Inicio > > Seguridad informática > Keycloak - Identity and Access Management for Modern Applications
Keycloak - Identity and Access Management for Modern Applications

Keycloak - Identity and Access Management for Modern Applications

Pedro Igor Silva / Stian Thorgersen

75,90 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2021
Materia
Seguridad informática
ISBN:
9781800562493
75,90 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Desdémona
  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applicationsKey Features:Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examplesConfigure, manage, and extend Keycloak for optimized securityLeverage Keycloak features to secure different application typesBook Description:Implementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of difference if you learn how to use it.Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you’ll gain insights into securely using Keycloak in production.By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications.What You Will Learn:Understand how to install, configure, and manage KeycloakSecure your new and existing applications with KeycloakGain a basic understanding of OAuth 2.0 and OpenID ConnectUnderstand how to configure Keycloak to make it ready for production useDiscover how to leverage additional features and how to customize Keycloak to fit your needsGet to grips with securing Keycloak servers and protecting applicationsWho this book is for:Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.

Artículos relacionados

  • Innovations in XML Applications and Metadata Management
    As new concepts such as virtualization, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technolo...
    Disponible

    255,61 €

  • THEORY AND PRACTICE OF COMPUTATION
    MASAYUKI NUMAO JAIME SHIN-YA NISHIZAKI / NISHIZAKI SHIN-YA
     This is the proceedings of the Third Workshop on Computing: Theory and Practice, WCTP 2013 devoted to theoretical and practical approaches to computation. This workshop was organized by four top universities in Japan and the Philippines: Tokyo Institute of Technology, Osaka University, University of the Philippines — Diliman, and De La Salle University. The proceedings provide...
    Disponible

    138,85 €

  • DMN Cookbook
    Bruce Silver / Edson Tirelli
    Decision Model and Notation (DMN), the new standard for business decision modeling, is changing the methodology of business rules projects.  While its Decision Requirements Diagrams (DRDs) and decision tables can be used to create business requirements handed off to programmers in a traditional rule language, DMN is actually a complete rule language shared by business and IT.  ...
  • React 16 Tooling
    Adam Boduch
    ...
    Disponible

    64,76 €

  • HP Certified Systems Administrator (2nd Edition)
    Asghar Ghori
    Like the first edition of this book, the second edition also covers three main objectives ¿ to provide a comprehensive resource to individuals, including novice, IT/Non-HP-UX administrators, and HP-UX administrators who intend to take the new HP Certified Systems Administrator exam HP0-095 and pass it; to provide a quick and valuable on-the-job resource to HP-UX administrators,...
    Disponible

    58,77 €

  • Build your own Programming Language - Second Edition
    Clinton L. Jeffery / Imran Ahmad
    Learn to design your own programming language in a hands-on way by building compilers, using preprocessors, transpilers, and more, in this fully-refreshed second edition, written by the creator of the Unicon programming language.Purchase of the print or Kindle book includes a free PDF eBookKey Features- Takes a hands-on approach; learn by building the Jzero language, a subset o...
    Disponible

    71,53 €

Otros libros del autor

  • Keycloak - Identity and Access Management for Modern Applications - Second Edition
    Pedro Igor Silva / Stian Thorgersen
    Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.Purchase of the print or Kindle book includes a free PDF eBookKey Features:- A beginners’ guide to Keycloak focussed on understanding Identity and Access Management- Implement authentication and authorization in appl...
    Disponible

    75,78 €