Cargando…

Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /

Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wilson, Yvonne
Otros Autores: Hingnikar, Abhishek
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress, 2019.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_on1134073953
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 191230s2019 xxu ob 001 0 eng d
040 |a YDX  |b eng  |e pn  |c YDX  |d GW5XE  |d EBLCP  |d OCLCF  |d ESU  |d OCLCQ  |d SNK  |d LQU  |d UPM  |d UMI  |d UKMGB  |d UKAHL  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO 
015 |a GBC066496  |2 bnb 
016 7 |a 019659217  |2 Uk 
019 |a 1135663627  |a 1137845885  |a 1154456016 
020 |a 9781484250952  |q (electronic bk.) 
020 |a 1484250958  |q (electronic bk.) 
020 |z 148425094X 
020 |z 9781484250945 
024 8 |a 10.1007/978-1-4842-5 
029 1 |a AU@  |b 000066430920 
029 1 |a AU@  |b 000066462532 
029 1 |a UKMGB  |b 019659217 
035 |a (OCoLC)1134073953  |z (OCoLC)1135663627  |z (OCoLC)1137845885  |z (OCoLC)1154456016 
037 |a CL0501000110  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Wilson, Yvonne. 
245 1 0 |a Solving identity management in modern applications :  |b demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /  |c Yvonne Wilson, Abhishek Hingnikar. 
260 |a [Place of publication not identified] :  |b Apress,  |c 2019. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Chapter 1: The Hydra of Modern Identity -- Chapter 2: The Life of an Identity -- Chapter 3: Evolution of Identity -- Chapter 4: Identity Provisioning -- Chapter 5: OAuth 2.0 and API Authorization -- Chapter 6: OIDC OpenID Connect -- Chapter 7: SAML 2.0 -- Chapter 8: Authorization and Policy Enforcement -- Chapter 9: Sample Application with Custom API -- Chapter 10: Sessions -- Chapter 11: Single Sign-on -- Chapter 12: Strong Authentication -- Chapter 13: Logout -- Chapter 14: Account Management -- Chapter 15: Deprovisioning -- Chapter 16: Troubleshooting -- Chapter 17: Exceptions -- Chapter 18: Less Common Requirements -- Chapter 19: Failures -- Chapter 20: Compliance -- Chapter 21: Looking into the Crystal Ball -- Chapter 22: Conclusion -- Appendix A: Glossary -- Appendix B: Resources for Further Learning -- Appendix C: SAML Authentication Request and Response -- Appendix D: Public Key Cryptography -- Appendix E: Troubleshooting Tools -- Appendix F: Privacy Legislation -- Appendix G: Security Compliance Frameworks 
520 |a Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. What You'll Learn: Understand key identity management concepts Incorporate essential design principles Design authentication and access control for a modern application Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0) Review historical failures and know how to avoid them. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
700 1 |a Hingnikar, Abhishek. 
776 0 8 |i Print version:  |a Wilson, Yvonne.  |t Solving identity management in modern applications.  |d [Place of publication not identified] : Apress, 2019  |z 148425094X  |z 9781484250945  |w (OCoLC)1104219925 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484250952/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37483602 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5997302 
938 |a YBP Library Services  |b YANK  |n 301028006 
994 |a 92  |b IZTAP