Muutke küpsiste eelistusi

E-raamat: Modern Authentication with Azure Active Directory for Web Applications

  • Formaat: 336 pages
  • Sari: Developer Reference
  • Ilmumisaeg: 17-Dec-2015
  • Kirjastus: Microsoft Press,U.S.
  • Keel: eng
  • ISBN-13: 9780735698482
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 18,71 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 336 pages
  • Sari: Developer Reference
  • Ilmumisaeg: 17-Dec-2015
  • Kirjastus: Microsoft Press,U.S.
  • Keel: eng
  • ISBN-13: 9780735698482
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Active Directory has been thoroughly transformed to reflect the industry's breakneck shift to the cloud, modern authentication/authorization protocols such as OAuth2 and OpenId Connect, and new today's new mobile, SaaS, and single-page application paradigms. Now, there's an authoritative, start-to-finish guide to building Active Directory authentication solutions for these radically new environments.

Author Vittorio Bertocci is the Microsoft Program Manager responsible for implementing these new technologies. Bertocci drove them from initial concept to general availability, played a key role in their technical design, and wrote many of their samples and much of their documentation. Nobody is more qualified to write this book.

In Modern Authentication with Active Directory, he delivers comprehensive guidance for building complete solutions. Balancing theory with concrete code-level guidance, he paints a complete picture -- placing individual tasks in context, explaining how disparate tasks fit together, helping you choose and design your solution, and demonstrating how to implement it reliably, safely, and efficiently.

Step by step, you'll gain deep mastery of Active Directory Authentication Library (ADAL) for Windows Store, Windows Phone, .NET, and JavaScript single-page app development; ASP.NET OWIN security components for Web API and OpenId Connect, and much more. You'll also gain deep insight into today's new authentication protocols, eliminating the need to read and interpret abstruse specifications documents.

Drawing on his deep technical expertise, Bertocci shows how to go far beyond the basic SDK samples, smoothly handling advanced scenarios and "edge cases." For each major app type, he:

  • Presents a typical high-level scenario
  • Offers quick guidance on how to implement it ("instant gratification")
  • Steps back to explain the theory behind the solution
  • Helps you leverage your new understanding to refine your solution
  • Provides advanced hands-on guidance that builds on what you've learned

Modern Authentication with Active Directory brings together all the knowledge you'll need to address any authentication challenge -- in any on-premises, mobile, or cloud environment.

Foreword xi
Introduction xiii
Chapter 1 Your first Active Directory app 1(10)
The sample application
1(1)
Prerequisites
1(2)
Microsoft Azure subscription
2(1)
Visual Studio 2015
2(1)
Creating the application
3(1)
Running the application
4(3)
ClaimsPrincipal: How .NET represents the caller
7(3)
Summary
10(1)
Chapter 2 Identity protocols and application types 11(40)
Pre-claims authentication techniques
12(5)
Passwords, profile stores, and individual applications
12(2)
Domains, integrated authentication, and applications on an Intranet
14(3)
Claims-based identity
17(6)
Identity providers: DCs for the Internet
17(1)
Tokens
18(2)
Trust and claims
20(1)
Claims-oriented protocols
20(3)
Round-trip web apps, first-generation protocols
23(8)
The problem of cross-domain single sign-on
23(2)
SAML
25(2)
WS-Federation
27(4)
Modern apps, modern protocols
31(18)
The rise of the programmable web and the problem of access delegation
32(1)
OAuth2 and web applications
33(4)
Layering web sign-in on OAuth
37(2)
OpeniD Connect
39(5)
More API consumption scenarios
44(1)
Single-page applications
45(2)
Leveraging web investments in native clients
47(2)
Summary
49(2)
Chapter 3 Introducing Azure Active Directory and Active Directory Federation Services 51(18)
Active Directory Federation Services
52(4)
ADFS and development
53(1)
Getting ADFS
54(1)
Protocols support
55(1)
Azure Active Directory: Identity as a service
56(11)
Azure AD and development
60(1)
Getting Azure Active Directory
61(2)
Azure AD for developers: Components
63(2)
Notable nondeveloper features
65(2)
Summary
67(2)
Chapter 4 Introducing the identity developer libraries 69(20)
Token requestors and resource protectors
69(6)
Token requestors
70(3)
Resource protectors
73(1)
Hybrids
74(1)
The Azure AD libraries landscape
75(10)
Token requestors
76(5)
Resource protectors
81(4)
Hybrids
85(1)
Visual Studio integration
85(2)
AD integration features in Visual Studio 2013
86(1)
AD integration features in Visual Studio 2015
86(1)
Summary
87(2)
Chapter 5 Getting started with web sign-on and Active Directory 89(18)
The web app you build in this chapter
89(1)
Prerequisites
90(1)
Steps
90(1)
The starting project
90(2)
NuGet packages references
92(1)
Registering the app in Azure AD
93(2)
OpeniD Connect initialization code
95(2)
Host the OWIN pipeline
95(1)
Initialize the cookie and OpenID Connect middlewares
96(1)
[ Authorize], claims, and first run
97(2)
Adding a trigger for authentication
97(1)
Showing some claims
98(1)
Running the app
99(1)
Quick recap
99(1)
Sign-in and sign-out
99(4)
Sign-in logic
100(1)
Sign-out logic
101(1)
The sign-in and sign-out UI
102(1)
Running the app
103(1)
Using ADFS as an identity provider
103(2)
Summary
105(2)
Chapter 6 OpeniD Connect and Azure AD web sign-on 107(30)
The protocol and its specifications
107(3)
OpenID Connect Core 1.0
108(1)
OpenID Connect Discovery
108(1)
OAuth 2.0 Multiple Response Type, OAuth2 Form Post Response Mode
109(1)
OpenID Connection Session Management
109(1)
Other OpeniD Connect specifications
109(1)
Supporting specifications
109(1)
OpenID Connect exchanges signing in with Azure AD
110(24)
Capturing a trace
110(3)
Authentication request
113(6)
Discovery
119(3)
Authentication
122(1)
Response
123(3)
Sign-in sequence diagram
126(1)
The ID token and the JWT format
127(7)
OpenID Connect exchanges for signing out from the app and Azure AD
134(2)
Summary
136(1)
Chapter 7 The OWIN OpeniD Connect middleware 137(36)
OWIN and Katana
137(18)
What is OWIN?
137(2)
Katana
139(16)
OpenID Connect middleware
155(12)
OpenIdConnectAuthenticationOptions
155(4)
Notifications
159(8)
To ken ValidationParameters
167(4)
Valid values
168(1)
Validation flags
169(1)
Validators
169(1)
Miscellany
170(1)
More on sessions
171(1)
Summary
172(1)
Chapter 8 Azure Active Directory application model 173(50)
The building blocks: Application and ServicePrincipal
174(15)
The Application
177(10)
The ServicePrincipal object
187(2)
Consent and delegated permissions
189(22)
Application created by a nonadmin user
189(3)
Interlude: Delegated permissions to access the directory
192(5)
Application requesting admin-level permissions
197(3)
Admin consent
200(4)
Application created by an admin user
204(1)
Multitenancy
205(6)
App user assignment, app permissions, and app roles
211(8)
App user assignment
211(2)
App roles
213(3)
Application permissions
216(3)
Groups
219(2)
Summary
221(2)
Chapter 9 Consuming and exposing a web API protected by Azure Active Directory 223(50)
Consuming a web API from a web application
223(30)
Redeeming an authorization code in the OpenID Connect hybrid flow
224(8)
Using the access token for invoking a web API
232(19)
Other ways of getting access tokens
251(2)
Exposing a protected web API
253(19)
Setting up a web API project
253(5)
Handling web API calls
258(7)
Exposing both a web UX and a web API from the same Visual Studio project
265(1)
A web API calling another API: Flowing the identity of the caller and using "on behalf of"
266(5)
Protecting a web API with ADFS "3"
271(1)
Summary
272(1)
Chapter 10 Active Directory Federation Services in Windows Server 2016 Technical Preview 3 273(20)
Setup (for developers)
273(1)
The new management UX
274(2)
Web sign-on with OpenID Connect and ADFS
276(5)
OpenID Connect middleware and ADFS
276(1)
Setting up a web app in ADFS
277(3)
Testing the web sign-on feature
280(1)
Protecting a web API with ADFS and invoking it from a web app
281(11)
Setting up a web API in ADFS
281(4)
Code for obtaining an access token from ADFS and invoking a web API
285(3)
Testing the web API invocation feature
288(1)
Additional settings
289(3)
Summary
292(1)
Appendix: Further reading 293(2)
Index 295
Vittorio Bertocci is principal program manager on the Azure Active Directory team, where he works on the developer experience: Active Directory Authentication  Library (ADAL), OpenID Connect and OAuth2 OWIN components in ASP.NET, Azure AD  integration in various Visual Studio work streams, and other things he cant tell you about (yet). Vittorio joined the product team after years as a virtual member in his role as principal architect evangelist, during which time he contributed to the inception and launch of Microsofts claims-based platform components (Windows Identity Foundation, ADFS 2.0) and owned SaaS and identity evangelism for the .NET developers community.   Vittorio holds a Master's degree in computer science and began his career doing research on computational geometry and scientific visualization. In 2001 he joined Microsoft Italy, where he focused on the .NET platform and the nascent field of web services security, becoming a recognized expert at the national and European level.

Vittorio is easy to spot at conferences. He has spoken about identity in 23 countries on four continents, from keynote addresses to one-on-one meetings with customers. Vittorio is a regular speaker at Ignite, Build, Microsoft PDC, TechEd (US, Europe, Australia, New Zealand, Japan), TechDays, Gartner Summit, European Identity Conference, IDWorld, OreDev, NDC, IASA, Basta, and many others. At the moment his Channel 9 speaker page at https://channel9.msdn.com/events/speakers/vittorio-bertocci lists 44 recordings.   Vittorio is a published author, both in the academic and industry worlds, and has written many articles and papers. He is the author of Programming Windows Identity Foundation (Microsoft Press, 2010) and coauthor of "A Guide to Claims-Based Identity and Access Control" (Microsoft patterns & practices, 2010) and Understanding Windows Cardspace (Addison-Wesley, 2008). He is a prominent authority and blogger on identity, Azure, .NET development, and related topics: he shares his thoughts at www.cloudidentity.com and via his twitter feed, http://www.twitter.com/vibronet.   Vittorio lives in the lush green of Redmond with his wife, Iwona. He doesnt mind the gray skies too much, but every time he has half a chance, he flies to some place on the beach, be it the South Pacific or Camogli, his home town in Italy.