[PDF.24us] Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone
Download PDF | ePub | DOC | audiobook | ebooks
Home -> Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone free download
Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone
[PDF.oi42] Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone
Identity, Authentication, and Access Steve Martinelli, Henry Nash, Brad Topol epub Identity, Authentication, and Access Steve Martinelli, Henry Nash, Brad Topol pdf download Identity, Authentication, and Access Steve Martinelli, Henry Nash, Brad Topol pdf file Identity, Authentication, and Access Steve Martinelli, Henry Nash, Brad Topol audiobook Identity, Authentication, and Access Steve Martinelli, Henry Nash, Brad Topol book review Identity, Authentication, and Access Steve Martinelli, Henry Nash, Brad Topol summary
| #1644232 in Books | O Reilly Media | 2015-12-31 | 2015-12-31 | Original language:English | PDF # 1 | 9.00 x.30 x6.90l,.48 | File type: PDF | 130 pages | O Reilly Media||1 of 1 people found the following review helpful.| A great read, every OpenStack user and developer should have one within arms reach|By Amrith|I have read and re-read the Keystone book by Brad, Steve, and Henry. I think it is a very well written book and provides a wealth of details for both a user of Keystone and an OpenStack contributor who wishes to either contribute to Keystone or some other project that will interact with|About the Author|
|Steve Martinelli is an OpenStack Active Technical Contributor and a Keystone Core Contributor. He primarily focuses on enabling Keystone, which is OpenStack's Identity Manager, to better integrate into enterprise environments. Steve was re
Keystone—OpenStack's Identity service—provides secure controlled access to a cloud’s resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.
Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to ...
You easily download any file type for your device.Identity, Authentication, and Access Management in OpenStack: Implementing and Deploying Keystone | Steve Martinelli, Henry Nash, Brad Topol. A good, fresh read, highly recommended.