Single Sign-On Construction Essential Knowledge for Beginners 100

Posted By: TiranaDok

Single Sign-On Construction Essential Knowledge for Beginners 100 by Bunka Publishing, Horikawa Yuka, Tomoya Kanro
English | August 18, 2024 | ISBN: N/A | ASIN: B0DDL71GR6 | 306 pages | EPUB | 1.07 Mb

Dive into the world of Single Sign-On (SSO) with this comprehensive guide designed for beginners.
Learn the foundational concepts of OAuth 2.0, OpenID Connect, and JWT, essential for understanding SSO.
Explore the differences between OAuth and OIDC, and discover the importance of access and refresh tokens.
This book covers security implications, token management, and the role of identity providers and service providers.
Understand SAML as an alternative to OAuth and learn about the structure of SAML assertions.
Gain insights into security risks, secure single logout (SLO), and effective user session management.
Perfect for anyone looking to build a solid foundation in SSO and enhance their knowledge in secure authentication practices.
Unlock the secrets of secure SSO implementation and elevate your technical skills today!

《Index》
・Understanding OAuth 2.0: The Foundation of SSO
・Introduction to OpenID Connect
・Understanding JWT in Single Sign-On (SSO)
・Differentiating Between OAuth (Authorization) and OIDC (Authentication)
・Understanding Access Tokens and Refresh Tokens in OAuth 2.0
・Securely Storing and Managing Tokens
・Understanding OAuth 2.0 Flows: Authorization Code, Implicit, Client Credentials, and Password
・Understanding Security Implications of OAuth 2.0 Flows
・Enhancing Security in SSO with PKCE
・Understanding the Role of an Identity Provider in SSO
・Understanding Service Providers (SP) in Single Sign-On (SSO)
・Understanding SAML as an Alternative to OAuth for SSO
・Understanding the Structure of a SAML Assertion
・Identity Provider-Initiated vs. Service Provider-Initiated SSO
・Understanding Security Risks in SSO: Token Hijacking and Replay Attacks
・Implementing Secure Single Logout (SLO) in SSO Systems
・Managing User Sessions in an SSO Environment
・Understanding Token Expiration and Refresh Strategies
…etc