Tag

Identity Management

0 views collected around this technical thread.

Architect
Architect
Jul 10, 2024 · Information Security

Evolution and Design of Login Authentication Systems

This article examines the historical evolution of login authentication technologies, from simple cookie‑based methods to token mechanisms, unified account centers, OAuth 2.0, and modern one‑click solutions, while discussing design considerations, security challenges, and future trends such as AI‑driven identity verification.

Identity ManagementLogin AuthenticationOAuth
0 likes · 12 min read
Evolution and Design of Login Authentication Systems
Mike Chen's Internet Architecture
Mike Chen's Internet Architecture
Feb 26, 2024 · Information Security

Comprehensive Overview of Single Sign-On (SSO) and CAS Architecture

This article explains the fundamentals of Single Sign-On (SSO), why it is needed in distributed systems, details the components and workflow of the CAS (Central Authentication Service) implementation, and outlines common application scenarios such as e‑commerce, enterprise portals, education, and finance.

AuthenticationCASIdentity Management
0 likes · 7 min read
Comprehensive Overview of Single Sign-On (SSO) and CAS Architecture
Architects Research Society
Architects Research Society
Jun 14, 2023 · Information Security

Understanding CIAM: Customer Identity and Access Management and the UMM Solution

The article explains the concept of Customer Identity and Access Management (CIAM), its importance for public‑facing applications, key features, industry trends, Gartner insights, and compares major CIAM solutions—including the UMM offering—highlighting functional coverage and deployment options.

CIAMIAMIdentity Management
0 likes · 14 min read
Understanding CIAM: Customer Identity and Access Management and the UMM Solution
Architecture Digest
Architecture Digest
Nov 25, 2022 · Information Security

Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT

The article explains why enterprises need a unified account management system, defines key authentication terms, outlines the advantages of token‑based security, describes a complete OAuth2 password‑grant flow with JWT, and presents the technical choices and interface designs for implementing a robust, cross‑service authentication solution.

Identity ManagementJWTOAuth2
0 likes · 10 min read
Design of a Standardized Token‑Based Authentication System Using OAuth2 and JWT
Efficient Ops
Efficient Ops
Jul 7, 2020 · Information Security

Securing Operations with JD Cloud’s Bastion Host: Design, Challenges & Deployment

This article reviews JD Cloud’s bastion host solution presented at the 2020 Global New‑Generation Software Engineering Summit, detailing the security challenges of modern operations, compliance requirements, design principles, cloud‑native architecture, and real‑world deployments in enterprises and finance.

High AvailabilityIdentity Managementaudit
0 likes · 15 min read
Securing Operations with JD Cloud’s Bastion Host: Design, Challenges & Deployment
Tencent Cloud Developer
Tencent Cloud Developer
Jun 9, 2020 · Blockchain

Tencent Cloud Blockchain Engine Architecture: High-Performance, Secure, and Scalable Blockchain Technology Implementation

Tencent Cloud Blockchain Engine delivers a high‑performance, secure, and scalable three‑layer SMR architecture that enables massive cross‑organizational collaboration through hierarchical governance, BFT consensus, homomorphic encryption, zero‑knowledge proofs, and efficient cross‑chain transaction and identity management, supporting 20,000+ TPS and diverse government, education, healthcare, and copyright use cases.

BlockchainConsensus AlgorithmCross-chain
0 likes · 15 min read
Tencent Cloud Blockchain Engine Architecture: High-Performance, Secure, and Scalable Blockchain Technology Implementation
Architects' Tech Alliance
Architects' Tech Alliance
May 29, 2018 · Cloud Computing

Understanding OpenStack Keystone Authentication and Token Workflow

This article explains OpenStack's Keystone service, describing how token‑based authentication enables unified identity, authorization, and accounting across Nova, Glance, and Neutron components, and compares the approach with public‑cloud AK/SK mechanisms.

AuthenticationIdentity ManagementKeystone
0 likes · 12 min read
Understanding OpenStack Keystone Authentication and Token Workflow
Efficient Ops
Efficient Ops
May 4, 2016 · Operations

How to Build a Scalable OpenLDAP‑Based Unified Identity System for Enterprise Operations

This article walks through the evolution of a unified identity authentication system built on OpenLDAP, covering initial password‑management pain points, design decisions involving PAM and sudo, role‑based access control, multi‑IDC distributed deployment, security hardening with TLS and anti‑brute‑force measures, and practical host‑restriction techniques for reliable, secure operations.

Identity ManagementOpenLDAPPrivilege Management
0 likes · 15 min read
How to Build a Scalable OpenLDAP‑Based Unified Identity System for Enterprise Operations