語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Solving Identity Management in Moder...
~
Wilson, Yvonne.
Solving Identity Management in Modern Applications = Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Solving Identity Management in Modern Applications/ by Yvonne Wilson, Abhishek Hingnikar.
其他題名:
Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
作者:
Wilson, Yvonne.
其他作者:
Hingnikar, Abhishek.
面頁冊數:
XXVI, 311 p. 31 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-1-4842-5095-2
ISBN:
9781484250952
Solving Identity Management in Modern Applications = Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
Wilson, Yvonne.
Solving Identity Management in Modern Applications
Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /[electronic resource] :by Yvonne Wilson, Abhishek Hingnikar. - 1st ed. 2019. - XXVI, 311 p. 31 illus.online resource.
Chapter 1: The Hydra of Modern Identity -- Chapter 2: The Life of an Identity -- Chapter 3: Evolution of Identity -- Chapter 4: Identity Provisioning -- Chapter 5: OAuth 2.0 and API Authorization -- Chapter 6: OIDC OpenID Connect -- Chapter 7: SAML 2.0 -- Chapter 8: Authorization and Policy Enforcement -- Chapter 9: Sample Application with Custom API -- Chapter 10: Sessions -- Chapter 11: Single Sign-on -- Chapter 12: Strong Authentication -- Chapter 13: Logout -- Chapter 14: Account Management -- Chapter 15: Deprovisioning -- Chapter 16: Troubleshooting -- Chapter 17: Exceptions -- Chapter 18: Less Common Requirements -- Chapter 19: Failures -- Chapter 20: Compliance -- Chapter 21: Looking into the Crystal Ball -- Chapter 22: Conclusion -- Appendix A: Glossary -- Appendix B: Resources for Further Learning -- Appendix C: SAML Authentication Request and Response -- Appendix D: Public Key Cryptography -- Appendix E: Troubleshooting Tools -- Appendix F: Privacy Legislation -- Appendix G: Security Compliance Frameworks -- .
Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. What You’ll Learn: Understand key identity management concepts Incorporate essential design principles Design authentication and access control for a modern application Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0) Review historical failures and know how to avoid them.
ISBN: 9781484250952
Standard No.: 10.1007/978-1-4842-5095-2doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Solving Identity Management in Modern Applications = Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
LDR
:03628nam a22003855i 4500
001
1015112
003
DE-He213
005
20200701223454.0
007
cr nn 008mamaa
008
210106s2019 xxu| s |||| 0|eng d
020
$a
9781484250952
$9
978-1-4842-5095-2
024
7
$a
10.1007/978-1-4842-5095-2
$2
doi
035
$a
978-1-4842-5095-2
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Wilson, Yvonne.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1309263
245
1 0
$a
Solving Identity Management in Modern Applications
$h
[electronic resource] :
$b
Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 /
$c
by Yvonne Wilson, Abhishek Hingnikar.
250
$a
1st ed. 2019.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
XXVI, 311 p. 31 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: The Hydra of Modern Identity -- Chapter 2: The Life of an Identity -- Chapter 3: Evolution of Identity -- Chapter 4: Identity Provisioning -- Chapter 5: OAuth 2.0 and API Authorization -- Chapter 6: OIDC OpenID Connect -- Chapter 7: SAML 2.0 -- Chapter 8: Authorization and Policy Enforcement -- Chapter 9: Sample Application with Custom API -- Chapter 10: Sessions -- Chapter 11: Single Sign-on -- Chapter 12: Strong Authentication -- Chapter 13: Logout -- Chapter 14: Account Management -- Chapter 15: Deprovisioning -- Chapter 16: Troubleshooting -- Chapter 17: Exceptions -- Chapter 18: Less Common Requirements -- Chapter 19: Failures -- Chapter 20: Compliance -- Chapter 21: Looking into the Crystal Ball -- Chapter 22: Conclusion -- Appendix A: Glossary -- Appendix B: Resources for Further Learning -- Appendix C: SAML Authentication Request and Response -- Appendix D: Public Key Cryptography -- Appendix E: Troubleshooting Tools -- Appendix F: Privacy Legislation -- Appendix G: Security Compliance Frameworks -- .
520
$a
Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more. What You’ll Learn: Understand key identity management concepts Incorporate essential design principles Design authentication and access control for a modern application Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0) Review historical failures and know how to avoid them.
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Security.
$3
1114130
700
1
$a
Hingnikar, Abhishek.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1309264
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484250945
776
0 8
$i
Printed edition:
$z
9781484250969
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5095-2
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入