Summary
This was a long chapter, full of in-depth technical knowledge. We started by covering some general concepts regarding IAM. We learned the importance of crafting a well-designed IAM strategy and how that could significantly impact the end user experience as well as overall system security and compliance. We then became familiar with some key IAM terms and definitions, including identity, authentication, authorization, identity store, and others. We then moved on to discover some of the most common IAM standards, including SAML, OAuth2.0, OpenID Connect, and Kerberos, along with the different types of tokens they generate or use, such as the access token, refresh token, session token, and ID token.
That all set the scene to dive deeper into some of the common and standard authentication flows. We had an in-depth review of nine different flows, including SAML IDP-initiated, SAML SP-initiated, OAuth web server, OAuth JWT flows, and others.
That concludes this part of the...