Cargando…

Solving identity management in modern applications : demystifying OAuth 2.0, OpenID Connect, and SAML 2 /

Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Wilson, Yvonne (Autor), Hingnikar, Abhishek (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Apress, [2023]
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1351472103
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 221122t20232023nyu ob 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA  |d GW5XE  |d YDX  |d EBLCP  |d OCLCF  |d OCLCQ  |d N$T  |d YDX  |d OCLCO 
019 |a 1351463175  |a 1351748273  |a 1374584481 
020 |a 9781484282618  |q electronic book 
020 |a 1484282612  |q electronic book 
020 |z 9781484282601 
020 |z 1484282604 
024 7 |a 10.1007/978-1-4842-8261-8  |2 doi 
029 1 |a AU@  |b 000073249589 
029 1 |a AU@  |b 000073291174 
029 1 |a AU@  |b 000072998319 
035 |a (OCoLC)1351472103  |z (OCoLC)1351463175  |z (OCoLC)1351748273  |z (OCoLC)1374584481 
037 |a 9781484282618  |b O'Reilly Media 
050 4 |a QA76.9.A25  |b W55 2023 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23/eng/20221122 
049 |a UAMI 
100 1 |a Wilson, Yvonne,  |e author. 
245 1 0 |a Solving identity management in modern applications :  |b demystifying OAuth 2.0, OpenID Connect, and SAML 2 /  |c Yvonne Wilson, Abhishek Hingnikar. 
250 |a Second edition. 
264 1 |a New York :  |b Apress,  |c [2023] 
264 4 |c ©2023 
300 |a 1 online resource (398 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. This expanded edition has been revised to provide an overview of the new version of OAuth (2.1)--the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101). What You'll Learn ⁰́Ø Understand key identity management concepts ⁰́Ø Incorporate essential design principles ⁰́Ø Design authentication and access control for a modern application ⁰́Ø Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0) ⁰́Ø Review historical failures and know how to avoid them Who This Book Is For Developers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution. 
505 0 |a Chapter 1: The Hydra of Modern Identity -- Chapter 2: The Life of an Identity -- Chapter 3: Evolution of Identity -- Chapter 4: Identity Provisioning -- Chapter 5: OAuth 2.0 and API Authorization -- Chapter 6: OIDC OpenID Connect -- Chapter 7: SAML 2 -- Chapter 8: Authorization and Policy Enforcement -- Chapter 9: Sessions -- Chapter 10: Using Modern Identity to Build Applications -- Chapter 11: Single Sign-on -- Chapter 12: Strong Authentication -- Chapter 13: Logout -- Chapter 14: Account Management -- Chapter 15: Deprovisioning -- Chapter 16: Troubleshooting -- Chapter 17: Exceptions -- Chapter 18: Less Common Requirements -- Chapter 19: Failures -- Chapter 20: Compliance -- Chapter 21: Looking into the Crystal Ball -- Chapter 22: Conclusion -- Appendix A: Glossary -- Appendix B: Resources for Further Learning -- Appendix C: SAML Authentication Request and Response -- Appendix D: Public Key Cryptography -- Appendix E: Troubleshooting Tools -- Appendix F: Privacy Legislation -- Appendix G: Security Compliance Frameworks. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
700 1 |a Hingnikar, Abhishek,  |e author. 
776 0 8 |c Original  |z 1484282604  |z 9781484282601  |w (OCoLC)1310394642 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484282618/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 18218289 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL7143306 
938 |a EBSCOhost  |b EBSC  |n 3460070 
994 |a 92  |b IZTAP