IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives infosectoday.com Book Proposal Guidelines IT Today Catalog Auerbach Publications ITKnowledgebase IT Today Archives infosectoday.com Book Proposal Guidelines

IT Today is brought to you by Auerbach Publications

IT Performance Improvement

Management

Security

Networking and Telecommunications

Software Engineering

Project Management

Database


Search the Site


Free Subscription to IT Today





 
The Complete Guide to Cybersecurity Risks and Controls by Anne Kohnke, Dan Shoemaker, and Ken E. Sigler; ISBN 9781498740548
Securing an IT Organization through Governance, Risk Management, and Audit by Ken E. Sigler and James L. Rainey, III; ISBN 9781498737319
Enterprise Architecture and Information Assurance: Developing a Secure Foundation by James A. Scholz; ISBN 9781439841594
Electronically Stored Information: The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition by David R. Matthews; ISBN 9781498739580
Information Security Policies, Procedures, and Standards: A Practitioner's Reference by Douglas J. Landoll; ISBN 9781482245899

Claims-Based Authentication

William R. Simpson

Bookmark and Share

Authentication is the process that deals with the establishment of identities. Claims-based authorization, at its simplest, checks the value of a claim and allows access to a resource based upon that value. A claim is a name-value pair that represents what the subject is, not what the subject can do. Clear as mud, right? Read this chapter from Enterprise Level Security for total clarity on claims-based authorization.


About the Book

Enterprise Level Security: Securing Information Systems in an Uncertain World by William R. Simpson; ISBN 9781498764452 Enterprise Level Security: Securing Information Systems in an Uncertain World by William R. Simpson; ISBN 978-1-4987-6445-2. Auerbach Publications, 2016.


© Copyright 2016 Auerbach Publications