Documentation Home
>
Sun OpenSSO Enterprise 8.0 Deployment Planning Guide
>
PartĀ II Determining Which Features to Deploy
>
ChapterĀ 16 Implementing Cross-Domain Single Sign-On with Cookie Hijacking Prevention
> Analyzing the Deployment Architecture
Sun OpenSSO Enterprise 8.0 Deployment Planning Guide
Previous
: About Cookie Hijacking Prevention
Next
: Considering Assumptions, Dependencies, and Constraints
Analyzing the Deployment Architecture
The following figure illustrates a typical CDSSO deployment architecture.
Figure 16–5 Deployment Architecture
Previous
: About Cookie Hijacking Prevention
Next
: Considering Assumptions, Dependencies, and Constraints
© 2010, Oracle Corporation and/or its affiliates