Abstract
Previous chapters covered common identity management use cases. In this chapter, we’ll share some less common requirements that may apply to your project. Identifying the need for them early in a project can help you avoid surprises and project delays. We’ve organized these scenarios loosely around people, accounts, and environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Yvonne Wilson, Abhishek Hingnikar
About this chapter
Cite this chapter
Wilson, Y., Hingnikar, A. (2019). Less Common Requirements. In: Solving Identity Management in Modern Applications. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5095-2_18
Download citation
DOI: https://doi.org/10.1007/978-1-4842-5095-2_18
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-5094-5
Online ISBN: 978-1-4842-5095-2
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books