Implementing Identity and Access Management for Cloud Applications
In this chapter, you will learn how to add authentication and manage access to applications deployed on the cloud. This chapter will discuss the patterns to enhance web and mobile apps with identity and access management (IAM) security capabilities.
The following topics will be covered in this chapter:
- Authentication pattern for cloud application users
- Service-to-service authentication
- Cloud application authorization patterns
The following diagram illustrates application IAM patterns:
Figure 4.1 – Application IAM patterns
As shown in the preceding diagram, the patterns cover user onboarding, authentication and authorization patterns for web or mobile, and application programming interface (API) and backend applications.