Skip to main content

Identity and Device Trust

  • Chapter
  • First Online:
  • 949 Accesses

Abstract

Chapter 7 was about securing devices. Part of security is securing the connections between devices. Chapter 9 was about directory services. Most of the protocols for single sign on for directory services were developed in a time when most of an organization's devices were on a single network and most resources were located behind a firewall. Today, devices are spread all around the world and devices access multiple sites built by multiple Software as a Service vendors, who organizations want to use the same credentials to access their account as they use when those users are in the office.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Charles Edge and Rich Trouton

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Edge, C., Trouton, R. (2020). Identity and Device Trust. In: Apple Device Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5388-5_12

Download citation

Publish with us

Policies and ethics