جزییات کتاب
این کتاب دومین نسخه از "Keycloak - مدیریت هویت و دسترسی برای اپلیکیشنهای مدرن" است که به طور جامع به معرفی نرم افزار کیکلاک و به روزرسانیهای آن در سال های اخیر میپردازد. در این کتاب، شما خواهید آموخت که چگونه از کیکلاک برای تأمین فرایند احراز هویت و مجوز در وب اپلیکیشنها استفاده کنید و از ویژگیهای خاص آن مانند ورود دو مرحله ای برای بهبود امنیت و دسترسی به پرتالها بهره ببرید. همچنین، شما خواهید آموخت که چگونه کیکلاک را در اپلیکیشنهای جدید و موجود خود نصب، پیکربندی و مدیریت کنید و از ویژگیهای جدید آن استفاده کنید. این کتاب به شما خواهد آموخت که چگونه از کیکلاک برای محافظت از اپلیکیشنها در محیط production استفاده کنید و چگونه از چارچوبها و کتابخانههای 3rd party برای گسترش کیکلاک بهره ببرید. این کتاب برای توسعهدهندگان، مدیران سیستم، مهندسان امنیت و هر کسی که میخواهد از کیکلاک برای امنیت اپلیکیشنها استفاده کند، مناسب است.
Summary by trans_paypal
Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by KeycloakPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesDiscover Keycloak by understanding Identity and Access Management and integrating it with existing user basesImplement authentication and authorization in applications using Keycloak 22Utilize Keycloak in securing applications developed by you and the existing applications in your enterpriseBook DescriptionThe 2nd Edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter, while using the latest distribution of Keycloak. As you progress, you will understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.By the end of this new edition, you will have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the newest features.What you will learnUnderstand how to install, configure and manage the latest version of KeycloakLeverage additional features and capabilities of Keycloak in this new versionDiscover new updates to installing and running KeycloakSecure new and existing applications with KeycloakSafely manage Keycloak in a production environmenTDiscover available frameworks and third-party libraries that can expand KeycloakWho this book is forThis book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.. Basic knowledge of app development, authentication, and authorization is expected.Table of ContentsGetting Started with KeycloakSecuring Your First ApplicationBrief Introduction to StandardsAuthenticating Users with OIDCAuthorizing Access with OAuth 2.0Securing Different Application TypesIntegrating Applications with KeycloakAuthorization StrategiesConfiguring Keycloak for ProductionManaging UsersAuthenticating UsersManaging Tokens and SessionsExtending KeycloakSecuring Keycloak and Applications