February 2018
Beginner to intermediate
316 pages
9h 33m
English
Following our security-by-design practice, we first need to think about the users of our applications and how they will prefer to sign into our applications. Do we have customers who will want to sign in using their social media credentials? Will employees be using the applications with their corporate credentials? What about multiple third-parties who will want to sign in using their corporate credentials? We also need to decouple all these details from our frontend applications and our BFF components.
To satisfy these requirements, we can leverage a federated identity management service, such as AWS Cognito, Auth0, or Azure Active Directory B2C. With these services, we can integrate many different identity ...
Read now
Unlock full access