eBooks-it.org Logo
eBooks-IT.org Inner Image

OAuth 2.0 Identity and Access Management Patterns

OAuth 2.0 Identity and Access Management Patterns Image

Book Details:

Publisher:Packt Publishing
Series: Packt
Author:Martin Spasovski
Edition:1
ISBN-10:1783285591
ISBN-13:9781783285594
Pages:128
Published:Nov 25 2013
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:1.38 MB

Book Description:

Want to learn the worlds most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, its the complete guide. Overview Build web, client-side, desktop, and server-side secure OAuth 2.0 client applications by utilizing the appropriate grant flow for the given scenario Get to know the inner workings of OAuth 2.0 and learn how to handle and implement various authorization flows Explore practical code examples that are executable as standalone applications running on top of Spring MVC In Detail OAuth 2.0 has become the most widely used authorization framework. It provides an easy-to-use sign-in mechanism and allows users to quickly and efficiently secure service APIs. It also provides a protection layer for assets so that various third-party applications cannot have direct access to them. From service providers like Amazon and social media platforms like Facebook and Twitter to various internal enterprise solutions, OAuth 2.0 is the preferred standard for authorization. OAuth 2.0 Identity and Access Management Patterns is a step-by-step guide to build web, client-side, desktop, and server-side secure OAuth 2.0 client applications by utilizing the appropriate authorization techniques.. This book will help you handle and implement various authorization flows for your chosen type of application. Furthermore, you will understand when and how OAuth 2.0 is used in enterprises for trusted and first-party applications. You will gain knowledge about the Resource Owner Password Credentials grant and the Client Credentials grant, and more importantly, you will understand how to implement them yourself with the help of practical code examples. You will start by making various client applications step-by-step before moving on to client registration and implementing various OAuth 2.0 authorization flows. Furthermore, you will also be handling server responses with access tokens and errors. By the end of this book, you should understand precisely what it takes for these client applications to be secured. This book helps you cover each type of application: web, client-side, desktop, and trusted applications. In addition, you are also shown how to implement various authorization grant flows for each of these applications. You will uncover the security features that are a part of OAuth 2.0. More importantly, the book demonstrates what information is transmitted during the execution of a flow, and which precautions can be made. With OAuth 2.0 Identity and Access Management Patterns, you will be able to build a secure OAuth 2.0 client application with full confidence and will completely understand what data is exchanged when performing an authorization grant flow. What you will learn from this book Master the meaning of key terms used and defined in the OAuth 2.0 specification Create OAuth 2.0 web applications and learn the Authorization Code grant Generate client-side OAuth 2.0 applications and learn the Implicit grant Design OAuth 2.0 mobile applications with the Implicit and Authorization Code grants Develop trusted OAuth 2.0 applications and learn the Resource Owner Password Credentials grant and the Client Credentials grant Understand which security features OAuth 2.0 contains, what information is to be protected, and what precautions should be put in place Explore the basics of SAML 2.0 Assertions and how to use them as a means of additional security Know which tools and libraries are available for faster development

Download Link:

Related Books:

Advanced API Security

Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Advanced API Security Image
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the 'coolest' way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an afterthought, but API security has evolved a lot in last five years. The growth of standards, out there, has been exponential. That's where AdvancedAPI Security comes in--to wade through the weeds and help you keep the bad guys away while realizing the internal and external benefits of developing APIs for your services. Our expert author guides you through t...

Web 2.0

Principles and Best Practices
Web 2.0 Image
Web 2.0 is here today and yet its vast, disruptive impact is just beginning. More than just the latest technology buzzword, it's a transformative force that's propelling companies across all industries towards a new way of doing business characterized by user participation, openness, and network effects. What does Web 2.0 mean to your company and products? What are the risks and opportunities? What are the proven strategies for successfully capitalizing on these changes? O'Reilly Radar's Web 2.0 Principles and Best Practices lays out the answers the why, what, who, and how of Web 2.0. It's an indispensable guide for technology decision-makers executives, product strategists, entrepreneurs, and thought leaders who are ready to compete and prosper in t...

Developing RESTful Services with JAX-RS 2.0, WebSockets and JSON

Developing RESTful Services with JAX-RS 2.0, WebSockets and JSON Image
A complete and practical guide to building RESTful Web Services with the latest Java EE7 API Overview Learning about different client/server communication models including but not limited to client polling, Server-Sent Events and WebSockets. Efficiently use WebSockets, Server-Sent Events, and JSON in Java EE applications Learn about JAX-RS 2.0 new features and enhancements Improve scalability with asynchronous processing In Detail As the technology landscape moves focus towards smaller devices, the need for building scalable, flexible, lightweight, and real-time communications-based applications grows. HTML 5 and Java EE 7 provide a new synthesis of technologies that demonstrate tremendous scope and potential in areas of device independence, asynch...



2007 - 2021 © eBooks-IT.org