Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
69,25 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:
- A beginners' guide to Keycloak focussed on understanding Identity and Access Management
- Implement authentication and authorization in applications using Keycloak 22
- Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise
Book Description:
The second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.
In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you'll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.
By the end of this new edition, you'll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.
What You Will Learn:
- Understand how to install, configure, and manage the latest version of Keycloak
- Discover how to obtain access tokens through OAuth 2.0
- Utilize a reverse proxy to secure an application implemented in any programming language or framework
- Safely manage Keycloak in a production environment
- Secure different types of applications, including web, mobile, and native applications
- Discover the frameworks and third-party libraries that can expand Keycloak
Who this book is for:
This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.
Table of Contents
- Getting Started with Keycloak
- Securing Your First Application
- Brief Introduction to Standards
- Authenticating Users with OIDC
- Authorizing Access with OAuth 2.0
- Securing Different Application Types
- Integrating Applications with Keycloak
- Authorization Strategies
- Configuring Keycloak for Production
- Managing Users
- Authenticating Users
- Managing Tokens and Sessions
- Extending Keycloak
- Securing Keycloak and Applications
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:
- A beginners' guide to Keycloak focussed on understanding Identity and Access Management
- Implement authentication and authorization in applications using Keycloak 22
- Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise
Book Description:
The second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.
In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you'll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.
By the end of this new edition, you'll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.
What You Will Learn:
- Understand how to install, configure, and manage the latest version of Keycloak
- Discover how to obtain access tokens through OAuth 2.0
- Utilize a reverse proxy to secure an application implemented in any programming language or framework
- Safely manage Keycloak in a production environment
- Secure different types of applications, including web, mobile, and native applications
- Discover the frameworks and third-party libraries that can expand Keycloak
Who this book is for:
This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.
Table of Contents
- Getting Started with Keycloak
- Securing Your First Application
- Brief Introduction to Standards
- Authenticating Users with OIDC
- Authorizing Access with OAuth 2.0
- Securing Different Application Types
- Integrating Applications with Keycloak
- Authorization Strategies
- Configuring Keycloak for Production
- Managing Users
- Authenticating Users
- Managing Tokens and Sessions
- Extending Keycloak
- Securing Keycloak and Applications
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:
- A beginners' guide to Keycloak focussed on understanding Identity and Access Management
- Implement authentication and authorization in applications using Keycloak 22
- Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise
Book Description:
The second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.
In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you'll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.
By the end of this new edition, you'll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.
What You Will Learn:
- Understand how to install, configure, and manage the latest version of Keycloak
- Discover how to obtain access tokens through OAuth 2.0
- Utilize a reverse proxy to secure an application implemented in any programming language or framework
- Safely manage Keycloak in a production environment
- Secure different types of applications, including web, mobile, and native applications
- Discover the frameworks and third-party libraries that can expand Keycloak
Who this book is for:
This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.
Table of Contents
- Getting Started with Keycloak
- Securing Your First Application
- Brief Introduction to Standards
- Authenticating Users with OIDC
- Authorizing Access with OAuth 2.0
- Securing Different Application Types
- Integrating Applications with Keycloak
- Authorization Strategies
- Configuring Keycloak for Production
- Managing Users
- Authenticating Users
- Managing Tokens and Sessions
- Extending Keycloak
- Securing Keycloak and Applications
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:
- A beginners' guide to Keycloak focussed on understanding Identity and Access Management
- Implement authentication and authorization in applications using Keycloak 22
- Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise
Book Description:
The second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.
In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you'll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.
By the end of this new edition, you'll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.
What You Will Learn:
- Understand how to install, configure, and manage the latest version of Keycloak
- Discover how to obtain access tokens through OAuth 2.0
- Utilize a reverse proxy to secure an application implemented in any programming language or framework
- Safely manage Keycloak in a production environment
- Secure different types of applications, including web, mobile, and native applications
- Discover the frameworks and third-party libraries that can expand Keycloak
Who this book is for:
This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.
Table of Contents
- Getting Started with Keycloak
- Securing Your First Application
- Brief Introduction to Standards
- Authenticating Users with OIDC
- Authorizing Access with OAuth 2.0
- Securing Different Application Types
- Integrating Applications with Keycloak
- Authorization Strategies
- Configuring Keycloak for Production
- Managing Users
- Authenticating Users
- Managing Tokens and Sessions
- Extending Keycloak
- Securing Keycloak and Applications
Über den Autor
Stian Thorgersen started his career at Arjuna Technologies building a cloud federation platform, years before most companies were even ready for a single-vendor public cloud. He later joined Red Hat, looking for ways to make developers' lives easier, which is where the idea of Keycloak started. In 2013, Stian co-founded the Keycloak project with another developer at Red Hat. Today, Stian is the Keycloak project lead and is also the top contributor to the project. He is still employed by Red Hat as a senior principal software engineer focusing on identity and access management, both for Red Hat and for Red Hat's customers. In his spare time, there is nothing Stian likes more than throwing his bike down the mountains of Norway.
Details
Erscheinungsjahr: | 2023 |
---|---|
Fachbereich: | EDV |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Thema: | Lexika |
Medium: | Taschenbuch |
ISBN-13: | 9781804616444 |
ISBN-10: | 1804616443 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Thorgersen, Stian
Silva, Pedro Igor |
Auflage: | 2. Auflage |
Hersteller: | Packt Publishing |
Maße: | 235 x 191 x 19 mm |
Von/Mit: | Stian Thorgersen (u. a.) |
Erscheinungsdatum: | 31.07.2023 |
Gewicht: | 0,654 kg |
Über den Autor
Stian Thorgersen started his career at Arjuna Technologies building a cloud federation platform, years before most companies were even ready for a single-vendor public cloud. He later joined Red Hat, looking for ways to make developers' lives easier, which is where the idea of Keycloak started. In 2013, Stian co-founded the Keycloak project with another developer at Red Hat. Today, Stian is the Keycloak project lead and is also the top contributor to the project. He is still employed by Red Hat as a senior principal software engineer focusing on identity and access management, both for Red Hat and for Red Hat's customers. In his spare time, there is nothing Stian likes more than throwing his bike down the mountains of Norway.
Details
Erscheinungsjahr: | 2023 |
---|---|
Fachbereich: | EDV |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Thema: | Lexika |
Medium: | Taschenbuch |
ISBN-13: | 9781804616444 |
ISBN-10: | 1804616443 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Thorgersen, Stian
Silva, Pedro Igor |
Auflage: | 2. Auflage |
Hersteller: | Packt Publishing |
Maße: | 235 x 191 x 19 mm |
Von/Mit: | Stian Thorgersen (u. a.) |
Erscheinungsdatum: | 31.07.2023 |
Gewicht: | 0,654 kg |
Warnhinweis