Compartir
Keycloak - Identity and Access Management for Modern Applications - Second Edition: Harness the power of Keycloak, OpenID Connect and OAuth 2.0 to sec (en Inglés)
Stian Thorgersen
(Autor)
·
Pedro Igor Silva
(Autor)
·
Packt Publishing
· Tapa Blanda
Keycloak - Identity and Access Management for Modern Applications - Second Edition: Harness the power of Keycloak, OpenID Connect and OAuth 2.0 to sec (en Inglés) - Thorgersen, Stian ; Silva, Pedro Igor
$ 81.787
$ 136.312
Ahorras: $ 54.525
Elige la lista en la que quieres agregar tu producto o crea una nueva lista
✓ Producto agregado correctamente a la lista de deseos.
Ir a Mis Listas
Origen: Estados Unidos
(Costos de importación incluídos en el precio)
Se enviará desde nuestra bodega entre el
Miércoles 19 de Junio y el
Miércoles 03 de Julio.
Lo recibirás en cualquier lugar de Argentina entre 1 y 3 días hábiles luego del envío.
Reseña del libro "Keycloak - Identity and Access Management for Modern Applications - Second Edition: Harness the power of Keycloak, OpenID Connect and OAuth 2.0 to sec (en Inglés)"
Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by KeycloakPurchase of the print or Kindle book includes a free PDF eBookKey Features: A beginners guide to Keycloak focussed on understanding Identity and Access ManagementImplement authentication and authorization in applications using Keycloak 22Utilize Keycloak in securing applications developed by you and the existing applications in your enterpriseBook Description: The 2nd Edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter, while using the latest distribution of Keycloak. As you progress, you will understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.By the end of this new edition, you will have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the newest features.What You Will Learn: Understand how to install, configure, and manage the latest version of KeycloakDiscover how to obtain access tokens through OAuth 2.0Utilize a reverse proxy to secure an application implemented in any programming language or frameworkSafely manage Keycloak in a production environmentSecure different types of applications, including web, mobile, and native applicationsDiscover the frameworks and third-party libraries that can expand KeycloakWho this book is for: This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.. Basic knowledge of app development, authentication, and authorization is expected.