<span>Know how to design and use identity management to protect your application and the data it manages.<br><br>At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides
Solving Identity Management In Modern Applications: Demystifying OAuth 2.0, OpenID Connect, And SAML 2.0
โ Scribed by Yvonne Wilson, Abhishek Hingnikar
- Publisher
- Apress
- Year
- 2019
- Tongue
- English
- Leaves
- 323
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. What Youโll Learn:
โข Understand key identity management concepts
โข Incorporate essential design principles
โข Design authentication and access control for a modern application
โข Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)
โข Review historical failures and know how to avoid them
Who This Book Is For: Developers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution
โฆ Table of Contents
Front Matter ....Pages i-xxvi
The Hydra of Modern Identity (Yvonne Wilson, Abhishek Hingnikar)....Pages 1-7
The Life of an Identity (Yvonne Wilson, Abhishek Hingnikar)....Pages 9-18
Evolution of Identity (Yvonne Wilson, Abhishek Hingnikar)....Pages 19-28
Identity Provisioning (Yvonne Wilson, Abhishek Hingnikar)....Pages 29-49
OAuth 2.0 and API Authorization (Yvonne Wilson, Abhishek Hingnikar)....Pages 51-75
OpenID Connect (Yvonne Wilson, Abhishek Hingnikar)....Pages 77-97
SAML 2.0 (Yvonne Wilson, Abhishek Hingnikar)....Pages 99-111
Authorization and Policy Enforcement (Yvonne Wilson, Abhishek Hingnikar)....Pages 113-122
Sample Application with Custom API (Yvonne Wilson, Abhishek Hingnikar)....Pages 123-141
Sessions (Yvonne Wilson, Abhishek Hingnikar)....Pages 143-150
Single Sign-On (Yvonne Wilson, Abhishek Hingnikar)....Pages 151-157
Stronger Authentication (Yvonne Wilson, Abhishek Hingnikar)....Pages 159-166
Logout (Yvonne Wilson, Abhishek Hingnikar)....Pages 167-179
Account Management (Yvonne Wilson, Abhishek Hingnikar)....Pages 181-186
Deprovisioning (Yvonne Wilson, Abhishek Hingnikar)....Pages 187-194
Troubleshooting (Yvonne Wilson, Abhishek Hingnikar)....Pages 195-206
Exceptions (Yvonne Wilson, Abhishek Hingnikar)....Pages 207-217
Less Common Requirements (Yvonne Wilson, Abhishek Hingnikar)....Pages 219-228
Failures (Yvonne Wilson, Abhishek Hingnikar)....Pages 229-240
Compliance (Yvonne Wilson, Abhishek Hingnikar)....Pages 241-252
Looking into the Crystal Ball (Yvonne Wilson, Abhishek Hingnikar)....Pages 253-265
Conclusion (Yvonne Wilson, Abhishek Hingnikar)....Pages 267-268
Back Matter ....Pages 269-311
โฆ Subjects
Security, Identity Management
๐ SIMILAR VOLUMES
<p><span>Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak</span></p><p><span>Purchase of the print or Kindle book includes a free PDF eBook</span></p><h4><span>Key Features</span><
<p><b>Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications</b></p><h4>Key Features</h4><ul><li>Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples<
<p><b>Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications</b></p><h4>Key Features</h4><ul><li>Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples<
<p> A practical hands-on guide to implementing secure API authorization flow scenarios with OAuth 2.0 </p> <p><b>Overview</b></p> <ul> <li>Build web, client-side, desktop, and server-side secure OAuth 2.0 client applications by utilizing the appropriate grant flow for the given scenario</li> <li>Get
<p> A practical hands-on guide to implementing secure API authorization flow scenarios with OAuth 2.0 </p> <p><b>Overview</b></p> <ul> <li>Build web, client-side, desktop, and server-side secure OAuth 2.0 client applications by utilizing the appropriate grant flow for the given scenario</li> <li>Get