Solving Identity Management in Modern Applications Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building...
Κύριοι συγγραφείς: | , |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berkeley, CA :
Apress : Imprint: Apress,
2019.
|
Έκδοση: | 1st ed. 2019. |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Chapter 1: The Hydra of Modern Identity
- Chapter 2: The Life of an Identity
- Chapter 3: Evolution of Identity
- Chapter 4: Identity Provisioning
- Chapter 5: OAuth 2.0 and API Authorization
- Chapter 6: OIDC OpenID Connect
- Chapter 7: SAML 2.0
- Chapter 8: Authorization and Policy Enforcement
- Chapter 9: Sample Application with Custom API
- Chapter 10: Sessions
- Chapter 11: Single Sign-on
- Chapter 12: Strong Authentication
- Chapter 13: Logout
- Chapter 14: Account Management
- Chapter 15: Deprovisioning
- Chapter 16: Troubleshooting
- Chapter 17: Exceptions
- Chapter 18: Less Common Requirements
- Chapter 19: Failures
- Chapter 20: Compliance
- Chapter 21: Looking into the Crystal Ball
- Chapter 22: Conclusion
- Appendix A: Glossary
- Appendix B: Resources for Further Learning
- Appendix C: SAML Authentication Request and Response
- Appendix D: Public Key Cryptography
- Appendix E: Troubleshooting Tools
- Appendix F: Privacy Legislation
- Appendix G: Security Compliance Frameworks
- .