Use coupon code “SUMMER20” for a 20% discount on all items! Valid until 2024-08-31

Site Logo
Search Suggestions

      Royal Mail  express delivery to UK destinations

      Regular sales and promotions

      Stock updates every 20 minutes!

      Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2

      1 in stock

      Firm sale: non returnable item
      SKU 9781484282601 Categories ,
      Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when buildi...

      £54.99

      Buy new:

      Delivery: UK delivery Only. Usually dispatched in 1-2 working days.

      Shipping costs: All shipping costs calculated in the cart or during the checkout process.

      Standard service (normally 2-3 working days): 48hr Tracked service.

      Premium service (next working day): 24hr Tracked service – signature service included.

      Royal mail: 24 & 48hr Tracked: Trackable items weighing up to 20kg are tracked to door and are inclusive of text and email with ‘Leave in Safe Place’ options, but are non-signature services. Examples of service expected: Standard 48hr service – if ordered before 3pm on Thursday then expected delivery would be on Saturday. If Premium 24hr service used, then expected delivery would be Friday.

      Signature Service: This service is only available for tracked items.

      Leave in Safe Place: This option is available at no additional charge for tracked services.

      Description

      Product ID:9781484282601
      Product Form:Paperback / softback
      Country of Manufacture:GB
      Title:Solving Identity Management in Modern Applications
      Subtitle:Demystifying OAuth 2, OpenID Connect, and SAML 2
      Authors:Author: Abhishek Hingnikar, Yvonne Wilson
      Page Count:384
      Subjects:Computer security, Computer security, Network security, Network security
      Description:Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.This expanded editionhas been revised to provide an overview of the new version of OAuth (2.1)-the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101). What You’ll Learn• Understand key identity management concepts• Incorporate essential design principles• Design authentication and access control for a modern application• Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0)• Review historical failures and know how to avoid themWho This Book Is ForDevelopers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution
      Know how to design and use identity management to protect your application and the data it manages.

      At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.

      Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.
      This expanded edition has been revised to provide an overview of the new version of OAuth (2.1)―the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book''s accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101).

      What You''ll Learn
      •Understand key identity management concepts
      •Incorporate essential design principles
      •Design authentication and access control for a modern application
      •Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0)
      •Review historical failures and know how to avoid them

      Who This Book Is For
      Developers, enterprise or application architects, business application or product owners, and anyone involved in an application''s identity management solution

      Imprint Name:APress
      Publisher Name:APress
      Country of Publication:GB
      Publishing Date:2022-11-18

      Additional information

      Weight774 g
      Dimensions253 × 176 × 31 mm