
3
About this document
Chapter 1 Designing Security in the GSA
Overview
Information Gathering
Content Acquisition
Single vs. Multiple identities
Selecting an authorization mechanism
Chapter 2 Using Out of box features
Silent authentication
SAML
Early binding with Per-URL ACL
Connectors using Per-URL ACL
Connector 4.0(beta)
Security in Windows environments
Perimeter security
Secure Search Example
Chapter 3 Authentication for Developers
Forms authentication with cookie cracking
SAML
Cookie cracking vs. SAML
Connector Framework for Group Resolution
Trusted Application(beta)
Connector 4.0 Authentication (beta)
Chapter 4 Authorization for Developers
Overview
Per-URL ACLs
SAML authorization
Connector Framework for Authorization
Connector 4.0 Authorization (beta)
Web proxy
Summary
Security Best Practices Overview
Appendix A
Sample Trusted Application client code in C#
Comentarios a estos manuales