Google Search Appliance Security Instrukcja Użytkownika Strona 3

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 42
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 2
3
Contents
About this document
Chapter 1 Designing Security in the GSA
Overview
Information Gathering
Content Acquisition
Single vs. Multiple identities
Selecting an authorization mechanism
Chapter 2 Using Out of box features
Silent authentication
SAML
Early binding with Per-URL ACL
Connectors using Per-URL ACL
Connector 4.0(beta)
Security in Windows environments
Perimeter security
Secure Search Example
Chapter 3 Authentication for Developers
Forms authentication with cookie cracking
SAML
Cookie cracking vs. SAML
Connector Framework for Group Resolution
Trusted Application(beta)
Connector 4.0 Authentication (beta)
Chapter 4 Authorization for Developers
Overview
Per-URL ACLs
SAML authorization
Connector Framework for Authorization
Connector 4.0 Authorization (beta)
Web proxy
Summary
Security Best Practices Overview
Appendix A
Sample Trusted Application client code in C#
Przeglądanie stron 2
1 2 3 4 5 6 7 8 ... 41 42

Komentarze do niniejszej Instrukcji

Brak uwag