جزییات کتاب
Avoid MFA pitfalls—learn how to choose, implement, and troubleshoot MFA in your companyPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesGain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domainThwart authentication breaches using pragmatic strategies and lessons derived from real-world scenariosChoose the right MFA solutions to enhance your organization's securityBook DescriptionIn the realm of global cybersecurity, multifactor authentication (MFA) has become the key strategy; however, choosing the wrong MFA solution can do more harm than good. This book serves as a comprehensive guide, helping you choose, deploy, and troubleshoot multiple authentication methods to enhance application security without compromising user experience.You'll start with the fundamentals of authentication and the significance of MFA to gradually familiarize yourself with how MFA works and the various types of MFA solutions currently available. As you progress through the chapters, you'll learn how to choose the right MFA setup to keep the user experience as friendly as possible. The book then takes you through the different methods hackers use to bypass MFA and measures to safeguard your applications. Next, with the help of best practices and real-world scenarios, you'll explore how MFA effectively mitigates cyber threats. Once you've learned how to enable and manage MFA models in public clouds such as AWS, Azure, and GCP, you'll discover the role of biometrics in the MFA landscape and gain insights into the upcoming wave of innovations in this field.By the end of this MFA book, you'll have the knowledge required to secure your workforce and customers using MFA solutions, empowering your organization to combat authentication fraud.What you will learnEvaluate the advantages and limitations of MFA methods in use todayChoose the best MFA product or solution for your security needsDeploy and configure the chosen solution for maximum effectivenessIdentify and mitigate problems associated with different MFA solutionsReduce UX friction with ForgeRock and behavioral biometricsStay informed about technologies and future trends in the fieldWho this book is forThis book is for developers, system administrators, security professionals, white-hat hackers, CISOs, and anyone interested in understanding and enhancing their access management infrastructure. While basic knowledge of authentication and IAM is helpful, it is not a prerequisite.Table of ContentsOn the Internet, Nobody Knows You're a DogWhen to Use Different Types of MFAPreventing 99.9% of Attacks – MFA with Azure AD and DuoImplementing Workforce and Customer Authentication Using OktaAccess Management with ForgeRock and Behavioral BiometricsFederated SSO with PingFederate and 1KosmosMFA and the Cloud – Using MFA with Amazon Web ServicesGoogle Cloud Platform and MFAMFA without Commercial Products – Doing it All Yourself with KeycloakImplementing MFA in the Real WorldThe Future of (Multi-Factor) Authentication