Thorgersen S. Keycloak - Identity and Access Management for Modern App 2ed 2023

Download Download Torrent Opens in your torrent client (e.g. qBittorrent)
Category Other
Size0.01 kB
Added1 year ago (2025-03-10 23:38:34)
Health
Good3/0
Info Hash4210B608E8E417496E9158F77DA7FB783227739B
Peers Updated10 hours ago (2026-03-24 11:00:35)

Report Torrent

0 / 300

Description


Textbook in PDF format

Key Features
• Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples
• Configure, manage, and extend Keycloak for optimized security
• Leverage Keycloak features to secure different application types
Book Description
Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production.
By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications.
What you will learn
• Understand how to install, configure, and manage Keycloak
• Secure your new and existing applications with Keycloak
• Gain a basic understanding of OAuth 2.0 and OpenID Connect
• Understand how to configure Keycloak to make it ready for production use
• Discover how to leverage additional features and how to customize Keycloak to fit your needs
• Get to grips with securing Keycloak servers and protecting applications
Who this book is for
Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.
Table of Contents
1. Getting Started with Keycloak
2. Securing Your First Application
3. Brief Introduction to Standards
4. Authenticating Users with OpenID Connect
5. Authorizing Access with OAuth 2.0
6. Securing Different Application Types
7. Integrating Applications with Keycloak
8. Authorization Strategies
9. Configuring Keycloak for Production
10. Managing Users
11. Authenticating Users
12. Managing Tokens and Sessions
13. Extending Keycloak
14. Securing Keycloak and Applications

×