Skip to Main Content
Cloud Identity Patterns and Strategies
book

Cloud Identity Patterns and Strategies

by Giuseppe Di Federico, Fabrizio Barcaroli
December 2022
Intermediate to advanced content levelIntermediate to advanced
258 pages
7h 17m
English
Packt Publishing
Content preview from Cloud Identity Patterns and Strategies

5

Exploring Identity Patterns

In this chapter, we will finally put into practice the knowledge that we acquired throughout the book before now. We now know how the OpenID Connect (OIDC) and OAuth 2.0 protocols work and, most importantly, what authentication flows they enable.

Understanding the right scenario for an authentication flow is a key aspect for an enterprise architect during the design of an application: the patterns described in this chapter can be used as a quick reference to guide the decision-making process around the authentication and authorization of an application.

To make a parallel with the programming world, these patterns can be applied to authentication in the same way that today, we, as programmers, design and write the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cloud Native Security Cookbook

Cloud Native Security Cookbook

Josh Armitage
Cloud Native Infrastructure with Azure

Cloud Native Infrastructure with Azure

Nishant Singh, Michael Kehoe

Publisher Resources

ISBN: 9781801810845