Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Cloud Identity Patterns and Strategies

You're reading from   Cloud Identity Patterns and Strategies Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory

Arrow left icon
Product type Paperback
Published in Dec 2022
Publisher Packt
ISBN-13 9781801810845
Length 258 pages
Edition 1st Edition
Tools
Concepts
Arrow right icon
Authors (2):
Arrow left icon
Giuseppe Di Federico Giuseppe Di Federico
Author Profile Icon Giuseppe Di Federico
Giuseppe Di Federico
Fabrizio Barcaroli Fabrizio Barcaroli
Author Profile Icon Fabrizio Barcaroli
Fabrizio Barcaroli
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Part 1: Impact of Digital Transformation
2. Walkthrough of Digital Identity in the Enterprise FREE CHAPTER 3. The Cloud Era and Identity 4. Part 2: OAuth Implementation and Patterns
5. OAuth 2.0 and OIDC 6. Authentication Flows 7. Exploring Identity Patterns 8. Part 3: Real-World Scenarios
9. Trends in API Authentication 10. Identity Providers in the Real World 11. Real-World Identity Provider – A Zoom-In on Azure Active Directory 12. Exploring Real-World Scenarios 13. Index 14. Other Books You May Enjoy

What this book covers

Chapter 1, Walkthrough of Digital Identity in the Enterprise, covers basic concepts to support you in understanding the main challenges around digital identity.

Chapter 2, The Cloud Era and Identity, explains how the cloud and the modern architectural pattern add further challenges around the topic of identity

Chapter 3, OAuth 2.0 and OIDC, describes the most widely used identity protocol in cloud applications.

Chapter 4, Authentication Flows, provides an overview of different ways to adopt OAuth according to the context.

Chapter 5, Exploring Identity Patterns, looks at some basic patterns to be used with OAuth and also maps typical identity requirements with the related impact on application design.

Chapter 6, Trends in API Authentication, covers identity design from a high-level point of view: how an API portfolio of a company may look and how identity patterns can be implemented. It describes how new trends such as service meshes map with identity strategies.

Chapter 7, Identity Providers in the Real World, provides an overview of the various choices we have for IdPs by mentioning the most common ones in enterprise and high-level specifications.

Chapter 8, Real-World Identity Provider – A Zoom-In on Azure Active Directory, provides a zoom-in on the capabilities of a specific identity provider (Azure Active Directory). This will help you to understand the typical customizations and features available and how to leverage them to facilitate an identity strategy.

Chapter 9, Exploring Real-World Scenarios, focuses on the experience we have collected in the real world. The chapter covers the 360-degree impact of identity within an organization. It will also help you to understand how enterprise structure can affect strategic choices and how important it is to have the technical team connected with the business team for a long-term winning strategy within a company.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime