Knowledge (XXG)

Security domain

Source 📝

188: 22: 149:
A security domain is defined as an application or a set of applications that collectively rely on a shared security token for processes such as authentication, authorization, and session management. In essence, a security token is granted to a user following their active authentication using a user
175:
In an identity federation that spans two different organizations that share a business partner, customer or business process outsourcing relation – a partner domain would be another security domain with which users and applications (from the local security domain) interact.
150:
ID and password within the security domain. This token establishes a foundation of trust, enabling seamless and secure interactions across the applications within the defined security domain.
130:
is the determining factor in the classification of an enclave of servers/computers. A network with a different security domain is kept separate from other networks. For example,
229: 113: 222: 43: 253: 94: 47: 66: 248: 73: 215: 32: 51: 36: 80: 62: 158: 165: 199: 87: 195: 169: 187: 242: 21: 135: 131: 143: 139: 157:
All the web applications that trust a session cookie issued by a
15: 203: 164:
All the Windows applications and services that trust a
223: 8: 50:. Unsourced material may be challenged and 230: 216: 114:Learn how and when to remove this message 153:Examples of a security domain include: 7: 184: 182: 48:adding citations to reliable sources 202:. You can help Knowledge (XXG) by 14: 186: 20: 1: 270: 181: 146:are all kept separate. 254:Computer network stubs 159:Web Access Management 44:improve this article 249:Computer networking 196:computer networking 211: 210: 168:ticket issued by 124: 123: 116: 98: 63:"Security domain" 261: 232: 225: 218: 190: 183: 170:Active Directory 119: 112: 108: 105: 99: 97: 56: 24: 16: 269: 268: 264: 263: 262: 260: 259: 258: 239: 238: 237: 236: 179: 128:security domain 120: 109: 103: 100: 57: 55: 41: 25: 12: 11: 5: 267: 265: 257: 256: 251: 241: 240: 235: 234: 227: 220: 212: 209: 208: 191: 173: 172: 162: 122: 121: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 266: 255: 252: 250: 247: 246: 244: 233: 228: 226: 221: 219: 214: 213: 207: 205: 201: 198:article is a 197: 192: 189: 185: 180: 177: 171: 167: 163: 160: 156: 155: 154: 151: 147: 145: 141: 137: 133: 129: 118: 115: 107: 104:February 2022 96: 93: 89: 86: 82: 79: 75: 72: 68: 65: –  64: 60: 59:Find sources: 53: 49: 45: 39: 38: 34: 29:This article 27: 23: 18: 17: 204:expanding it 193: 178: 174: 152: 148: 127: 125: 110: 101: 91: 84: 77: 70: 58: 42:Please help 30: 243:Categories 74:newspapers 31:does not 166:Kerberos 161:product 136:SIPRNet 132:NIPRNet 88:scholar 52:removed 37:sources 144:NSANet 142:, and 90:  83:  76:  69:  61:  194:This 140:JWICS 95:JSTOR 81:books 200:stub 67:news 35:any 33:cite 46:by 245:: 138:, 134:, 126:A 231:e 224:t 217:v 206:. 117:) 111:( 106:) 102:( 92:· 85:· 78:· 71:· 54:. 40:.

Index


cite
sources
improve this article
adding citations to reliable sources
removed
"Security domain"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
NIPRNet
SIPRNet
JWICS
NSANet
Web Access Management
Kerberos
Active Directory
Stub icon
computer networking
stub
expanding it
v
t
e
Categories
Computer networking
Computer network stubs

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.