Skip to main content

Identity and Device Trust

  • Chapter
  • First Online:
Apple Device Management
  • 581 Accesses

Abstract

Chapter 10 was about securing devices. Part of security is securing the connections between devices. Chapter 10 was about directory services. Most of the protocols for single sign-on for directory services were developed in a time when most of an organization’s devices were on a single network and most resources were located behind a firewall. Today, devices are spread all around the world, and devices access multiple sites built by multiple Software as a Service vendors, who organizations want to use the same credentials to access their account as they use when those users are in the office.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Edge, C., Trouton, R. (2023). Identity and Device Trust. In: Apple Device Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9156-6_12

Download citation

Publish with us

Policies and ethics