Abstract
Chapter 7 was about securing devices. Part of security is securing the connections between devices. Chapter 9 was about directory services. Most of the protocols for single sign on for directory services were developed in a time when most of an organization's devices were on a single network and most resources were located behind a firewall. Today, devices are spread all around the world and devices access multiple sites built by multiple Software as a Service vendors, who organizations want to use the same credentials to access their account as they use when those users are in the office.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Charles Edge and Rich Trouton
About this chapter
Cite this chapter
Edge, C., Trouton, R. (2020). Identity and Device Trust. In: Apple Device Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5388-5_12
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5388-5_12
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5387-8
Online ISBN: 978-1-4842-5388-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)