0%

Mapping a person, place, or thing to a software resource in a verifiable manner is the basis of identity. Confirming that identity is a complex process, particularly when the identity mapping has to be verified genuine and authentic. Everything on the internet that houses private information is tied to identity and identity management.

In this report, author Lee Atchison shows C-suite execs, engineering execs, architects, and others involved in building software applications the modern identity management techniques available to safeguard that simple access point. You'll learn how and why these techniques constantly need to keep up with modern application development, and you'll understand the growing sophistication of the people who safely interact or maliciously tamper with them.

  • Explore the complex process of mapping a person, place, or thing to a software resource in a verifiable manner
  • Get examples of real-world authentication, including methods and best practices for working with application credentials
  • Understand the differences between single-factor and multifactor authentication
  • Learn why every authentication method has flaws, including today's state-of-the-art processes
  • Explore authorization, the process for granting users access to specific resources, and how it differs from authentication
  • Understand trust relationships using trust systems to create more secure applications and systems

Table of Contents

  1. Identity in Modern Applications
    1. What Is Application Identity?
    2. Example Identities
    3. What Makes Up an Identity
    4. Authentication
    5. Examples of Real-World Authentication
    6. Claims and Proofs
    7. Single-Factor Versus Multifactor Authentication
    8. Authentication Vulnerabilities
    9. Identity-Recovery Vulnerabilities
    10. Authorization
    11. AWS IAM Policies
    12. Google Zanzibar
    13. Profiles
    14. Challenges of Identity Management
    15. Trust Systems
    16. Simple Trust Systems
    17. Why Do I Care About Trust Systems?
    18. Leveraging Trust to Improve Security
    19. Picking a Trust System
    20. Future of Identity Management
    21. Thing You Know, Thing You Have
    22. Nonhuman Identities
    23. Global Identity: The Value of Network Effects
    24. Summary
3.139.86.56