Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Keycloak - Identity and Access Management for Modern Applications : Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications, Paperback / softback Book

Keycloak - Identity and Access Management for Modern Applications : Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications Paperback / softback

Paperback / softback

Description

Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak. Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesA beginners’ guide to Keycloak focussed on understanding Identity and Access ManagementImplement authentication and authorization in applications using Keycloak 22Utilize Keycloak in securing applications developed by you and the existing applications in your enterpriseBook DescriptionThe second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this new edition, you will learn how to use the latest distribution of Keycloak.

The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability.

You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22.

As you progress, you’ll understand the new Keycloak distribution and explore best practices in using OAuth.

Finally, you'll cover general best practices and other information on how to protect your applications. By the end of this new edition, you’ll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.What you will learnUnderstand how to install, configure, and manage the latest version of KeycloakDiscover how to obtain access tokens through OAuth 2.0Utilize a reverse proxy to secure an application implemented in any programming language or frameworkSafely manage Keycloak in a production environmentSecure different types of applications, including web, mobile, and native applicationsDiscover the frameworks and third-party libraries that can expand KeycloakWho this book is forThis book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.

Basic knowledge of app development, authentication, and authorization is expected.

Information

Other Formats

Information