ABSTRACT

From the enterprise perspective, the kind of federated identity schemes discussed in other chapters allow an application belonging to one enterprise to use credentials that have been issued by other enterprises to prove the identity of users.