Solving Identity Management in Modern Applications : Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 (2ND)

個数:
電子版価格
¥11,850
  • 電子版あり
  • ポイントキャンペーン

Solving Identity Management in Modern Applications : Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 (2ND)

  • ウェブストア価格 ¥12,329(本体¥11,209)
  • APress(2022/11発売)
  • 外貨定価 US$ 64.99
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 560pt
  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • ウェブストア価格 ¥14,746(本体¥13,406)
  • APress(2022/11発売)
  • 外貨定価 UK£ 54.99
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 670pt
  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9781484282601

Full Description

Know how to design and use identity management to protect your application and the data it manages.

At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.

Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.This expanded editionhas been revised to provide an overview of the new version of OAuth (2.1)--the primary changes in this version, including features that were removed from 2.1 that were in 2.0 and why they were removed. The discussion of the book's accompanying sample application has been revised to cover in more depth the approach for developing the application (also revised). A new section has been added on the OAuth 2.0 Device Authorization Grant (RFC 8628) specification, which is useful for devices with limited UI capability. Minor additions include the topics of identity proofing, the need to capture and organize consent information, the impact of tracking prevention technology on certain identity protocols, and the availability of additional options for authorization requests such as OAuth 2.0 Rich Authorization Requests and JWT-Secured Authorization Requests (RFC 9101).

What You'll Learn• Understand key identity management concepts• Incorporate essential design principles• Design authentication and access control for a modern application• Know the identity management frameworks and protocols used today (OIDC/OAuth 2.0/2.1, SAML 2.0)• Review historical failures and know how to avoid them

Who This Book Is ForDevelopers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution

Contents

Chapter 1: The Hydra of Modern Identity.- Chapter 2: The Life of an Identity.- Chapter 3: Evolution of Identity.- Chapter 4: Identity Provisioning.- Chapter 5: OAuth 2.0 and API Authorization .- Chapter 6: OIDC OpenID Connect.- Chapter 7: SAML 2.- Chapter 8: Authorization and Policy Enforcement.- Chapter 9: Sessions.- Chapter 10: Using Modern Identity to Build Applications.- Chapter 11: Single Sign-on.- Chapter 12: Strong Authentication.- Chapter 13: Logout.- Chapter 14: Account Management.- Chapter 15: Deprovisioning.- Chapter 16: Troubleshooting.- Chapter 17: Exceptions.- Chapter 18: Less Common Requirements.- Chapter 19: Failures.- Chapter 20: Compliance.- Chapter 21: Looking into the Crystal Ball.- Chapter 22: Conclusion.- Appendix A: Glossary.- Appendix B: Resources for Further Learning.- Appendix C: SAML Authentication Request and Response.- Appendix D: Public Key Cryptography.- Appendix E: Troubleshooting Tools.- Appendix F: Privacy Legislation.- Appendix G: Security ComplianceFrameworks.

最近チェックした商品