Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Solving identity management in moder...
~
Hingnikar, Abhishek.
Solving identity management in modern applicationsdemystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Solving identity management in modern applicationsby Yvonne Wilson, Abhishek Hingnikar.
Reminder of title:
demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
Author:
Wilson, Yvonne.
other author:
Hingnikar, Abhishek.
Published:
Berkeley, CA :Apress :2019.
Description:
xxvi, 311 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer security.
Online resource:
https://doi.org/10.1007/978-1-4842-5095-2
ISBN:
9781484250952$q(electronic bk.)
Solving identity management in modern applicationsdemystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
Wilson, Yvonne.
Solving identity management in modern applications
demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /[electronic resource] :by Yvonne Wilson, Abhishek Hingnikar. - Berkeley, CA :Apress :2019. - xxvi, 311 p. :ill., digital ;24 cm.
Chapter 1: The Hydra of Modern Identity -- Chapter 2: The Life of an Identity -- Chapter 3: Evolution of Identity -- Chapter 4: Identity Provisioning -- Chapter 5: OAuth 2.0 and API Authorization -- Chapter 6: OIDC OpenID Connect -- Chapter 7: SAML 2.0 -- Chapter 8: Authorization and Policy Enforcement -- Chapter 9: Sample Application with Custom API -- Chapter 10: Sessions -- Chapter 11: Single Sign-on -- Chapter 12: Strong Authentication -- Chapter 13: Logout -- Chapter 14: Account Management -- Chapter 15: Deprovisioning -- Chapter 16: Troubleshooting -- Chapter 17: Exceptions -- Chapter 18: Less Common Requirements -- Chapter 19: Failures -- Chapter 20: Compliance -- Chapter 21: Looking into the Crystal Ball -- Chapter 22: Conclusion -- Appendix A: Glossary -- Appendix B: Resources for Further Learning -- Appendix C: SAML Authentication Request and Response -- Appendix D: Public Key Cryptography -- Appendix E: Troubleshooting Tools -- Appendix F: Privacy Legislation -- Appendix G: Security Compliance Frameworks.
Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. What You'll Learn: Understand key identity management concepts Incorporate essential design principles Design authentication and access control for a modern application Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0) Review historical failures and know how to avoid them.
ISBN: 9781484250952$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-5095-2doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / W55 2019
Dewey Class. No.: 005.8
Solving identity management in modern applicationsdemystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
LDR
:03321nmm a2200325 a 4500
001
570427
003
DE-He213
005
20191219001842.0
006
m d
007
cr nn 008maaau
008
200819s2019 nyu s 0 eng d
020
$a
9781484250952$q(electronic bk.)
020
$a
9781484250945$q(paper)
024
7
$a
10.1007/978-1-4842-5095-2
$2
doi
035
$a
978-1-4842-5095-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
W55 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
W754 2019
100
1
$a
Wilson, Yvonne.
$3
857034
245
1 0
$a
Solving identity management in modern applications
$h
[electronic resource] :
$b
demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
$c
by Yvonne Wilson, Abhishek Hingnikar.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
xxvi, 311 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: The Hydra of Modern Identity -- Chapter 2: The Life of an Identity -- Chapter 3: Evolution of Identity -- Chapter 4: Identity Provisioning -- Chapter 5: OAuth 2.0 and API Authorization -- Chapter 6: OIDC OpenID Connect -- Chapter 7: SAML 2.0 -- Chapter 8: Authorization and Policy Enforcement -- Chapter 9: Sample Application with Custom API -- Chapter 10: Sessions -- Chapter 11: Single Sign-on -- Chapter 12: Strong Authentication -- Chapter 13: Logout -- Chapter 14: Account Management -- Chapter 15: Deprovisioning -- Chapter 16: Troubleshooting -- Chapter 17: Exceptions -- Chapter 18: Less Common Requirements -- Chapter 19: Failures -- Chapter 20: Compliance -- Chapter 21: Looking into the Crystal Ball -- Chapter 22: Conclusion -- Appendix A: Glossary -- Appendix B: Resources for Further Learning -- Appendix C: SAML Authentication Request and Response -- Appendix D: Public Key Cryptography -- Appendix E: Troubleshooting Tools -- Appendix F: Privacy Legislation -- Appendix G: Security Compliance Frameworks.
520
$a
Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. What You'll Learn: Understand key identity management concepts Incorporate essential design principles Design authentication and access control for a modern application Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0) Review historical failures and know how to avoid them.
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Security.
$3
760527
700
1
$a
Hingnikar, Abhishek.
$3
857035
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5095-2
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000178019
電子館藏
1圖書
電子書
EB QA76.9.A25 W754 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-1-4842-5095-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login