𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

AAA Identity Management Security

✍ Scribed by Vivek Santuka, Premdeep Banga, Brandon J. Carroll


Publisher
Cisco Press
Year
2010
Tongue
English
Leaves
469
Series
Networking Technology: Security
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS

Β 

  • AAA solutions are very frequently used by customers to provide secure access to devices and networks
  • AAA solutions are difficult and confusing to implement even though they are almost mandatory
  • Helps IT Pros choose the best identity management protocols and designs for their environments
  • Covers AAA on Cisco routers, switches, access points, and firewallsΒ 
  • Β 

    This is the first complete, authoritative, single-source guide to implementing, configuring, and managing Authentication, Authorization and Accounting (AAA) identity management with CiscoSecure Access Control Server (ACS) 4 and 5. Written by three of Cisco's most experienced CiscoSecure product support experts, it covers all AAA solutions (except NAC) on Cisco routers, switches, access points, firewalls, and concentrators. It also thoroughly addresses both ACS configuration and troubleshooting, including the use of external databases supported by ACS. Each of this book's six sections focuses on specific Cisco devices and their AAA configuration with ACS. Each chapter covers configuration syntax and examples, debug outputs with explanations, and ACS screenshots. Drawing on the authors' experience with several thousand support cases in organizations of all kinds, AAA Identity Management Security presents pitfalls, warnings, and tips throughout. Each major topic concludes with a practical, hands-on lab scenario corresponding to a real-life solution that has been widely implemented by Cisco customers. This book brings together crucial information that was previously scattered across multiple sources. It will be indispensable to every professional running CiscoSecure ACS 4 or 5, as well as all candidates for CCSP and CCIE (Security or R and S) certification.

    Β 

    Β 

    Β 

    ✦ Subjects


    Π‘ΠΈΠ±Π»ΠΈΠΎΡ‚Π΅ΠΊΠ°;ΠšΠΎΠΌΠΏΡŒΡŽΡ‚Π΅Ρ€Π½Π°Ρ Π»ΠΈΡ‚Π΅Ρ€Π°Ρ‚ΡƒΡ€Π°;Cisco;


    πŸ“œ SIMILAR VOLUMES


    Securing Social Identity in Mobile Platf
    ✍ Thirimachos Bourlai; Panagiotis Karampelas; Vishal M. Patel πŸ“‚ Library πŸ“… 2020 πŸ› Springer Nature 🌐 English

    The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in

    Access Control Systems: Security, Identi
    ✍ Dr. Messaoud Benantar (auth.) πŸ“‚ Library πŸ“… 2006 πŸ› Springer US 🌐 English

    <p><P><STRONG>Access Control Systems: Security, Identity Management and Trust Models</STRONG> provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access cont

    Access Control and Identity Management (
    ✍ Mike Chapple πŸ“‚ Library πŸ“… 2020 πŸ› Jones & Bartlett Learning 🌐 English

    PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all standards put forth by CNSS 4011 & 4013A! Access control protects resources against unauthorized viewing, tampering, or destruction. These systems serve as a primary means of ensuring privacy, conf

    Access Control Systems: Security, Identi
    ✍ Messaoud Benantar πŸ“‚ Library πŸ“… 2005 πŸ› Springer 🌐 English

    Not much to say on this book except that I found it incomplete and lacking in practical processes, more studious than application oriented. I have read better books on the subject like the IAM Success Tips: Volume 1 which offers a lot more strategical information since it is more of a guide than an

    Oracle Database Application Security: Wi
    ✍ Osama Mustafa, Robert P. Lockard πŸ“‚ Library πŸ“… 2019 πŸ› Apress 🌐 English

    <p>Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more ab