Home Shop Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

by admin


Price: $44.99 - $30.46
(as of Nov 22, 2025 11:08:22 UTC – Details)


Know how to design and use identity management to protect your application and the data it manages.

At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided.

Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.

What You’ll Learn

Understand key identity management concepts
Incorporate essential design principles
Design authentication and access control for a modern application
Know the identity management frameworks and protocols used today (OIDC/ OAuth 2.0, SAML 2.0)
Review historical failures and know how to avoid them

Who This Book Is For

Developers, enterprise or application architects, business application or product owners, and anyone involved in an application’s identity management solution

Publisher ‏ : ‎ Apress
Publication date ‏ : ‎ December 19, 2019
Edition ‏ : ‎ 1st ed.
Language ‏ : ‎ English
Print length ‏ : ‎ 337 pages
ISBN-10 ‏ : ‎ 148425094X
ISBN-13 ‏ : ‎ 978-1484250945
Item Weight ‏ : ‎ 1.43 pounds
Dimensions ‏ : ‎ 6.75 x 0.75 x 9.75 inches
Best Sellers Rank: #382,536 in Books (See Top 100 in Books) #243 in Computer Network Security #899 in Computer Science (Books)
Customer Reviews: 4.3 4.3 out of 5 stars 91 ratings var dpAcrHasRegisteredArcLinkClickAction; P.when(‘A’, ‘ready’).execute(function(A) { if (dpAcrHasRegisteredArcLinkClickAction !== true) { dpAcrHasRegisteredArcLinkClickAction = true; A.declarative( ‘acrLink-click-metrics’, ‘click’, { “allowLinkDefault”: true }, function (event) { if (window.ue) { ue.count(“acrLinkClickCount”, (ue.count(“acrLinkClickCount”) || 0) + 1); } } ); } }); P.when(‘A’, ‘cf’).execute(function(A) { A.declarative(‘acrStarsLink-click-metrics’, ‘click’, { “allowLinkDefault” : true }, function(event){ if(window.ue) { ue.count(“acrStarsLinkWithPopoverClickCount”, (ue.count(“acrStarsLinkWithPopoverClickCount”) || 0) + 1); } }); });

Related Posts

Leave a Comment