Know how to design and use identity management to protect your application and the data it manages.
At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.
Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.
What You’ll Learn
Understand key identity management conceptsIncorporate essential design principlesDesign authentication and access control for a modern applicationKnow the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)Review historical failures and know how to avoid them
Who This Book Is For
Developers, enterprise or application architects, business application or product owners, and anyone involved in an application's identity management solution
Good book on modern Identity basics. It's not really a reference book. The content is geared more towards the security choices you need to make as an application developer.
The Kindle version is missing a lot of images that are referenced by the text. Also the Kindle version lacks page numbers. If that is fixed, I would give it 5 stars.
A good introduction to identity management and API authorization. The first chapters break down the technical details about OAuth 2.0, OIDC and SAML 2.0 very well.
The chapter about Sample Application with Custom API is a great example, but a little shallow.
The rest of the information is on point. I highly recommend the book.
This book is a good introduction to the field of Identity Access Management. It gives you an overview of the main identity management concepts and strategies you could use to incorporate security principles into your design. It explores the main authentication protocols (OAuth 2.0, OpenID Connect, SAML) and the life cycle of an identity. There are some chapters specifically to talk about sessions, login, logout, and other common use cases for applications. Initially I thought there wasn't much to learn about these use cases because it is something you're used to implement, but I was surprised by the amount of concerns you should take into consideration to properly design these functionalities. The appendixes provide some good references and tools you can use to develop and debug authorization/authentication issues.
In today's competitive software application market, a product which misses the mark on security will not be successful. Highly recommend this book as a great resource for understanding what you need to address for following best practices in identity management as you develop and bring to market software applications
This book does a decent job providing an overview of existing protocols. It's nice to have the content in one place rather than perusing numerous RFCs. The authors also provide additional context around concerns that folks may want to consider when implementing support for authentication and authorization. I'd recommend this book for someone beginning to learn about this subject.
I've been wanting to learn more about Identity Management and this book provided that for me. It talks about the implementation details of OAuth, OICD and SAML technologies used widely in the software industry.
Recommend this book to anyone who wants to get things started on this topic.