Keycloak: identity and access management for modern applications
Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover Keycloak by understanding Identity and Access...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing Ltd.
2023
|
Ausgabe: | Second edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781804616444/?ar |
Zusammenfassung: | Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover Keycloak by understanding Identity and Access Management and integrating it with existing user bases Implement authentication and authorization in applications using Keycloak 22 Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise Book Description The 2nd Edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter, while using the latest distribution of Keycloak. As you progress, you will understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications. By the end of this new edition, you will have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the newest features. What you will learn Understand how to install, configure and manage the latest version of Keycloak Leverage additional features and capabilities of Keycloak in this new version Discover new updates to installing and running Keycloak Secure new and existing applications with Keycloak Safely manage Keycloak in a production environmenT Discover available frameworks and third-party libraries that can expand Keycloak Who this book is for This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.. Basic knowledge of app development, authentication, and authorization is expected. |
Beschreibung: | Includes index |
Umfang: | 1 Online-Ressource (350 Seiten) illustrations |
ISBN: | 9781804616444 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-096169206 | ||
003 | DE-627-1 | ||
005 | 20240228122033.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230907s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781804616444 |9 978-1-80461-644-4 | ||
035 | |a (DE-627-1)096169206 | ||
035 | |a (DE-599)KEP096169206 | ||
035 | |a (ORHE)9781804616444 | ||
035 | |a (DE-627-1)096169206 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/3 |2 23/eng/20230808 | |
100 | 1 | |a Thorgersen, Stian |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Keycloak |b identity and access management for modern applications |c Stian Thorgersen, Pedro Igor Silva |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham, UK |b Packt Publishing Ltd. |c 2023 | |
300 | |a 1 Online-Ressource (350 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover Keycloak by understanding Identity and Access Management and integrating it with existing user bases Implement authentication and authorization in applications using Keycloak 22 Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise Book Description The 2nd Edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter, while using the latest distribution of Keycloak. As you progress, you will understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications. By the end of this new edition, you will have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the newest features. What you will learn Understand how to install, configure and manage the latest version of Keycloak Leverage additional features and capabilities of Keycloak in this new version Discover new updates to installing and running Keycloak Secure new and existing applications with Keycloak Safely manage Keycloak in a production environmenT Discover available frameworks and third-party libraries that can expand Keycloak Who this book is for This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.. Basic knowledge of app development, authentication, and authorization is expected. | ||
650 | 0 | |a Software protection |x Computer programs | |
650 | 0 | |a Web applications | |
650 | 4 | |a Logiciels ; Protection ; Logiciels | |
650 | 4 | |a Applications Web | |
700 | 1 | |a Silva, Pedro Igor |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781804616444/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-096169206 |
---|---|
_version_ | 1821494938280394752 |
adam_text | |
any_adam_object | |
author | Thorgersen, Stian Silva, Pedro Igor |
author_facet | Thorgersen, Stian Silva, Pedro Igor |
author_role | aut aut |
author_sort | Thorgersen, Stian |
author_variant | s t st p i s pi pis |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)096169206 (DE-599)KEP096169206 (ORHE)9781804616444 |
dewey-full | 005.8/3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/3 |
dewey-search | 005.8/3 |
dewey-sort | 15.8 13 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03518cam a22003972 4500</leader><controlfield tag="001">ZDB-30-ORH-096169206</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228122033.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230907s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781804616444</subfield><subfield code="9">978-1-80461-644-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)096169206</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP096169206</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781804616444</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)096169206</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/3</subfield><subfield code="2">23/eng/20230808</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thorgersen, Stian</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Keycloak</subfield><subfield code="b">identity and access management for modern applications</subfield><subfield code="c">Stian Thorgersen, Pedro Igor Silva</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (350 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover Keycloak by understanding Identity and Access Management and integrating it with existing user bases Implement authentication and authorization in applications using Keycloak 22 Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise Book Description The 2nd Edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter, while using the latest distribution of Keycloak. As you progress, you will understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications. By the end of this new edition, you will have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the newest features. What you will learn Understand how to install, configure and manage the latest version of Keycloak Leverage additional features and capabilities of Keycloak in this new version Discover new updates to installing and running Keycloak Secure new and existing applications with Keycloak Safely manage Keycloak in a production environmenT Discover available frameworks and third-party libraries that can expand Keycloak Who this book is for This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.. Basic knowledge of app development, authentication, and authorization is expected.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software protection</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels ; Protection ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications Web</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Silva, Pedro Igor</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781804616444/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-096169206 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:20Z |
institution | BVB |
isbn | 9781804616444 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (350 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing Ltd. |
record_format | marc |
spelling | Thorgersen, Stian VerfasserIn aut Keycloak identity and access management for modern applications Stian Thorgersen, Pedro Igor Silva Second edition. Birmingham, UK Packt Publishing Ltd. 2023 1 Online-Ressource (350 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index Gain a firm practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak Purchase of the print or Kindle book includes a free PDF eBook Key Features Discover Keycloak by understanding Identity and Access Management and integrating it with existing user bases Implement authentication and authorization in applications using Keycloak 22 Utilize Keycloak in securing applications developed by you and the existing applications in your enterprise Book Description The 2nd Edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates. In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter, while using the latest distribution of Keycloak. As you progress, you will understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications. By the end of this new edition, you will have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the newest features. What you will learn Understand how to install, configure and manage the latest version of Keycloak Leverage additional features and capabilities of Keycloak in this new version Discover new updates to installing and running Keycloak Secure new and existing applications with Keycloak Safely manage Keycloak in a production environmenT Discover available frameworks and third-party libraries that can expand Keycloak Who this book is for This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security.. Basic knowledge of app development, authentication, and authorization is expected. Software protection Computer programs Web applications Logiciels ; Protection ; Logiciels Applications Web Silva, Pedro Igor VerfasserIn aut |
spellingShingle | Thorgersen, Stian Silva, Pedro Igor Keycloak identity and access management for modern applications Software protection Computer programs Web applications Logiciels ; Protection ; Logiciels Applications Web |
title | Keycloak identity and access management for modern applications |
title_auth | Keycloak identity and access management for modern applications |
title_exact_search | Keycloak identity and access management for modern applications |
title_full | Keycloak identity and access management for modern applications Stian Thorgersen, Pedro Igor Silva |
title_fullStr | Keycloak identity and access management for modern applications Stian Thorgersen, Pedro Igor Silva |
title_full_unstemmed | Keycloak identity and access management for modern applications Stian Thorgersen, Pedro Igor Silva |
title_short | Keycloak |
title_sort | keycloak identity and access management for modern applications |
title_sub | identity and access management for modern applications |
topic | Software protection Computer programs Web applications Logiciels ; Protection ; Logiciels Applications Web |
topic_facet | Software protection Computer programs Web applications Logiciels ; Protection ; Logiciels Applications Web |
work_keys_str_mv | AT thorgersenstian keycloakidentityandaccessmanagementformodernapplications AT silvapedroigor keycloakidentityandaccessmanagementformodernapplications |