Keycloak - Identity and Access Management for Modern Applications

Keycloak - Identity and Access Management for Modern Applications
Author: Stian Thorgersen
Publisher: Packt Publishing Ltd
Total Pages: 362
Release: 2021-06-11
Genre: Computers
ISBN: 1800564708

Download Keycloak - Identity and Access Management for Modern Applications Book in PDF, Epub and Kindle

Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend Keycloak for optimized security Leverage Keycloak features to secure different application types Book DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of difference if you learn how to use it. Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications.What you will learn Understand how to install, configure, and manage Keycloak Secure your new and existing applications with Keycloak Gain a basic understanding of OAuth 2.0 and OpenID Connect Understand how to configure Keycloak to make it ready for production use Discover how to leverage additional features and how to customize Keycloak to fit your needs Get to grips with securing Keycloak servers and protecting applications Who this book is for Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.


Keycloak - Identity and Access Management for Modern Applications
Language: en
Pages: 362
Authors: Stian Thorgersen
Categories: Computers
Type: BOOK - Published: 2021-06-11 - Publisher: Packt Publishing Ltd

GET EBOOK

Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in a
Keycloak - Identity and Access Management for Modern Applications
Language: en
Pages: 351
Authors: Stian Thorgersen
Categories: Computers
Type: BOOK - Published: 2023-07-31 - Publisher: Packt Publishing Ltd

GET EBOOK

Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycl
Solving Identity and Access Management in Modern Applications
Language: en
Pages: 165
Authors: Yvonne Wilson
Categories: Computers
Type: BOOK - Published: 2020-03-02 - Publisher: Apress

GET EBOOK

Know how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly oner
Pro Telerik ASP.NET and Silverlight Controls
Language: en
Pages: 686
Authors: Jose Rolando Guay Paz
Categories: Computers
Type: BOOK - Published: 2010-12-28 - Publisher: Apress

GET EBOOK

This book provides a complete guide to implementing Telerik’s range of ASP.NET and Silverlight controls. Telerik controls are invaluable for ASP.NET and Silve
Identity Management on a Shoestring
Language: en
Pages: 151
Authors: Ganesh Prasad
Categories:
Type: BOOK - Published: 2012-08-29 - Publisher: Lulu.com

GET EBOOK

This book is aimed at Security and IT practitioners (especially architects) in end-user organisations who are responsible for implementing an enterprise-wide Id