Keycloak - Identity and Access Management for Modern Applications: Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications.
Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
2021.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend Keycloak for optimized security Leverage Keycloak features to secure different application types Book DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of difference if you learn how to use it. Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications. What you will learn Understand how to install, configure, and manage Keycloak Secure your new and existing applications with Keycloak Gain a basic understanding of OAuth 2.0 and OpenID Connect Understand how to configure Keycloak to make it ready for production use Discover how to leverage additional features and how to customize Keycloak to fit your needs Get to grips with securing Keycloak servers and protecting applications Who this book is for Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected. |
Beschreibung: | Description based upon print version of record. |
Beschreibung: | 1 online resource (362 p.) |
ISBN: | 1800564708 9781800564701 |
Internformat
MARC
LEADER | 00000cam a2200000Mu 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1255226639 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210605s2021 xx o ||| 0 eng d | ||
040 | |a EBLCP |b eng |c EBLCP |d UKAHL |d NLW |d N$T |d OCLCF |d OCLCO |d OCLCQ |d IEEEE |d OCLCO |d OCLCL |d TMA |d OCLCQ | ||
020 | |a 1800564708 | ||
020 | |a 9781800564701 |q (electronic bk.) | ||
035 | |a (OCoLC)1255226639 | ||
037 | |a 10163450 |b IEEE | ||
050 | 4 | |a QA76.76.O62 | |
082 | 7 | |a 005.3 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Thorgersen, Stian. | |
245 | 1 | 0 | |a Keycloak - Identity and Access Management for Modern Applications |h [electronic resource] : |b Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. |
260 | |a Birmingham : |b Packt Publishing, Limited, |c 2021. | ||
300 | |a 1 online resource (362 p.) | ||
500 | |a Description based upon print version of record. | ||
520 | |a Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend Keycloak for optimized security Leverage Keycloak features to secure different application types Book DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of difference if you learn how to use it. Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications. What you will learn Understand how to install, configure, and manage Keycloak Secure your new and existing applications with Keycloak Gain a basic understanding of OAuth 2.0 and OpenID Connect Understand how to configure Keycloak to make it ready for production use Discover how to leverage additional features and how to customize Keycloak to fit your needs Get to grips with securing Keycloak servers and protecting applications Who this book is for Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected. | ||
505 | 0 | |a Table of Contents Getting Started with Keycloak Securing Your First Application Brief Introduction to Standards Authenticating Users with OpenID Connect Authorizing Access with OAuth 2.0 Securing Different Application Types Integrating Applications with Keycloak Authorization Strategies Configuring Keycloak for Production Managing Users Authenticating Users Managing Tokens and Sessions Extending Keycloak Securing Keycloak and Applications. | |
650 | 0 | |a Open source software. |0 http://id.loc.gov/authorities/subjects/sh99003437 | |
650 | 6 | |a Logiciels libres. | |
650 | 7 | |a COMPUTERS |x Programming Languages |x Java. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x System Administration |x General. |2 bisacsh | |
650 | 7 | |a Open source software |2 fast | |
700 | 1 | |a Silva, Pedro Igor. | |
776 | 0 | 8 | |i Print version: |a Thorgersen, Stian |t Keycloak - Identity and Access Management for Modern Applications |d Birmingham : Packt Publishing, Limited,c2021 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2934029 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH38694433 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6631538 | ||
938 | |a EBSCOhost |b EBSC |n 2934029 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1255226639 |
---|---|
_version_ | 1816882545015390208 |
adam_text | |
any_adam_object | |
author | Thorgersen, Stian |
author2 | Silva, Pedro Igor |
author2_role | |
author2_variant | p i s pi pis |
author_facet | Thorgersen, Stian Silva, Pedro Igor |
author_role | |
author_sort | Thorgersen, Stian |
author_variant | s t st |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.O62 |
callnumber-search | QA76.76.O62 |
callnumber-sort | QA 276.76 O62 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Table of Contents Getting Started with Keycloak Securing Your First Application Brief Introduction to Standards Authenticating Users with OpenID Connect Authorizing Access with OAuth 2.0 Securing Different Application Types Integrating Applications with Keycloak Authorization Strategies Configuring Keycloak for Production Managing Users Authenticating Users Managing Tokens and Sessions Extending Keycloak Securing Keycloak and Applications. |
ctrlnum | (OCoLC)1255226639 |
dewey-full | 005.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.3 |
dewey-search | 005.3 |
dewey-sort | 15.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04344cam a2200433Mu 4500</leader><controlfield tag="001">ZDB-4-EBA-on1255226639</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">210605s2021 xx o ||| 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="c">EBLCP</subfield><subfield code="d">UKAHL</subfield><subfield code="d">NLW</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1800564708</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800564701</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1255226639</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10163450</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.O62</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thorgersen, Stian.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Keycloak - Identity and Access Management for Modern Applications</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (362 p.)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend Keycloak for optimized security Leverage Keycloak features to secure different application types Book DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of difference if you learn how to use it. Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications. What you will learn Understand how to install, configure, and manage Keycloak Secure your new and existing applications with Keycloak Gain a basic understanding of OAuth 2.0 and OpenID Connect Understand how to configure Keycloak to make it ready for production use Discover how to leverage additional features and how to customize Keycloak to fit your needs Get to grips with securing Keycloak servers and protecting applications Who this book is for Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Table of Contents Getting Started with Keycloak Securing Your First Application Brief Introduction to Standards Authenticating Users with OpenID Connect Authorizing Access with OAuth 2.0 Securing Different Application Types Integrating Applications with Keycloak Authorization Strategies Configuring Keycloak for Production Managing Users Authenticating Users Managing Tokens and Sessions Extending Keycloak Securing Keycloak and Applications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh99003437</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels libres.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Programming Languages</subfield><subfield code="x">Java.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">System Administration</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Silva, Pedro Igor.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Thorgersen, Stian</subfield><subfield code="t">Keycloak - Identity and Access Management for Modern Applications</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2021</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2934029</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH38694433</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6631538</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2934029</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1255226639 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:19Z |
institution | BVB |
isbn | 1800564708 9781800564701 |
language | English |
oclc_num | 1255226639 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (362 p.) |
psigel | ZDB-4-EBA |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Packt Publishing, Limited, |
record_format | marc |
spelling | Thorgersen, Stian. Keycloak - Identity and Access Management for Modern Applications [electronic resource] : Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. Birmingham : Packt Publishing, Limited, 2021. 1 online resource (362 p.) Description based upon print version of record. Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend Keycloak for optimized security Leverage Keycloak features to secure different application types Book DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of difference if you learn how to use it. Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications. What you will learn Understand how to install, configure, and manage Keycloak Secure your new and existing applications with Keycloak Gain a basic understanding of OAuth 2.0 and OpenID Connect Understand how to configure Keycloak to make it ready for production use Discover how to leverage additional features and how to customize Keycloak to fit your needs Get to grips with securing Keycloak servers and protecting applications Who this book is for Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected. Table of Contents Getting Started with Keycloak Securing Your First Application Brief Introduction to Standards Authenticating Users with OpenID Connect Authorizing Access with OAuth 2.0 Securing Different Application Types Integrating Applications with Keycloak Authorization Strategies Configuring Keycloak for Production Managing Users Authenticating Users Managing Tokens and Sessions Extending Keycloak Securing Keycloak and Applications. Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Logiciels libres. COMPUTERS Programming Languages Java. bisacsh COMPUTERS Security General. bisacsh COMPUTERS System Administration General. bisacsh Open source software fast Silva, Pedro Igor. Print version: Thorgersen, Stian Keycloak - Identity and Access Management for Modern Applications Birmingham : Packt Publishing, Limited,c2021 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2934029 Volltext |
spellingShingle | Thorgersen, Stian Keycloak - Identity and Access Management for Modern Applications Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. Table of Contents Getting Started with Keycloak Securing Your First Application Brief Introduction to Standards Authenticating Users with OpenID Connect Authorizing Access with OAuth 2.0 Securing Different Application Types Integrating Applications with Keycloak Authorization Strategies Configuring Keycloak for Production Managing Users Authenticating Users Managing Tokens and Sessions Extending Keycloak Securing Keycloak and Applications. Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Logiciels libres. COMPUTERS Programming Languages Java. bisacsh COMPUTERS Security General. bisacsh COMPUTERS System Administration General. bisacsh Open source software fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh99003437 |
title | Keycloak - Identity and Access Management for Modern Applications Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. |
title_auth | Keycloak - Identity and Access Management for Modern Applications Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. |
title_exact_search | Keycloak - Identity and Access Management for Modern Applications Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. |
title_full | Keycloak - Identity and Access Management for Modern Applications [electronic resource] : Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. |
title_fullStr | Keycloak - Identity and Access Management for Modern Applications [electronic resource] : Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. |
title_full_unstemmed | Keycloak - Identity and Access Management for Modern Applications [electronic resource] : Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. |
title_short | Keycloak - Identity and Access Management for Modern Applications |
title_sort | keycloak identity and access management for modern applications harness the power of keycloak openid connect and oauth 2 0 protocols to secure applications |
title_sub | Harness the Power of Keycloak, OpenID Connect, and OAuth 2. 0 Protocols to Secure Applications. |
topic | Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Logiciels libres. COMPUTERS Programming Languages Java. bisacsh COMPUTERS Security General. bisacsh COMPUTERS System Administration General. bisacsh Open source software fast |
topic_facet | Open source software. Logiciels libres. COMPUTERS Programming Languages Java. COMPUTERS Security General. COMPUTERS System Administration General. Open source software |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2934029 |
work_keys_str_mv | AT thorgersenstian keycloakidentityandaccessmanagementformodernapplicationsharnessthepowerofkeycloakopenidconnectandoauth20protocolstosecureapplications AT silvapedroigor keycloakidentityandaccessmanagementformodernapplicationsharnessthepowerofkeycloakopenidconnectandoauth20protocolstosecureapplications |