000 | 03446cam a2200289zu 4500 | ||
---|---|---|---|
001 | 88938911 | ||
003 | FRCYB88938911 | ||
005 | 20250108000802.0 | ||
006 | m o d | ||
007 | cr un | ||
008 | 250108s2022 fr | o|||||0|0|||eng d | ||
020 | _a9781801810845 | ||
035 | _aFRCYB88938911 | ||
040 |
_aFR-PaCSA _ben _c _erda |
||
100 | 1 | _aFederico, Giuseppe Di | |
245 | 0 | 1 |
_aCloud Identity Patterns and Strategies _bDesign enterprise cloud identity models with OAuth 2.0 and Azure Active Directory _c['Federico, Giuseppe Di', 'Barcaroli, Fabrizio'] |
264 | 1 |
_bPackt Publishing _c2022 |
|
300 | _a p. | ||
336 |
_btxt _2rdacontent |
||
337 |
_bc _2rdamdedia |
||
338 |
_bc _2rdacarrier |
||
650 | 0 | _a | |
700 | 0 | _aFederico, Giuseppe Di | |
700 | 0 | _aBarcaroli, Fabrizio | |
856 | 4 | 0 |
_2Cyberlibris _uhttps://international.scholarvox.com/netsen/book/88938911 _qtext/html _a |
520 | _aGet to grips with identity patterns and design a structured enterprise identity model for cloud applicationsKey FeaturesLearn all you need to know about different identity patterns and implementing them in real-world scenariosHandle multi-IDP-related common situations no matter how big your organizationGain practical insights into OAuth implementation patterns and flowsBook DescriptionIdentity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other.What you will learnUnderstand the evolution of identity in the enterpriseDiscover basic to advanced OAuth patterns and implementationsFind out how OAuth standards are usually adopted in the enterpriseExplore proven solutions for modern identity challengesUse Azure AD for implementing identity solutionsComprehend how company structure and strategies influence design decisionsWho this book is forThis book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. | ||
999 |
_c76220 _d76220 |