Название: Learning Digital Identity: Design, Deploy, and Manage Identity Architectures (Final Release) Автор: Phillip J. Windley Издательство: O’Reilly Media, Inc. Год: 2023 Страниц: 472 Язык: английский Формат: pdf (true), epub (true) Размер: 14.7 MB, 14.1 MB
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them.
By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems. VPs and directors will learn how to more effectively leverage identity across their businesses.
When most people hear the term “digital identity”, they think of two things: the persistent pain of logging in with usernames and passwords and the bane of identity theft. Is digital identity about those things? Absolutely. Is it limited to those things? Absolutely not.
Trust is the most important currency in the digital world. Digital identities are how this trust is conveyed and embedded, and therefore their importance to our online society cannot be overstated. In short, digital identities are the key to how we can solve the fundamental trust issues with today’s internet. I doubt most readers need any convincing about the scale or severity of those problems. Some—like misinformation, ransomware, and Elon Musk’s struggle to verify Twitter accounts—are regular front-page headlines. What most readers will not appreciate, however, is the depth or complexity of these challenges.
But this book is also practical. In this book, I will teach you what digital identity is, why it’s hard to get right, what makes a good identity system, what technologies provide its foundation, how it’s done today, and where it’s going. You’ll learn why digital identity is at the heart of every online service and interaction, and why that position makes it one of the most important technologies you can work on.
This book helps you Learn why functional online identity is still a difficult problem for most companies Understand the purpose of digital identity and why it's fundamental to your business strategy Learn why "rolling your own" digital identity infrastructure is a bad idea Differentiate between core ideas such as authentication and authorization Explore the properties of centralized, federated, and decentralized identity systems Determine the right authorization methods for your specific application Understand core concepts such as trust, risk, security, and privacy Learn how digital identity and self-sovereign identity can make a difference for you and your organization
Who Is This Book For? The primary audience for this book is product managers, architects, and developers who can use its ideas to lay a firm foundation for their own work, based on the principles of digital identity and an understanding of the architectures and technologies that are available to solve identity problems. This book will give you a good grounding in the base-level technologies and protocols that play important roles in digital identity systems. Learning Digital Identity will give you a fresh perspective on the role identity plays in creating usable and compelling digital products.
A secondary audience for this book is chief information officers (CIOs), chief information security officers (CISOs), chief privacy officers (CPOs), risk managers, security engineers, and privacy professionals, who will read it to understand the terminology, concepts, and architectures. More importantly, I hope they come to see the potential of identity systems to make their business more secure, agile, and appealing. In this book you will learn the specific identity architectures that are possible and determine how those architectures impact the usability, availability, reliability, security, and privacy of your digital services and products.
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.