Details

Solving Identity Management in Modern Applications


Solving Identity Management in Modern Applications

Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

von: Yvonne Wilson, Abhishek Hingnikar

46,99 €

Verlag: Apress
Format: PDF
Veröffentl.: 18.12.2019
ISBN/EAN: 9781484250952
Sprache: englisch

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<p>Know how to design and use identity management to protect your application and the data it manages.</p><div><p>At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications.&nbsp;This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.</p><p><b><i>Solving Identity and Access Management in Modern Applications </i></b>gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain&nbsp;account creation, session and access management, account termination, and more.</p><p></p>

<p><b><br></b></p><p><b>What You’ll Learn</b><br></p>

<p></p><ul><li>Understand key identity management concepts<br></li><li>Incorporate essential design principles<br></li><li>Design authentication and access control for a modern application<br></li><li>Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)<br></li><li>Review historical failures and know how to avoid them<br></li></ul><p></p>

<p></p>

<p></p>

<p></p>

<p></p>

<p><b><br></b></p><p><b>Who This Book Is For</b></p>

<p>Developers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution<br></p></div>
Chapter 1: The Hydra of Modern Identity.- Chapter 2: The Life of an Identity.- Chapter 3: Evolution of Identity.- Chapter 4: Identity Provisioning.- Chapter 5: OAuth 2.0 and API Authorization .- Chapter 6: OIDC OpenID Connect.- Chapter 7: SAML 2.0.- Chapter 8: Authorization and Policy Enforcement.- Chapter 9: Sample Application with Custom API.- Chapter 10: Sessions.- Chapter 11: Single Sign-on.- Chapter 12: Strong Authentication.- Chapter 13: Logout.- Chapter 14: Account Management.- Chapter 15: Deprovisioning.- Chapter 16: Troubleshooting.- Chapter 17: Exceptions.- Chapter 18: Less Common Requirements.- Chapter 19: Failures.- Chapter 20: Compliance.- Chapter 21: Looking into the Crystal Ball.- Chapter 22: Conclusion.- Appendix A: Glossary.- Appendix B: Resources for Further Learning.- Appendix C: SAML Authentication Request and Response.- Appendix D: Public Key Cryptography.- Appendix E: Troubleshooting Tools.- Appendix F: Privacy Legislation.- Appendix G: Security Compliance Frameworks .-&nbsp;</p><p></p>
<b>Yvonne Wilson </b>has had many roles in the software industry related to security and identity management as a developer, security architect, customer success engineer working with customers, founder of cloud identity services, and director of a security governance, risk, and compliance function. She was responsible for IT security strategy and architecture at Sun Microsystems, founded and designed the identity management services offered through Oracle Managed Cloud Services, and works as Senior Director of GRC at Auth0 with customers and vendors to ensure end-to-end security of the application technology supply chain.<p></p>

In working with business teams at Sun and while founding the initial support team at Auth0, Yvonne worked with many customers, from small startups to large enterprises, and through the implementation of SSO, federated SSO, adaptive knowledge-based authentication, and identity provisioning. From this depth of experience, she realized the need for a basic understanding of identity management concepts by business application owners as well as architects and developers.&nbsp;<p></p>

<p><b>Abhishek Hingnikar</b> has enjoyed writing software from an early age and has worked on multiple startups during his career. He currently works as a pre-sales engineer at Auth0 where he helps customers architect federated identity management solutions using OIDC, SAML, WSFed, and OAuth.</p>
<p>Know how to design and use identity management to protect your application and the data it manages.</p><div><p>At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications.&nbsp;This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.</p><p><b><i>Solving Identity and Access Management in Modern Applications&nbsp;</i></b>gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain&nbsp;account creation, session and access management, account termination, and more.</p><p></p><p>What You’ll Learn:<br></p><p></p><ul><li>Understand key identity management concepts<br></li><li>Incorporate essential design principles<br></li><li>Design authentication and access control for a modern application<br></li><li>Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)<br></li><li>Review historical failures and know how to avoid them<br></li></ul><p></p><p></p><p></p><p></p><p></p><p><br></p></div>
Helps you select or design appropriate identity management approaches to protect your applications Gives you a depth of background to help you confidently describe the identity management for your application to prospective customers and partners Serves as a handy reference guide on how to develop your architecture and application from an identity management perspective

Diese Produkte könnten Sie auch interessieren:

Quantifiers in Action
Quantifiers in Action
von: Antonio Badia
PDF ebook
96,29 €
Managing and Mining Uncertain Data
Managing and Mining Uncertain Data
von: Charu C. Aggarwal
PDF ebook
96,29 €