0%

Book Description

Know how to design and use identity management to protect your application and the data it manages.

At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.

Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.


What You’ll Learn

  • Understand key identity management concepts
  • Incorporate essential design principles
  • Design authentication and access control for a modern application
  • Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)
  • Review historical failures and know how to avoid them


Who This Book Is For

Developers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution

Table of Contents

  1. Cover
  2. Front Matter
  3. 1. The Hydra of Modern Identity
  4. 2. The Life of an Identity
  5. 3. Evolution of Identity
  6. 4. Identity Provisioning
  7. 5. OAuth 2.0 and API Authorization
  8. 6. OpenID Connect
  9. 7. SAML 2.0
  10. 8. Authorization and Policy Enforcement
  11. 9. Sample Application with Custom API
  12. 10. Sessions
  13. 11. Single Sign-On
  14. 12. Stronger Authentication
  15. 13. Logout
  16. 14. Account Management
  17. 15. Deprovisioning
  18. 16. Troubleshooting
  19. 17. Exceptions
  20. 18. Less Common Requirements
  21. 19. Failures
  22. 20. Compliance
  23. 21. Looking into the Crystal Ball
  24. 22. Conclusion
  25. Back Matter
3.236.55.137