Pagina principaleGruppiConversazioniAltroStatistiche
Cerca nel Sito
Questo sito utilizza i cookies per fornire i nostri servizi, per migliorare le prestazioni, per analisi, e (per gli utenti che accedono senza fare login) per la pubblicità. Usando LibraryThing confermi di aver letto e capito le nostre condizioni di servizio e la politica sulla privacy. Il tuo uso del sito e dei servizi è soggetto a tali politiche e condizioni.

Risultati da Google Ricerca Libri

Fai clic su di un'immagine per andare a Google Ricerca Libri.

Solving Identity Management in Modern…
Sto caricando le informazioni...

Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2 (edizione 2022)

di Yvonne Wilson (Autore), Abhishek Hingnikar (Autore)

UtentiRecensioniPopolaritàMedia votiConversazioni
1111,723,673 (5)Nessuno
Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. This expanded edition has been revised to provide an overview of the new version of OAuth (2.1)?the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101). What You’ll Learn • Understand key identity management concepts • Incorporate essential design principles • Design authentication and access control for a modern application • Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0) • Review historical failures and know how to avoid them.… (altro)
Utente:nmarun
Titolo:Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2
Autori:Yvonne Wilson (Autore)
Altri autori:Abhishek Hingnikar (Autore)
Info:Apress (2022), Edition: 2nd ed., 412 pages
Collezioni:La tua biblioteca
Voto:*****
Etichette:Nessuno

Informazioni sull'opera

Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 di Yvonne Wilson

Nessuno
Sto caricando le informazioni...

Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro.

Attualmente non vi sono conversazioni su questo libro.

I've been wanting to learn more about Identity Management and this book provided that for me. It talks about the implementation details of OAuth, OICD and SAML technologies used widely in the software industry.

Recommend this book to anyone who wants to get things started on this topic. ( )
  nmarun | Oct 12, 2023 |
nessuna recensione | aggiungi una recensione
Devi effettuare l'accesso per contribuire alle Informazioni generali.
Per maggiori spiegazioni, vedi la pagina di aiuto delle informazioni generali.
Titolo canonico
Titolo originale
Titoli alternativi
Data della prima edizione
Personaggi
Luoghi significativi
Eventi significativi
Film correlati
Epigrafe
Dedica
Incipit
Citazioni
Ultime parole
Nota di disambiguazione
Redattore editoriale
Elogi
Lingua originale
DDC/MDS Canonico
LCC canonico

Risorse esterne che parlano di questo libro

Wikipedia in inglese

Nessuno

Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. This expanded edition has been revised to provide an overview of the new version of OAuth (2.1)?the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101). What You’ll Learn • Understand key identity management concepts • Incorporate essential design principles • Design authentication and access control for a modern application • Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0) • Review historical failures and know how to avoid them.

Non sono state trovate descrizioni di biblioteche

Descrizione del libro
Riassunto haiku

Discussioni correnti

Nessuno

Copertine popolari

Link rapidi

Voto

Media: (5)
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5 1

Sei tu?

Diventa un autore di LibraryThing.

 

A proposito di | Contatto | LibraryThing.com | Privacy/Condizioni d'uso | Guida/FAQ | Blog | Negozio | APIs | TinyCat | Biblioteche di personaggi celebri | Recensori in anteprima | Informazioni generali | 204,881,984 libri! | Barra superiore: Sempre visibile