Book description
Mapping a person, place, or thing to a software resource in a verifiable manner is the basis of identity. Confirming that identity is a complex process, particularly when the identity mapping has to be verified genuine and authentic. Everything on the internet that houses private information is tied to identity and identity management.
In this report, author Lee Atchison shows C-suite execs, engineering execs, architects, and others involved in building software applications the modern identity management techniques available to safeguard that simple access point. You'll learn how and why these techniques constantly need to keep up with modern application development, and you'll understand the growing sophistication of the people who safely interact or maliciously tamper with them.
- Explore the complex process of mapping a person, place, or thing to a software resource in a verifiable manner
- Get examples of real-world authentication, including methods and best practices for working with application credentials
- Understand the differences between single-factor and multifactor authentication
- Learn why every authentication method has flaws, including today's state-of-the-art processes
- Explore authorization, the process for granting users access to specific resources, and how it differs from authentication
- Understand trust relationships using trust systems to create more secure applications and systems
Product information
- Title: Identity in Modern Applications
- Author(s):
- Release date: July 2021
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098107772
You might also like
book
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More
Refer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta …
book
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application …
book
Web Security for Developers
The world has changed. Today, every time you make a site live, you’re opening it up …
book
Introducing Distributed Application Runtime (Dapr): Simplifying Microservices Applications Development Through Proven and Reusable Patterns and Practices
Use this book to learn the Distributed Application Runtime (Dapr), a new event-driven runtime from Microsoft …