Summary
In this chapter, we learned about the various patterns that we can use to add IAM capabilities for cloud applications. This addresses how to meet the authentication and authorization needs of an application that leverages resources and services from the cloud. We also looked at how to deal with service-to-service authentication and authorization patterns. Building these modules in a standards-based model helps accelerate the implementation. In this regard, we learned the specifics of standards such as SAML and OIDC.
In the next chapter, we will learn about the patterns on how to secure the hybrid cloud infrastructure on top of which these applications run.