago
I understand that Identity Management can be done in multiple ways, using multiple protocols, depending on one's needs. However, the more I read about various Security Frameworks and Protocols, the more I get confused as to where and when to use them. My need is that I need a robust central Identity Management System that manages Authentication and Authorisation for a host of web applications that might query it. Also, I am looking for such a structure that can be progressively used for SSO (Single Sign On) when the software scales. What are the common technology stacks used worldwide for such identity management systems? How technologies and protocols like LDAP, Apache Shiro, OAuth, CAS fit into all these; i.e what roles do they play? Are they complimentary technologies or interchangeable? Do some of them perform same functions, what are the merits and demerits of using them?
I know I am asking a number of questions and a lot of information but I could not find any good resources that could give me the "bigger picture" for such a requirement. Any help, any sources would be appreciated.