Abstract
Over the years, there has been an ongoing evolution in how identity information is stored and used to enable users to access applications and the functionality they provide. You’ll see in this chapter that each bit of progress has solved some problems but given rise to new ones, as technology and security challenges evolved. We’ll describe some past approaches that have been used to manage identity information and provide authentication and authorization. We’ve selected specific technologies to highlight specific advantages and disadvantages of each approach that may help you evaluate solutions for your project. We’ll also discuss why you should use an industry standard protocol instead of inventing your own solution. Subsequent chapters will then cover specific protocols in more depth.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Such as Oracle and SAP application suites.
- 2.
As an optimization, an agent was sometimes installed in front of the application to check session state with the SSO server and only redirect the user to the SSO server if the session state could not be confirmed.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Yvonne Wilson, Abhishek Hingnikar
About this chapter
Cite this chapter
Wilson, Y., Hingnikar, A. (2019). Evolution of Identity. In: Solving Identity Management in Modern Applications. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5095-2_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5095-2_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5094-5
Online ISBN: 978-1-4842-5095-2
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books