Cargando…

Identity patterns and strategies for enterprise design enterprise cloud identity model with Oauth 2.0 and active directory /

Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organ...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Federico, Giuseppe Di (Autor), Barcaroli, Fabrizio (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1355984666
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 230102s2022 enk o 000 0 eng d
040 |a YDX  |b eng  |c YDX  |d ORMDA  |d UKAHL  |d OCLCF  |d IEEEE  |d OCLCO 
020 |a 9781801819749  |q (electronic bk.) 
020 |a 1801819742  |q (electronic bk.) 
020 |z 1801810842 
020 |z 9781801810845 
029 1 |a AU@  |b 000073212454 
035 |a (OCoLC)1355984666 
037 |a 9781801810845  |b O'Reilly Media 
037 |a 10163647  |b IEEE 
050 4 |a HD30.38 
082 0 4 |a 005.8  |2 23/eng/20230105 
049 |a UAMI 
100 1 |a Federico, Giuseppe Di,  |e author. 
245 1 0 |a Identity patterns and strategies for enterprise  |h [electronic resource] :  |b design enterprise cloud identity model with Oauth 2.0 and active directory /  |c Giuseppe Di Federico, Fabrizio Barcaroli. 
260 |a Birmingham :  |b Packt Publishing,  |c 2023. 
300 |a 1 online resource 
520 |a Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows Book Description Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. What you will learn Understand the evolution of identity in the enterprise Discover basic to advanced OAuth patterns and implementations Find out how OAuth standards are usually adopted in the enterprise Explore proven solutions for modern identity challenges Use Azure AD for implementing identity solutions Comprehend how company structure and strategies influence design decisions Who this book is for This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. 
505 0 |a Table of Contents Walkthrough of Digital Identity in the Enterprise The Cloud Era and Identity OAuth 2.0 and OIDC Authentication Flows Exploring Identity Patterns Trends in API Authentication Identity Providers in the Real World Real-World Identity Provider – A Zoom-In on Azure Active Directory Exploring Real-World Scenarios. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a OAuth. 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Computers  |x Access control. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a Business enterprises  |x Computer networks  |x Security measures  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
700 1 |a Barcaroli, Fabrizio,  |e author. 
776 0 8 |i Print version:  |z 1801810842  |z 9781801810845  |w (OCoLC)1322048628 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781801810845/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH40063637 
938 |a YBP Library Services  |b YANK  |n 303914727 
994 |a 92  |b IZTAP