October 2023
Beginner to intermediate
224 pages
5h 23m
English
Most commercial applications have significant human identity and access management (IAM) requirements. There are security requirements (such as multifactor authentication, the need to conceal which email addresses correspond to accounts, and the need to force lockouts after a certain number of failures), usability requirements (such as password resets, social login, and login by phone), and enterprise integration requirements (such as single sign-on or use of a corporate identity provider). Thus, it rarely makes sense to build that system from scratch or even to use a library—using a managed service is usually much better.
IAM services handle verifying ...
Read now
Unlock full access