Solving Identity Management in Modern Applications (eBook)
XXVI, 311 Seiten
Apress (Verlag)
978-1-4842-5095-2 (ISBN)
Know how to design and use identity management to protect your application and the data it manages.
At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.
Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.
What You'll Learn
- Understand key identity management concepts
- Incorporate essential design principles
- Design authentication and access control for a modern application
- Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)
- Review historical failures and know how to avoid them
Who This Book Is For
Developers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution
Yvonne Wilson has had many roles in the software industry related to security and identity management as a developer, security architect, customer success engineer working with customers, founder of cloud identity services, and director of a security governance, risk, and compliance function. She was responsible for IT security strategy and architecture at Sun Microsystems, founded and designed the identity management services offered through Oracle Managed Cloud Services, and works as Senior Director of GRC at Auth0 with customers and vendors to ensure end-to-end security of the application technology supply chain. In working with business teams at Sun and while founding the initial support team at Auth0, Yvonne worked with many customers, from small startups to large enterprises, and through the implementation of SSO, federated SSO, adaptive knowledge-based authentication, and identity provisioning. From this depth of experience, she realized the need for a basic understanding of identity management concepts by business application owners as well as architects and developers.
Abhishek Hingnikar has enjoyed writing software from an early age and has worked on multiple startups during his career. He currently works as a pre-sales engineer at Auth0 where he helps customers architect federated identity management solutions using OIDC, SAML, WSFed, and OAuth.
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.What You'll LearnUnderstand key identity management conceptsIncorporate essential design principlesDesign authentication and access control for a modern applicationKnow the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)Review historical failures and know how to avoid themWho This Book Is ForDevelopers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution
Erscheint lt. Verlag | 18.12.2019 |
---|---|
Zusatzinfo | XXVI, 311 p. 31 illus. |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Access Control • Account provisioning • authentication • authorization • Identity Lifecycle • Identity Management • Identity Management Lifecycle • OIDC/OAuth2.0 • SAML 2.0 • Single Sign-On (SSO) • SSO session management |
ISBN-10 | 1-4842-5095-8 / 1484250958 |
ISBN-13 | 978-1-4842-5095-2 / 9781484250952 |
Haben Sie eine Frage zum Produkt? |
Größe: 4,9 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich