دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: امنیت ویرایش: نویسندگان: Stian Thorgersen سری: ISBN (شابک) : 9781800562493 ناشر: Packt Publishing Pvt. Ltd. سال نشر: 2021 تعداد صفحات: 0 زبان: English فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 8 مگابایت
در صورت تبدیل فایل کتاب Keycloak - Identity and Access Management for Modern Applications به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب Keycloak - مدیریت هویت و دسترسی برای برنامه های کاربردی مدرن نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
یاد بگیرید که از قابلیت های پیشرفته Keycloak، یک راه حل مدیریت دسترسی و هویت منبع باز، برای فعال کردن احراز هویت و مجوز در برنامه ها استفاده کنید. Keycloak برای امنیت بهینهسازی ویژگیهای Keycloak برای ایمنسازی انواع مختلف برنامهها شرح کتاب پیادهسازی احراز هویت و مجوز برای برنامهها میتواند تجربه دلهرهآوری باشد و اغلب آنها را در معرض آسیبپذیریهای امنیتی قرار میدهد. Keycloak یک راه حل منبع باز برای مدیریت هویت و مدیریت دسترسی برای برنامه های مدرن است. Keycloak - مدیریت هویت و دسترسی برای برنامههای مدرن مقدمهای جامع برای Keycloak است که به شما کمک میکند استفاده از آن و ایمنسازی برنامههای خود را شروع کنید. این راهنمای ساده با آموزشهای عملی، بهترین شیوهها و سوالات خودارزیابی، به شما نشان میدهد که چگونه یک برنامه نمونه را ایمن کنید و سپس به سراغ ایمنسازی انواع مختلف برنامه بروید. همانطور که پیشرفت می کنید، نحوه پیکربندی و مدیریت Keycloak و همچنین نحوه استفاده از برخی از قابلیت های پیشرفته تر آن را خواهید فهمید. در نهایت، بینشی در مورد استفاده ایمن از Keycloak در تولید به دست خواهید آورد. در پایان این کتاب، نحوه نصب و مدیریت Keycloak و همچنین نحوه ایمن سازی برنامه های جدید و موجود را خواهید آموخت. آنچه یاد خواهید گرفت درک نحوه نصب، پیکربندی و مدیریت Keycloak برنامه های جدید و موجود خود را با Keycloak ایمن کنید درک اولیه OAuth 2.0 و OpenID Connect را به دست آورید. و نحوه سفارشی کردن Keycloak برای مطابقت با نیازهای خود با ایمن کردن سرورهای Keycloak و محافظت از برنامههای کاربردی آشنا شوید. دانش سطح مبتدی از توسعه برنامه و احراز هویت و مجوز انتظار می رود.
Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applications Key Features Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples Configure, manage, and extend Keycloak for optimized security Leverage Keycloak features to secure different application types Book Description Implementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications. Keycloak - Identity and Access Management for Modern Applications is a comprehensive introduction to Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications. What You Will Learn Understand how to install, configure, and manage Keycloak Secure your new and existing applications with Keycloak Gain a basic understanding of OAuth 2.0 and OpenID Connect Understand how to configure Keycloak to make it ready for production use Discover how to leverage additional features and how to customize Keycloak to fit your needs Get to grips with securing Keycloak servers and protecting applications Who this book is for Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.
Cover Title page Copyright and Credits Contributors About the authors About the reviewers Table of Contents Preface Who this book is for What this book covers To get the most out of this book Download the example code files Code in Action Download the color images Conventions used Get in touch Reviews Section 1: Getting Started with Keycloak Chapter 1: Getting Started with Keycloak Technical requirements Introducing Keycloak Installing and running Keycloak Running Keycloak on Docker Installing and running Keycloak with OpenJDK Discovering the Keycloak admin and account consoles Getting started with the Keycloak admin console Getting started with the Keycloak account console Summary Questions Chapter 2: Securing Your First Application Technical requirements Understanding the sample application Running the application Understanding how to log in to the application Securely invoking the backend REST API Summary Questions Section 2: Securing Applications with Keycloak Chapter 3: Brief Introduction to Standards Authorizing application access with OAuth 2.0 Authenticating users with OpenID Connect Leveraging JWT for tokens Understanding why SAML 2.0 is still relevant Summary Questions Chapter 4: Authenticating Users with OpenID Connect Technical requirements Running the OpenID Connect playground Understanding the Discovery endpoint Authenticating a user Understanding the ID token Updating the user profile Adding a custom property Adding roles to the ID token Invoking the UserInfo endpoint Dealing with users logging out Initiating the logout Leveraging ID and access token expiration Leveraging OIDC Session Management Leveraging OIDC Back-Channel Logout A note on OIDC Front-Channel Logout How should you deal with logout? Summary Questions Further reading Chapter 5: Authorizing Access with OAuth 2.0 Technical requirements Running the OAuth 2.0 playground Obtaining an access token Requiring user consent Limiting the access granted to access tokens Using the audience to limit token access Using roles to limit token access Using the scope to limit token access Validating access tokens Summary Questions Further reading Chapter 6: Securing Different Application Types Technical requirements Understanding internal and external applications Securing web applications Securing server-side web applications Securing a SPA with a dedicated REST API Securing a SPA with an intermediary REST API Securing a SPA with an external REST API Securing native and mobile applications Securing REST APIs and services Summary Questions Further reading Chapter 7: Integrating Applications with Keycloak Technical requirements Choosing an integration architecture Choosing an integration option Integrating with Golang applications Configuring a Golang client Integrating with Java applications Using Quarkus Using Spring Boot Using Keycloak adapters Integrating with JavaScript applications Integrating with Node.js applications Creating a Node.js resource server Integrating with Python applications Creating a Python client Creating a Python resource server Using a reverse proxy Try not to implement your own integration Summary Questions Further reading Chapter 8: Authorization Strategies Understanding authorization Using RBAC Using GBAC Mapping group membership into tokens Using OAuth2 scopes Using ABAC Using Keycloak as a centralized authorization server Summary Questions Further reading Section 3: Configuring and Managing Keycloak Chapter 9: Configuring Keycloak for Production Technical requirements Setting the hostname for Keycloak Setting the frontend URL Setting the backend URL Setting the admin URL Enabling TLS Configuring a database Enabling clustering Configuring a reverse proxy Distributing the load across nodes Forwarding client information Keeping session affinity Testing your environment Testing load balancing and failover Testing the frontend and backchannel URLs Summary Questions Further reading Chapter 10: Managing Users Technical requirements Managing local users Creating a local user Managing user credentials Obtaining and validating user information Enabling self-registration Managing user attributes Integrating with LDAP and Active Directory Understanding LDAP mappers Synchronizing groups Synchronizing roles Integrating with third-party identity providers Creating a OpenID Connect identity provider Integrating with social identity providers Allowing users to manage their data Summary Questions Further reading Chapter 11: Authenticating Users Technical requirements Understanding authentication flows Configuring an authentication flow Using passwords Changing password policies Resetting user passwords Using OTPs Changing OTP policies Allowing users to choose whether they want to use OTP Forcing users to authenticate using OTP Using Web Authentication (WebAuthn) Enabling WebAuthn for an authentication flow Registering a security device and authenticating Using strong authentication Summary Questions Further reading Chapter 12: Managing Tokens and Sessions Technical requirements Managing sessions Managing session lifetimes Managing active sessions Expiring user sessions prematurely Understanding cookies and their relation to sessions Managing tokens Managing ID tokens' and access tokens' lifetimes Managing refresh tokens' lifetimes Enabling refreshing token rotation Revoking tokens Summary Questions Further reading Chapter 13: Extending Keycloak Technical requirements Understanding Service Provider Interfaces Packaging a custom provider Installing a custom provider Understanding the KeycloakSessionFactory and KeycloakSession components Understanding the life cycle of a provider Configuring providers Changing the look and feel Understanding themes Creating and deploying a new theme Extending templates Extending theme-related SPIs Customizing authentication flows Looking at other customization points Summary Questions Further reading Section 4: Security Considerations Chapter 14: Securing Keycloak and Applications Securing Keycloak Encrypting communication to Keycloak Configuring the Keycloak hostname Rotating the signing keys used by Keycloak Regularly updating Keycloak Loading secrets into Keycloak from an external vault Protecting Keycloak with a firewall and an intrusion prevention system Securing the database Protecting the database with a firewall Enabling authentication and access control for the database Encrypting the database Securing cluster communication Enabling cluster authentication Encrypting cluster communication Securing user accounts Securing applications Web application security OAuth 2.0 and OpenID Connect best practice Keycloak client configurations Summary Questions Further reading Assessments Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Why subscribe? Other Books You May Enjoy Packt is searching for authors like you Leave a review - let other readers know what you think Index