Dekorationsartikel gehören nicht zum Leistungsumfang.
                        Sprache:
                                                                                            Englisch
                                                    
                    54,45 €
Versandkostenfrei per Post / DHL
Lieferzeit 2-4 Werktage
            Kategorien:
        
                            
        
        
        
        
        
    
                    
                                                                                                                        
                                                                    
        
        
        
        
        
                                                
                            Beschreibung
                        
                    
                                                                        
                                        Chapter 1: The Hydra of Modern Identity.- Chapter 2: The Life of an Identity.- Chapter 3: Evolution of Identity.- Chapter 4: Identity Provisioning.- Chapter 5: OAuth 2.0 and API Authorization .- Chapter 6: OIDC OpenID Connect.- Chapter 7: SAML 2.- Chapter 8: Authorization and Policy Enforcement.- Chapter 9: Sessions.- Chapter 10: Using Modern Identity to Build Applications.- Chapter 11: Single Sign-on.- Chapter 12: Strong Authentication.- Chapter 13: Logout.- Chapter 14: Account Management.- Chapter 15: Deprovisioning.- Chapter 16: Troubleshooting.- Chapter 17: Exceptions.- Chapter 18: Less Common Requirements.- Chapter 19: Failures.- Chapter 20: Compliance.- Chapter 21: Looking into the Crystal Ball.- Chapter 22: Conclusion.- Appendix A: Glossary.- Appendix B: Resources for Further Learning.- Appendix C: SAML Authentication Request and Response.- Appendix D: Public Key Cryptography.- Appendix E: Troubleshooting Tools.- Appendix F: Privacy Legislation.- Appendix G: Security ComplianceFrameworks.
                                    
                                    
                                        Chapter 1: The Hydra of Modern Identity.- Chapter 2: The Life of an Identity.- Chapter 3: Evolution of Identity.- Chapter 4: Identity Provisioning.- Chapter 5: OAuth 2.0 and API Authorization .- Chapter 6: OIDC OpenID Connect.- Chapter 7: SAML 2.- Chapter 8: Authorization and Policy Enforcement.- Chapter 9: Sessions.- Chapter 10: Using Modern Identity to Build Applications.- Chapter 11: Single Sign-on.- Chapter 12: Strong Authentication.- Chapter 13: Logout.- Chapter 14: Account Management.- Chapter 15: Deprovisioning.- Chapter 16: Troubleshooting.- Chapter 17: Exceptions.- Chapter 18: Less Common Requirements.- Chapter 19: Failures.- Chapter 20: Compliance.- Chapter 21: Looking into the Crystal Ball.- Chapter 22: Conclusion.- Appendix A: Glossary.- Appendix B: Resources for Further Learning.- Appendix C: SAML Authentication Request and Response.- Appendix D: Public Key Cryptography.- Appendix E: Troubleshooting Tools.- Appendix F: Privacy Legislation.- Appendix G: Security ComplianceFrameworks.
                                    
                                                            
                                    Über den Autor
                                
                                
                                        Yvonne Wilson is co-founder and Chief Strategy Officer for XploitDefense. She has had many roles in the software industry related to security and identity management as a security and identity architect; enterprise architect; director of developer success working with identity customers; sr. director of security governance, risk, and compliance (GRC); Chief Strategy Officer; and founder of cloud identity services. Yvonne was responsible for IT security strategy and architecture at Sun Microsystems, founded and designed the identity management services offered through Oracle Managed Cloud Services, created a GRC team at Auth0 and founded a world-wide developer success team for Auth0, working with customers and overseeing the creation of an identity management training program for customer-facing support and professional services engineers. Yvonne is currently Chief Strategy Officer at XploitDefense.
In working with business teams at Sun, designing and deploying identity systems for customers at Oracle, and while founding a developer success team at Auth0, Yvonne had the opportunity of working with many customers, from small startups to large enterprises. Her experience spans the implementation of SSO, identity federation, directory services, adaptive knowledge-based authentication, and identity provisioning as well as multilevel authentication systems with certificate-based authentication. She has worked with OIDC, SAML 2.0, WS-Fed, OAuth2.0/2.1, and OpenID. From this depth of experience, Yvonne realized the growing need for a basic overview of identity management concepts that is understandable to business application owners as well as architects and developers.
Abhishek Hingnikar is at Okta, the identity provider for the internet. He has several years of experience designing and demonstrating Identity Management solutions to customers using Auth0 using OAuth 2.0/2.1, OpenID Connect and SAML 2.0. His current focus areas involve Consumer IoT, Device Based Identity and designing solutions that explore web based identity in peripheral domains.
                                In working with business teams at Sun, designing and deploying identity systems for customers at Oracle, and while founding a developer success team at Auth0, Yvonne had the opportunity of working with many customers, from small startups to large enterprises. Her experience spans the implementation of SSO, identity federation, directory services, adaptive knowledge-based authentication, and identity provisioning as well as multilevel authentication systems with certificate-based authentication. She has worked with OIDC, SAML 2.0, WS-Fed, OAuth2.0/2.1, and OpenID. From this depth of experience, Yvonne realized the growing need for a basic overview of identity management concepts that is understandable to business application owners as well as architects and developers.
Abhishek Hingnikar is at Okta, the identity provider for the internet. He has several years of experience designing and demonstrating Identity Management solutions to customers using Auth0 using OAuth 2.0/2.1, OpenID Connect and SAML 2.0. His current focus areas involve Consumer IoT, Device Based Identity and designing solutions that explore web based identity in peripheral domains.
                                    Zusammenfassung
                                
                                Select or design appropriate identity management approaches to protect your applications
Confidently describe the identity management for your application to prospective customers and partners
Develop your architecture and application from an identity management perspective
                                    Inhaltsverzeichnis
                                
                                
                                        Chapter 1: The Hydra of Modern Identity.- Chapter 2: The Life of an Identity.- Chapter 3: Evolution of Identity.- Chapter 4: Identity Provisioning.- Chapter 5: OAuth 2.0 and API Authorization .- Chapter 6: OIDC OpenID Connect.- Chapter 7: SAML 2.- Chapter 8: Authorization and Policy Enforcement.- Chapter 9: Sessions.- Chapter 10: Using Modern Identity to Build Applications.- Chapter 11: Single Sign-on.- Chapter 12: Strong Authentication.- Chapter 13: Logout.- Chapter 14: Account Management.- Chapter 15: Deprovisioning.- Chapter 16: Troubleshooting.- Chapter 17: Exceptions.- Chapter 18: Less Common Requirements.- Chapter 19: Failures.- Chapter 20: Compliance.- Chapter 21: Looking into the Crystal Ball.- Chapter 22: Conclusion.- Appendix A: Glossary.- Appendix B: Resources for Further Learning.- Appendix C: SAML Authentication Request and Response.- Appendix D: Public Key Cryptography.- Appendix E: Troubleshooting Tools.- Appendix F: Privacy Legislation.- Appendix G: Security ComplianceFrameworks.
                                    
                                
        Details
    
    | Erscheinungsjahr: | 2022 | 
|---|---|
| Genre: | Importe, Informatik | 
| Rubrik: | Naturwissenschaften & Technik | 
| Medium: | Taschenbuch | 
| Inhalt: | 
                                                            XXVIII
                                                     384 S. 35 s/w Illustr. 384 p. 35 illus.  | 
        
| ISBN-13: | 9781484282601 | 
| ISBN-10: | 1484282604 | 
| Sprache: | Englisch | 
| Einband: | Kartoniert / Broschiert | 
| Autor: | 
                                                            Wilson, Yvonne
                                                     Hingnikar, Abhishek  | 
        
| Auflage: | Second Edition | 
| Hersteller: | 
                                                            Apress
                                                     Apress L.P.  | 
        
| Verantwortliche Person für die EU: | APress in Springer Science + Business Media, Heidelberger Platz 3, D-14197 Berlin, juergen.hartmann@springer.com | 
| Maße: | 254 x 178 x 23 mm | 
| Von/Mit: | Yvonne Wilson (u. a.) | 
| Erscheinungsdatum: | 18.11.2022 | 
| Gewicht: | 0,771 kg |