M. S. Eremija, Nebojša R. Ilić, M. Cvetanović, J. Protić, Z. Radivojević
{"title":"Identity provider deployment based on container technology","authors":"M. S. Eremija, Nebojša R. Ilić, M. Cvetanović, J. Protić, Z. Radivojević","doi":"10.1109/TELFOR.2017.8249427","DOIUrl":null,"url":null,"abstract":"Identity Providers are an integral part of Identity Federations. Many different and complex technologies are needed to create an Identity Provider, which require adequate hardware resources. Containers address the complexity and resources issues, while enabling faster deployment. Even though containers cannot be perceived as a replacement for currently available technologies, they are already widely deployed. This paper proposes using containers for easier implementation of Identity Providers, while lowering resource usage and complexity imposed by deployment requirements.","PeriodicalId":422501,"journal":{"name":"2017 25th Telecommunication Forum (TELFOR)","volume":"16 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 25th Telecommunication Forum (TELFOR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TELFOR.2017.8249427","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Identity Providers are an integral part of Identity Federations. Many different and complex technologies are needed to create an Identity Provider, which require adequate hardware resources. Containers address the complexity and resources issues, while enabling faster deployment. Even though containers cannot be perceived as a replacement for currently available technologies, they are already widely deployed. This paper proposes using containers for easier implementation of Identity Providers, while lowering resource usage and complexity imposed by deployment requirements.