ISBN 9798311034890 is currently unpriced. Please contact us for pricing.
Available options are listed below:
Available options are listed below:
SCIM in Identity Management
| AUTHOR | Relington, James |
| PUBLISHER | Independently Published (02/16/2025) |
| PRODUCT TYPE | Paperback (Paperback) |
Description
This book explores the fundamentals, implementations, and future of SCIM (System for Cross-domain Identity Management), a standardized protocol for automating user identity provisioning and synchronization across applications. Covering best practices, real-world case studies, open-source solutions, and integration with other identity protocols, it provides a comprehensive guide for organizations looking to enhance security, scalability, and efficiency in identity management. With insights into SCIM's role in cloud computing, IoT, and emerging technologies, this book serves as a valuable resource for IT professionals, developers, and security teams navigating the evolving landscape of identity and access management.
Show More
Product Format
Product Details
ISBN-13:
9798311034890
Binding:
Paperback or Softback (Trade Paperback (Us))
Content Language:
English
More Product Details
Page Count:
182
Carton Quantity:
42
Product Dimensions:
6.00 x 0.39 x 9.00 inches
Weight:
0.55 pound(s)
Country of Origin:
US
Subject Information
BISAC Categories
Computers | Security - General
Descriptions, Reviews, Etc.
publisher marketing
This book explores the fundamentals, implementations, and future of SCIM (System for Cross-domain Identity Management), a standardized protocol for automating user identity provisioning and synchronization across applications. Covering best practices, real-world case studies, open-source solutions, and integration with other identity protocols, it provides a comprehensive guide for organizations looking to enhance security, scalability, and efficiency in identity management. With insights into SCIM's role in cloud computing, IoT, and emerging technologies, this book serves as a valuable resource for IT professionals, developers, and security teams navigating the evolving landscape of identity and access management.
Show More
