Cloud identity patterns and strategies: design enterprise cloud identity models with OAuth 2.0 and Azure active directory
Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organ...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt Publishing
2022
|
Schlagworte: | |
Online-Zugang: | DE-860 DE-706 DE-573 |
Zusammenfassung: | Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows Book Description Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. What you will learn Understand the evolution of identity in the enterprise Discover basic to advanced OAuth patterns and implementations Find out how OAuth standards are usually adopted in the enterprise Explore proven solutions for modern identity challenges Use Azure AD for implementing identity solutions Comprehend how company structure and strategies influence design decisions Who this book is for This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. |
Beschreibung: | 1 Online-Ressource (258 Seiten) |
ISBN: | 9781801819749 1801819742 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV048898586 | ||
003 | DE-604 | ||
005 | 20240117 | ||
007 | cr|uuu---uuuuu | ||
008 | 230413s2022 xx o|||| 00||| eng d | ||
020 | |a 9781801819749 |c EBook (PDF) |9 978-1-80181-974-9 | ||
020 | |a 1801819742 |c EBook (PDF) |9 1-80181-974-2 | ||
035 | |a (OCoLC)1376412383 | ||
035 | |a (DE-599)KEP088959104 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-706 |a DE-573 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Federico, Giuseppe di |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cloud identity patterns and strategies |b design enterprise cloud identity models with OAuth 2.0 and Azure active directory |c Giuseppe Di Federico, Fabrizio Barcaroli |
264 | 1 | |a Birmingham ; Mumbai |b Packt Publishing |c 2022 | |
300 | |a 1 Online-Ressource (258 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows Book Description Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. | |
520 | 3 | |a Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. | |
520 | 3 | |a What you will learn Understand the evolution of identity in the enterprise Discover basic to advanced OAuth patterns and implementations Find out how OAuth standards are usually adopted in the enterprise Explore proven solutions for modern identity challenges Use Azure AD for implementing identity solutions Comprehend how company structure and strategies influence design decisions Who this book is for This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. | |
653 | |a OAuth | ||
653 | 0 | |a Business enterprises / Computer networks / Security measures | |
653 | 0 | |a Computers / Access control | |
700 | 1 | |a Barcaroli, Fabrizio |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80181-084-5 |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-PQE | ||
912 | |a ZDB-221-PCL | ||
912 | |a ZDB-221-PPK | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034163035 | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006543.html |l DE-860 |p ZDB-221-PCL |q FLA_PCL_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006543.html |l DE-706 |p ZDB-221-PCL |x Verlag |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006543.html |l DE-573 |p ZDB-221-PCL |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1822762098908725248 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Federico, Giuseppe di Barcaroli, Fabrizio |
author_facet | Federico, Giuseppe di Barcaroli, Fabrizio |
author_role | aut aut |
author_sort | Federico, Giuseppe di |
author_variant | g d f gd gdf f b fb |
building | Verbundindex |
bvnumber | BV048898586 |
collection | ZDB-30-ORH ZDB-30-PQE ZDB-221-PCL ZDB-221-PPK |
ctrlnum | (OCoLC)1376412383 (DE-599)KEP088959104 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000001c 4500</leader><controlfield tag="001">BV048898586</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240117</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230413s2022 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801819749</subfield><subfield code="c">EBook (PDF)</subfield><subfield code="9">978-1-80181-974-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1801819742</subfield><subfield code="c">EBook (PDF)</subfield><subfield code="9">1-80181-974-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1376412383</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP088959104</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Federico, Giuseppe di</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud identity patterns and strategies</subfield><subfield code="b">design enterprise cloud identity models with OAuth 2.0 and Azure active directory</subfield><subfield code="c">Giuseppe Di Federico, Fabrizio Barcaroli</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (258 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows Book Description Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">What you will learn Understand the evolution of identity in the enterprise Discover basic to advanced OAuth patterns and implementations Find out how OAuth standards are usually adopted in the enterprise Explore proven solutions for modern identity challenges Use Azure AD for implementing identity solutions Comprehend how company structure and strategies influence design decisions Who this book is for This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">OAuth</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computers / Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barcaroli, Fabrizio</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80181-084-5</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PCL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-221-PPK</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034163035</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006543.html</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">FLA_PCL_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006543.html</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006543.html</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048898586 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:50:15Z |
indexdate | 2025-01-31T11:03:18Z |
institution | BVB |
isbn | 9781801819749 1801819742 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034163035 |
oclc_num | 1376412383 |
open_access_boolean | |
owner | DE-860 DE-706 DE-573 |
owner_facet | DE-860 DE-706 DE-573 |
physical | 1 Online-Ressource (258 Seiten) |
psigel | ZDB-30-ORH ZDB-30-PQE ZDB-221-PCL ZDB-221-PPK ZDB-221-PCL FLA_PCL_Kauf |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing |
record_format | marc |
spelling | Federico, Giuseppe di Verfasser aut Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory Giuseppe Di Federico, Fabrizio Barcaroli Birmingham ; Mumbai Packt Publishing 2022 1 Online-Ressource (258 Seiten) txt rdacontent c rdamedia cr rdacarrier Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows Book Description Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this book, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this book, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. What you will learn Understand the evolution of identity in the enterprise Discover basic to advanced OAuth patterns and implementations Find out how OAuth standards are usually adopted in the enterprise Explore proven solutions for modern identity challenges Use Azure AD for implementing identity solutions Comprehend how company structure and strategies influence design decisions Who this book is for This book is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this book useful. This book covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. OAuth Business enterprises / Computer networks / Security measures Computers / Access control Barcaroli, Fabrizio Verfasser aut Erscheint auch als Druck-Ausgabe 978-1-80181-084-5 |
spellingShingle | Federico, Giuseppe di Barcaroli, Fabrizio Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory |
title | Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory |
title_auth | Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory |
title_exact_search | Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory |
title_exact_search_txtP | Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory |
title_full | Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory Giuseppe Di Federico, Fabrizio Barcaroli |
title_fullStr | Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory Giuseppe Di Federico, Fabrizio Barcaroli |
title_full_unstemmed | Cloud identity patterns and strategies design enterprise cloud identity models with OAuth 2.0 and Azure active directory Giuseppe Di Federico, Fabrizio Barcaroli |
title_short | Cloud identity patterns and strategies |
title_sort | cloud identity patterns and strategies design enterprise cloud identity models with oauth 2 0 and azure active directory |
title_sub | design enterprise cloud identity models with OAuth 2.0 and Azure active directory |
work_keys_str_mv | AT federicogiuseppedi cloudidentitypatternsandstrategiesdesignenterprisecloudidentitymodelswithoauth20andazureactivedirectory AT barcarolifabrizio cloudidentitypatternsandstrategiesdesignenterprisecloudidentitymodelswithoauth20andazureactivedirectory |