Book description
Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications
Key Features
- Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples
- Configure, manage, and extend Keycloak for optimized security
- Leverage Keycloak features to secure different application types
Book Description
Implementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of difference if you learn how to use it.
Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production.
By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications.
What you will learn
- Understand how to install, configure, and manage Keycloak
- Secure your new and existing applications with Keycloak
- Gain a basic understanding of OAuth 2.0 and OpenID Connect
- Understand how to configure Keycloak to make it ready for production use
- Discover how to leverage additional features and how to customize Keycloak to fit your needs
- Get to grips with securing Keycloak servers and protecting applications
Who this book is for
Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.
Table of contents
- Keycloak - Identity and Access Management for Modern Applications
- Contributors
- About the authors
- About the reviewers
- Preface
- Section 1: Getting Started with Keycloak
- Chapter 1: Getting Started with Keycloak
- Chapter 2: Securing Your First Application
- Section 2: Securing Applications with Keycloak
- Chapter 3: Brief Introduction to Standards
- Chapter 4: Authenticating Users with OpenID Connect
- Chapter 5: Authorizing Access with OAuth 2.0
- Chapter 6: Securing Different Application Types
-
Chapter 7: Integrating Applications with Keycloak
- Technical requirements
- Choosing an integration architecture
- Choosing an integration option
- Integrating with Golang applications
- Integrating with Java applications
- Integrating with JavaScript applications
- Integrating with Node.js applications
- Integrating with Python applications
- Using a reverse proxy
- Try not to implement your own integration
- Summary
- Questions
- Further reading
- Chapter 8: Authorization Strategies
- Section 3: Configuring and Managing Keycloak
- Chapter 9: Configuring Keycloak for Production
- Chapter 10: Managing Users
- Chapter 11: Authenticating Users
- Chapter 12: Managing Tokens and Sessions
- Chapter 13: Extending Keycloak
- Section 4: Security Considerations
- Chapter 14: Securing Keycloak and Applications
- Assessments
- Other Books You May Enjoy
Product information
- Title: Keycloak - Identity and Access Management for Modern Applications
- Author(s):
- Release date: June 2021
- Publisher(s): Packt Publishing
- ISBN: 9781800562493
You might also like
book
Keycloak - Identity and Access Management for Modern Applications - Second Edition
Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the …
book
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2
Know how to design and use identity management to protect your application and the data it …
book
Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
Know how to design and use identity management to protect your application and the data it …
book
API Security in Action
A web API is an efficient way to communicate with an application or service. However, this …