Building an Identity Architecture | Free Network & Security COURSE
Building an Identity Architecture | Free Network & Security COURSE |
Description
This course will be utterly useful as it explains how to build a secure and scalable platform which is capable of managing identities, governing the issuance of tokens, and being responsible for federation.
In the first session, we will introduce you to the concept of Neo-security and then take a closer look at the three main parts of the systems that adhere to it:
The Identity Management System
The API Management System
The Entitlement Management System
In the second part, we will look at API integration patterns and how to properly secure your APIs in the Neo-security architecture. We will talk about:
The Phantom token flow
The Split token flow
Proof-of-Possession tokens
In the third part of the Building an Identity Architecture course, we continue learning about the different API integration patterns. We will take a closer look at:
How to organize scopes and claims
Levels of enforcement
Token sharing techniques, when APIs talk to each other
Dealing with entitlement
In the fourth and last part of the Building an Identity Architecture course, we examine identities and access management, the details of authentication. In the session, we share:
Insight on user identities
Theory of the authentication process
The relationship between authentication and authorization
An overview of federation