Solving Identity Management in Modern Applications Solving Identity Management in Modern Applications

Solving Identity Management in Modern Applications

Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

    • $34.99
    • $34.99

Publisher Description

Know how to design and use identity management to protect your application and the data it manages.

At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.

Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.

What You’ll Learn:

Understand key identity management concepts
Incorporate essential design principles
Design authentication and access control for a modern application
Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)
Review historical failures and know how to avoid them

GENRE
Computers & Internet
RELEASED
2019
December 18
LANGUAGE
EN
English
LENGTH
337
Pages
PUBLISHER
Apress
SELLER
Springer Nature B.V.
SIZE
5.1
MB
Enterprise Security Architecture Using IBM Tivoli Security Solutions Enterprise Security Architecture Using IBM Tivoli Security Solutions
2007
API Security: A guide to building and securing APIs from the developer team at Okta API Security: A guide to building and securing APIs from the developer team at Okta
2018
An Executive Guide to Identity Access Management - 2nd Edition An Executive Guide to Identity Access Management - 2nd Edition
2018
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
2012
Understanding SOA Security Design and Implementation Understanding SOA Security Design and Implementation
2007
Iron-Clad Java Iron-Clad Java
2014