|
|
|
|
LEADER |
00000nam a22000007i 4500 |
001 |
OR_on1393113714 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
230808s2023 enka o 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|
020 |
|
|
|z 9781804616444
|
035 |
|
|
|a (OCoLC)1393113714
|
037 |
|
|
|a 9781804616444
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.76.P76
|
082 |
0 |
4 |
|a 005.8/3
|2 23/eng/20230808
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Thorgersen, Stian,
|e author.
|
245 |
1 |
0 |
|a Keycloak :
|b identity and access management for modern applications /
|c Stian Thorgersen, Pedro Igor Silva.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing Ltd.,
|c 2023.
|
300 |
|
|
|a 1 online resource (350 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover Keycloak by understanding Identity and Access Management and integrating it with existing user bases Implement authentication and authorization in applications using Keycloak 22 Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise Book Description The 2nd Edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter, while using the latest distribution of Keycloak. As you progress, you will understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications. By the end of this new edition, you will have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the newest features. What you will learn Understand how to install, configure and manage the latest version of Keycloak Leverage additional features and capabilities of Keycloak in this new version Discover new updates to installing and running Keycloak Secure new and existing applications with Keycloak Safely manage Keycloak in a production environmenT Discover available frameworks and third-party libraries that can expand Keycloak Who this book is for This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.. Basic knowledge of app development, authentication, and authorization is expected.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Software protection
|x Computer programs.
|
650 |
|
0 |
|a Web applications.
|
700 |
1 |
|
|a Silva, Pedro Igor,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781804616444/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|