Cloud Identity Patterns and Strategies

Video description

Get to grips with identity patterns and design a structured enterprise identity model for cloud applications

About This Audiobook

  • Learn all you need to know about different identity patterns and implementing them in real-world scenarios
  • Handle multi-IDP-related common situations no matter how big your organization
  • Gain practical insights into OAuth implementation patterns and flows

In Detail

Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect’s perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions.

Throughout this audiobook, you’ll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you’ll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You’ll also be able to make sense of how modern application designs are impacted by the company’s choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on.

By the end of this audiobook, you’ll be able to breeze through creating portable, robust, and reliable applications that can interact with each other.

Audience

This audiobook is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this audiobook useful. This audiobook covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.

Table of contents

  1. Opening Credits
  2. Dedication and Contributors
  3. Preface
  4. Chapter 1: Walkthrough of Digital Identity in the Enterprise
    1. Chapter 1: Walkthrough of Digital Identity in the Enterprise - Introduction
    2. Digital transformation – the impact on the market
    3. Why an enterprise identity strategy?
    4. The impact of identities on the UX
    5. Digital identities – the duties of an enterprise
    6. The challenges when defining an identity strategy
    7. Single sign-on (SSO)
    8. LDAP and Kerberos
    9. Federation of identities
    10. WS-Federation
    11. Security Assertion Markup Language (SAML)
    12. Summary
  5. Chapter 2: The Cloud Era and Identity
    1. Chapter 2: The Cloud Era and Identity - Introduction
    2. The cloud era
    3. Identity in the cloud era
    4. The challenges of identity
    5. The cloud identity
    6. A hybrid identity
    7. The future of identity
    8. Summary
  6. Chapter 3: OAuth 2.0 and OIDC
    1. Chapter 3: OAuth 2.0 and OIDC - Introduction
    2. OAuth and OIDC basic concepts
    3. How OAuth and OIDC work together
    4. How the protocols are implemented in the real world
    5. Technical background
    6. Summary
  7. Chapter 4: Authentication Flows
    1. Chapter 4: Authentication Flows - Introduction
    2. The authorization code grant flow
    3. The authorization code grant flow with PKCE
    4. The implicit grant flow
    5. The client credentials grant flow
    6. The ROPC grant flow
    7. The OBO flow
    8. Hybrid flows
    9. Summary
  8. Chapter 5: Exploring Identity Patterns
    1. Chapter 5: Exploring Identity Patterns - Introduction
    2. Understanding the basic terminology
    3. Web applications
    4. Native applications
    5. SPAs
    6. Summary
  9. Chapter 6: Trends in API Authentication
    1. Chapter 6: Trends in API Authentication - Introduction
    2. The complexity of defining standard guidance
    3. The vertical API approach
    4. API landscape complexity
    5. The application frontend API flow
    6. The application automation API
    7. The multiple IdP dilemma
    8. Defining enterprise standards for identity
    9. The service mesh and identity management
    10. Authentication implications in a service mesh
    11. Common antipatterns
    12. Summary
  10. Chapter 7: Identity Providers in the Real World
    1. Chapter 7: Identity Providers in the Real World - Introduction
    2. The technical aspects
    3. The non-technical aspects
    4. Azure Active Directory (AAD)
    5. Azure Active Directory Domain Services (AD DS)
    6. Azure Active Directory B2C (AD B2C)
    7. Active Directory Federation Services (AD FS)
    8. Customer Identity from SAP Customer Data Cloud
    9. Okta (Auth0)
    10. Summary
  11. Chapter 8: Real-World Identity Provider – A Zoom-In on Azure Active Directory
    1. Chapter 8: Real-World Identity Provider – A Zoom-In on Azure Active Directory - Introduction
    2. An overview of AAD
    3. AAD basics
    4. Supported authentication protocols
    5. Registering and configuring applications
    6. Additional features
    7. Summary
  12. Chapter 9: Exploring Real-World Scenarios
    1. Chapter 9: Exploring Real-World Scenarios - Introduction
    2. The identity features within an enterprise in the real world
    3. The implications of the company’s structure
    4. Frontend authentication challenges in the real world
    5. Backend authentication challenges in the real world
    6. Authentication challenges for microservices integration
    7. Summary
  13. Closing Credits

Product information

  • Title: Cloud Identity Patterns and Strategies
  • Author(s): Giuseppe Di Federico, Fabrizio Barcaroli
  • Release date: February 2023
  • Publisher(s): Packt Publishing
  • ISBN: 9781805121527