๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Solving Identity Management In Modern Applications: Demystifying OAuth 2.0, OpenID Connect, And SAML 2.0

โœ Scribed by Yvonne Wilson, Abhishek Hingnikar


Publisher
Apress
Year
2019
Tongue
English
Leaves
323
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. What Youโ€™ll Learn:
โ€ข Understand key identity management concepts
โ€ข Incorporate essential design principles
โ€ข Design authentication and access control for a modern application
โ€ข Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)
โ€ข Review historical failures and know how to avoid them
Who This Book Is For: Developers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution

โœฆ Table of Contents


Front Matter ....Pages i-xxvi
The Hydra of Modern Identity (Yvonne Wilson, Abhishek Hingnikar)....Pages 1-7
The Life of an Identity (Yvonne Wilson, Abhishek Hingnikar)....Pages 9-18
Evolution of Identity (Yvonne Wilson, Abhishek Hingnikar)....Pages 19-28
Identity Provisioning (Yvonne Wilson, Abhishek Hingnikar)....Pages 29-49
OAuth 2.0 and API Authorization (Yvonne Wilson, Abhishek Hingnikar)....Pages 51-75
OpenID Connect (Yvonne Wilson, Abhishek Hingnikar)....Pages 77-97
SAML 2.0 (Yvonne Wilson, Abhishek Hingnikar)....Pages 99-111
Authorization and Policy Enforcement (Yvonne Wilson, Abhishek Hingnikar)....Pages 113-122
Sample Application with Custom API (Yvonne Wilson, Abhishek Hingnikar)....Pages 123-141
Sessions (Yvonne Wilson, Abhishek Hingnikar)....Pages 143-150
Single Sign-On (Yvonne Wilson, Abhishek Hingnikar)....Pages 151-157
Stronger Authentication (Yvonne Wilson, Abhishek Hingnikar)....Pages 159-166
Logout (Yvonne Wilson, Abhishek Hingnikar)....Pages 167-179
Account Management (Yvonne Wilson, Abhishek Hingnikar)....Pages 181-186
Deprovisioning (Yvonne Wilson, Abhishek Hingnikar)....Pages 187-194
Troubleshooting (Yvonne Wilson, Abhishek Hingnikar)....Pages 195-206
Exceptions (Yvonne Wilson, Abhishek Hingnikar)....Pages 207-217
Less Common Requirements (Yvonne Wilson, Abhishek Hingnikar)....Pages 219-228
Failures (Yvonne Wilson, Abhishek Hingnikar)....Pages 229-240
Compliance (Yvonne Wilson, Abhishek Hingnikar)....Pages 241-252
Looking into the Crystal Ball (Yvonne Wilson, Abhishek Hingnikar)....Pages 253-265
Conclusion (Yvonne Wilson, Abhishek Hingnikar)....Pages 267-268
Back Matter ....Pages 269-311

โœฆ Subjects


Security, Identity Management


๐Ÿ“œ SIMILAR VOLUMES


Solving Identity Management in Modern Ap
โœ Yvonne Wilson, Abhishek Hingnikar ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Apress ๐ŸŒ English

<span>Know how to design and use identity management to protect your application and the data it manages.<br><br>At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides

Keycloak - Identity and Access Managemen
โœ Stian Thorgersen, Pedro Igor Silva ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><span>Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak</span></p><p><span>Purchase of the print or Kindle book includes a free PDF eBook</span></p><h4><span>Key Features</span><

Keycloak - Identity and Access Managemen
โœ Stian Thorgersen, Pedro Igor Silva ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications</b></p><h4>Key Features</h4><ul><li>Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples<

Keycloak - Identity and Access Managemen
โœ Stian Thorgersen, Pedro Igor Silva ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications</b></p><h4>Key Features</h4><ul><li>Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples<

OAuth 2.0 Identity and Access Management
โœ Martin Spasovski ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p> A practical hands-on guide to implementing secure API authorization flow scenarios with OAuth 2.0 </p> <p><b>Overview</b></p> <ul> <li>Build web, client-side, desktop, and server-side secure OAuth 2.0 client applications by utilizing the appropriate grant flow for the given scenario</li> <li>Get

OAuth 2.0 Identity and Access Management
โœ Martin Spasovski ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p> A practical hands-on guide to implementing secure API authorization flow scenarios with OAuth 2.0 </p> <p><b>Overview</b></p> <ul> <li>Build web, client-side, desktop, and server-side secure OAuth 2.0 client applications by utilizing the appropriate grant flow for the given scenario</li> <li>Get