「アイデンティティ管理」の版間の差分

提供: ArchWiki
ナビゲーションに移動 検索に移動
(wikipediaリンクを修正)
(→‎Software: リンクを修正)
15行目: 15行目:
 
* kanidm, some [https://fy.blackhats.net.au/blog/html/2019/09/18/announcing_kanidm_a_new_idm_project.html info here]. Successor of LDAP, Kerberos. Server side of WebAuthn.
 
* kanidm, some [https://fy.blackhats.net.au/blog/html/2019/09/18/announcing_kanidm_a_new_idm_project.html info here]. Successor of LDAP, Kerberos. Server side of WebAuthn.
 
* [[Kerberos]], with [[Active Directory integration]], [[FreeIPA]], some info [https://fy.blackhats.net.au/blog/html/2017/05/23/kerberos_why_the_world_moved_on.html from a SuSE dev here]
 
* [[Kerberos]], with [[Active Directory integration]], [[FreeIPA]], some info [https://fy.blackhats.net.au/blog/html/2017/05/23/kerberos_why_the_world_moved_on.html from a SuSE dev here]
* [[LDAP authentication]], passwords in a central server.
+
* [[LDAP 認証]], passwords in a central server.
 
* [[PAM]], linux pluggable authenticaiton modules. Kerberos, LDAP, kanidm, etc. can be plugged into linux.
 
* [[PAM]], linux pluggable authenticaiton modules. Kerberos, LDAP, kanidm, etc. can be plugged into linux.
* [[Security]].
+
* [[セキュリティ]].
 
* [[Universal 2nd Factor]], replaced by WebAuthn.
 
* [[Universal 2nd Factor]], replaced by WebAuthn.
* [[Users and groups]]. can be stored on a system or centrally via LDAP, kanidm.
+
* [[ユーザーとグループ]]. can be stored on a system or centrally via LDAP, kanidm.
 
* WebAuthn, browser web authentication API, replacement for password authentication, uses Yubikey, or the built-in hardware of a device like TouchID or Windows Hello. Backwards compatible with universal 2nd Factor, server side provided by kanidm e.g.
 
* WebAuthn, browser web authentication API, replacement for password authentication, uses Yubikey, or the built-in hardware of a device like TouchID or Windows Hello. Backwards compatible with universal 2nd Factor, server side provided by kanidm e.g.

2021年5月15日 (土) 10:13時点における版

関連記事

アイデンティティ管理 (IDM), sometimes also identity and access management (IAM), deals with how users gain a digital identity, the roles, and sometimes the permission granted to this identity.

Software

There is a number of software which helps doing identity management. Amongst, in alphabetical order, tools and related: