Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 [Team-IRA]

Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 [Team-IRA]

Author
Stian Thorgersen, Pedro Igor Silva
Publisher
Packt Publishing
Language
English
Edition
2
Year
2023
Page
350
ISBN
1804616443,9781804616444
File Type
pdf
File Size
7.8 MiB

Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak
Purchase of the print or Kindle book includes a free PDF eBook

Key Features: A beginners guide to Keycloak focussed on understanding Identity and Access Management Implement authentication and authorization in applications using Keycloak 22 Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise

Book Description:
The 2nd Edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.

In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter, while using the latest distribution of Keycloak. As you progress, you will understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.

By the end of this new edition, you will have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the newest features.

What You Will Learn: Understand how to install, configure, and manage the latest version of Keycloak Discover how to obtain access tokens through OAuth 2.0 Utilize a reverse proxy to secure an application implemented in any programming language or framework Safely manage Keycloak in a production environment Secure different types of applications, including web, mobile, and native applications Discover the frameworks and third-party libraries that can expand Keycloak

Who this book is for:
This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.. Basic knowledge of app development, authentication, and authorization is expected.

show more...

How to Download?!!!

Just click on START button on Telegram Bot

Free Download Book