4

Implementing Identity and Access Management for Cloud Applications

In this chapter, you will learn how to add authentication and manage access to applications deployed on the cloud. This chapter will discuss the patterns to enhance web and mobile apps with identity and access management (IAM) security capabilities.

The following topics will be covered in this chapter:

  • Authentication pattern for cloud application users
  • Service-to-service authentication
  • Cloud application authorization patterns

The following diagram illustrates application IAM patterns:

Figure 4.1 – Application IAM patterns

Figure 4.1 – Application IAM patterns

As shown in the preceding diagram, the patterns ...

Get Hybrid Cloud Security Patterns now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.