188:
22:
149:
A security domain is defined as an application or a set of applications that collectively rely on a shared security token for processes such as authentication, authorization, and session management. In essence, a security token is granted to a user following their active authentication using a user
175:
In an identity federation that spans two different organizations that share a business partner, customer or business process outsourcing relation – a partner domain would be another security domain with which users and applications (from the local security domain) interact.
150:
ID and password within the security domain. This token establishes a foundation of trust, enabling seamless and secure interactions across the applications within the defined security domain.
130:
is the determining factor in the classification of an enclave of servers/computers. A network with a different security domain is kept separate from other networks. For example,
229:
113:
222:
43:
253:
94:
47:
66:
248:
73:
215:
32:
51:
36:
80:
62:
158:
165:
199:
87:
195:
169:
187:
242:
21:
135:
131:
143:
139:
157:
All the web applications that trust a session cookie issued by a
15:
203:
164:
All the
Windows applications and services that trust a
223:
8:
50:. Unsourced material may be challenged and
230:
216:
114:Learn how and when to remove this message
153:Examples of a security domain include:
7:
184:
182:
48:adding citations to reliable sources
202:. You can help Knowledge (XXG) by
14:
186:
20:
1:
270:
181:
146:are all kept separate.
254:Computer network stubs
159:Web Access Management
44:improve this article
249:Computer networking
196:computer networking
211:
210:
168:ticket issued by
124:
123:
116:
98:
63:"Security domain"
261:
232:
225:
218:
190:
183:
170:Active Directory
119:
112:
108:
105:
99:
97:
56:
24:
16:
269:
268:
264:
263:
262:
260:
259:
258:
239:
238:
237:
236:
179:
128:security domain
120:
109:
103:
100:
57:
55:
41:
25:
12:
11:
5:
267:
265:
257:
256:
251:
241:
240:
235:
234:
227:
220:
212:
209:
208:
191:
173:
172:
162:
122:
121:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
266:
255:
252:
250:
247:
246:
244:
233:
228:
226:
221:
219:
214:
213:
207:
205:
201:
198:article is a
197:
192:
189:
185:
180:
177:
171:
167:
163:
160:
156:
155:
154:
151:
147:
145:
141:
137:
133:
129:
118:
115:
107:
104:February 2022
96:
93:
89:
86:
82:
79:
75:
72:
68:
65: –
64:
60:
59:Find sources:
53:
49:
45:
39:
38:
34:
29:This article
27:
23:
18:
17:
204:expanding it
193:
178:
174:
152:
148:
127:
125:
110:
101:
91:
84:
77:
70:
58:
42:Please help
30:
243:Categories
74:newspapers
31:does not
166:Kerberos
161:product
136:SIPRNet
132:NIPRNet
88:scholar
52:removed
37:sources
144:NSANet
142:, and
90:
83:
76:
69:
61:
194:This
140:JWICS
95:JSTOR
81:books
200:stub
67:news
35:any
33:cite
46:by
245::
138:,
134:,
126:A
231:e
224:t
217:v
206:.
117:)
111:(
106:)
102:(
92:·
85:·
78:·
71:·
54:.
40:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.