๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone

โœ Scribed by Steve Martinelli, Henry Nash, Brad Topol


Publisher
O'Reilly Media
Year
2015
Tongue
English
Leaves
130
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Keystone - OpenStack's Identity service - provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access. Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer - as well as key practices for safeguarding your cloud's ongoing security.

โœฆ Subjects


ะ‘ะธะฑะปะธะพั‚ะตะบะฐ;ะšะพะผะฟัŒัŽั‚ะตั€ะฝะฐั ะปะธั‚ะตั€ะฐั‚ัƒั€ะฐ;ะžะฑะปะฐั‡ะฝั‹ะต ะฒั‹ั‡ะธัะปะตะฝะธั ะธ ัะตั€ะฒะธัั‹;


๐Ÿ“œ SIMILAR VOLUMES


Identity, Authentication, and Access Man
โœ Steve Martinelli, Henry Nash, Brad Topol ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<div><p>Keystoneโ€”OpenStack's Identity serviceโ€”provides secure controlled access to a cloudโ€™s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.</p><p>Whether the cloud is private, p

Mastering OpenStack: Design, deploy, and
โœ Omar Khedher ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Packt Publishing ๐ŸŒ English

This comprehensive guide will help you to choose the right practical option and make strategic decisions about the OpenStack cloud environment to fit your infrastructure in production. At the start, this book will explain the OpenStack core architecture. You will soon be shown how to create your ow

Identity Attack Vectors: Implementing An
โœ Morey J. Haber, Darran Rolls ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Apress ๐ŸŒ English

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how t

Extending OpenStack: Leverage extended O
โœ Omar Khedher ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Discover new opportunities to empower your private cloud by making the most of the OpenStack universe</b></p><h4>Key Features</h4><ul><li>This practical guide teaches you how to extend the core functionalities of OpenStack</li><li>Discover OpenStack's flexibility by writing custom applications

Extending OpenStack: Leverage extended O
โœ Omar Khedher ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Discover new opportunities to empower your private cloud by making the most of the OpenStack universe</b></p><h4>Key Features</h4><ul><li>This practical guide teaches you how to extend the core functionalities of OpenStack</li><li>Discover OpenStack's flexibility by writing custom applications

Securing the Perimeter: Deploying Identi
โœ Michael Schwartz ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Apress ๐ŸŒ English

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, itโ€™s now easier than ever to build and operate your own IAM stack. The most common