Cloud identity patterns and strategies for enterprise

Get to grips with identity patterns and design a structured enterprise identity model for cloud applications About This Audiobook Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big yo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Di Federico, Giuseppe (VerfasserIn), Barcaroli, Fabrizio (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Place of publication not identified] Packt Publishing 2023
Ausgabe:[First edition].
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-092807631
003 DE-627-1
005 20240228121954.0
007 cr uuu---uuuuu
008 230530s2023 xx |||||o 00| ||eng c
020 |a 9781805121527  |c electronic audio bk.  |9 978-1-80512-152-7 
020 |a 1805121529  |c electronic audio bk.  |9 1-80512-152-9 
035 |a (DE-627-1)092807631 
035 |a (DE-599)KEP092807631 
035 |a (ORHE)9781805121527 
035 |a (DE-627-1)092807631 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20230502 
100 1 |a Di Federico, Giuseppe  |e VerfasserIn  |4 aut 
245 1 0 |a Cloud identity patterns and strategies for enterprise  |c Giuseppe Di Federico, Fabrizio Barcaroli 
250 |a [First edition]. 
264 1 |a [Place of publication not identified]  |b Packt Publishing  |c 2023 
300 |a 1 online resource (1 audio file (7 hr., 41 min.)) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; title from title details screen (O'Reilly, viewed May 2, 2023) 
520 |a Get to grips with identity patterns and design a structured enterprise identity model for cloud applications About This Audiobook Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows In Detail Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this audiobook, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this audiobook, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. Audience This audiobook is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this audiobook useful. This audiobook covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful. 
630 2 0 |a OAuth 
650 0 |a Business enterprises  |x Computer networks  |x Security measures 
650 0 |a Computers  |x Access control 
650 4 |a Ordinateurs ; Accès ; Contrôle 
650 4 |a Business enterprises ; Computer networks ; Security measures 
650 4 |a Computers ; Access control 
650 4 |a Audiobooks 
650 4 |a Audiobooks 
650 4 |a Livres audio 
700 1 |a Barcaroli, Fabrizio  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781805121527/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-092807631
_version_ 1818767380638072832
adam_text
any_adam_object
author Di Federico, Giuseppe
Barcaroli, Fabrizio
author_facet Di Federico, Giuseppe
Barcaroli, Fabrizio
author_role aut
aut
author_sort Di Federico, Giuseppe
author_variant f g d fg fgd
f b fb
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)092807631
(DE-599)KEP092807631
(ORHE)9781805121527
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition [First edition].
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03911cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-092807631</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121954.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230530s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781805121527</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-80512-152-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1805121529</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-80512-152-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092807631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP092807631</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781805121527</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)092807631</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230502</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Di Federico, Giuseppe</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cloud identity patterns and strategies for enterprise</subfield><subfield code="c">Giuseppe Di Federico, Fabrizio Barcaroli</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 audio file (7 hr., 41 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed May 2, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Get to grips with identity patterns and design a structured enterprise identity model for cloud applications About This Audiobook Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows In Detail Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this audiobook, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this audiobook, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. Audience This audiobook is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this audiobook useful. This audiobook covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">OAuth</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Barcaroli, Fabrizio</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781805121527/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-092807631
illustrated Not Illustrated
indexdate 2024-12-18T08:48:58Z
institution BVB
isbn 9781805121527
1805121529
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 audio file (7 hr., 41 min.))
psigel ZDB-30-ORH
publishDate 2023
publishDateSearch 2023
publishDateSort 2023
publisher Packt Publishing
record_format marc
spelling Di Federico, Giuseppe VerfasserIn aut
Cloud identity patterns and strategies for enterprise Giuseppe Di Federico, Fabrizio Barcaroli
[First edition].
[Place of publication not identified] Packt Publishing 2023
1 online resource (1 audio file (7 hr., 41 min.))
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; title from title details screen (O'Reilly, viewed May 2, 2023)
Get to grips with identity patterns and design a structured enterprise identity model for cloud applications About This Audiobook Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows In Detail Identity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However, information on cloud identity patterns is generally scattered across different sources and rarely approached from an architect's perspective, and this is what Cloud Identity Patterns and Strategies aims to solve, empowering solutions architects to take an active part in implementing identity solutions. Throughout this audiobook, you'll cover various theoretical topics along with practical examples that follow the implementation of a standard de facto identity provider (IdP) in an enterprise, such as Azure Active Directory. As you progress through the chapters, you'll explore the different factors that contribute to an enterprise's current status quo around identities and harness modern authentication approaches to meet specific requirements of an enterprise. You'll also be able to make sense of how modern application designs are impacted by the company's choices and move on to recognize how a healthy organization tackles identity and critical tasks that the development teams pivot on. By the end of this audiobook, you'll be able to breeze through creating portable, robust, and reliable applications that can interact with each other. Audience This audiobook is for cloud security engineers and identity experts. Enterprise architects, tech leads, developers, and anyone who wants to learn how to use identity patterns and strategies to build identity models for the modern cloud era will find this audiobook useful. This audiobook covers many DevOps and Agile principles; although not a pre-requisite, familiarity with these topics would be helpful.
OAuth
Business enterprises Computer networks Security measures
Computers Access control
Ordinateurs ; Accès ; Contrôle
Business enterprises ; Computer networks ; Security measures
Computers ; Access control
Audiobooks
Livres audio
Barcaroli, Fabrizio VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781805121527/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Di Federico, Giuseppe
Barcaroli, Fabrizio
Cloud identity patterns and strategies for enterprise
OAuth
Business enterprises Computer networks Security measures
Computers Access control
Ordinateurs ; Accès ; Contrôle
Business enterprises ; Computer networks ; Security measures
Computers ; Access control
Audiobooks
Livres audio
title Cloud identity patterns and strategies for enterprise
title_auth Cloud identity patterns and strategies for enterprise
title_exact_search Cloud identity patterns and strategies for enterprise
title_full Cloud identity patterns and strategies for enterprise Giuseppe Di Federico, Fabrizio Barcaroli
title_fullStr Cloud identity patterns and strategies for enterprise Giuseppe Di Federico, Fabrizio Barcaroli
title_full_unstemmed Cloud identity patterns and strategies for enterprise Giuseppe Di Federico, Fabrizio Barcaroli
title_short Cloud identity patterns and strategies for enterprise
title_sort cloud identity patterns and strategies for enterprise
topic OAuth
Business enterprises Computer networks Security measures
Computers Access control
Ordinateurs ; Accès ; Contrôle
Business enterprises ; Computer networks ; Security measures
Computers ; Access control
Audiobooks
Livres audio
topic_facet OAuth
Business enterprises Computer networks Security measures
Computers Access control
Ordinateurs ; Accès ; Contrôle
Business enterprises ; Computer networks ; Security measures
Computers ; Access control
Audiobooks
Livres audio
url https://learning.oreilly.com/library/view/-/9781805121527/?ar
work_keys_str_mv AT difedericogiuseppe cloudidentitypatternsandstrategiesforenterprise
AT barcarolifabrizio cloudidentitypatternsandstrategiesforenterprise