Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Multifactor Authentication

You're reading from   Implementing Multifactor Authentication Protect your applications from cyberattacks with the help of MFA

Arrow left icon
Product type Paperback
Published in Jun 2023
Publisher Packt
ISBN-13 9781803246963
Length 550 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Marco Fanti Marco Fanti
Author Profile Icon Marco Fanti
Marco Fanti
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Part 1: Introduction
2. Chapter 1: On the Internet, Nobody Knows You’re a Dog FREE CHAPTER 3. Chapter 2: When to Use Different Types of MFA 4. Part 2: Implementing Multifactor Authentication
5. Chapter 3: Preventing 99.9% of Attacks – MFA with Azure AD and Duo 6. Chapter 4: Implementing Workforce and Customer Authentication Using Okta 7. Chapter 5: Access Management with ForgeRock and Behavioral Biometrics 8. Chapter 6: Federated SSO with PingFederate and 1Kosmos 9. Chapter 7: MFA and the Cloud – Using MFA with Amazon Web Services 10. Chapter 8: Google Cloud Platform and MFA 11. Chapter 9: MFA without Commercial Products – Doing it All Yourself with Keycloak 12. Part 3: Proven Implementation Strategies and Deploying Cutting-Edge Technologies
13. Chapter 10: Implementing MFA in the Real World 14. Chapter 11: The Future of (Multifactor) Authentication 15. Index 16. Other Books You May Enjoy Appendix A: Installing the Java Software Development Kit 1. Appendix B: Custom App Integration with Azure AD 2. Appendix C: Installing Apache Tomcat Software

To get the most out of this book

This book assumes that readers are already familiar with at least one of the cloud platform service providers discussed – AWS, Microsoft Azure, and GCP. Therefore, we’ve made a few assumptions about your existing knowledge and experience:

  • Basic understanding of cloud computing: You should understand the fundamentals of cloud computing, including Software-as-a-Service (SaaS) concepts
  • Familiarity with one or more cloud platforms: Experience with AWS, Azure, or GCP is helpful, as many concepts in this book build upon the services and architecture of these platforms

Products covered in the book

Requirements

Azure AD

Azure AD Premium P1

Okta Workforce Identity

An Okta Standard account

Okta Customer Identity

An Okta Developer or Enterprise account

ForgeRock – Access Manager

A ForgeRock software platform account

Ping Identity – PingFederate

A Ping Identity account

AWS

An AWS root account

Google Cloud Identity

Google Cloud Identity or Workspace account

Keycloak

The Keycloak server’s latest version (version 21.1.1 was used in this book)

Duo

A Duo Essentials account

1Kosmos – BlockID

A BlockID account

BehavioSec

A BehavioSec account

Knowing how to utilize Java and Docker for deploying applications is a helpful skill while reading this book. Some products we’ll discuss can be locally installed and run as standalone Java applications or as Docker containers:

  • Java Platform: Many enterprise-level applications, including some IAM products we will explore, are built with Java due to its robustness, portability, and scalability. Understanding how Java applications are deployed will give you a solid grasp of these solutions’ underlying structure and functioning.
  • Docker containers: Docker is a popular platform that uses containerization to package an application and its dependencies into a single object. Docker can simplify the deployment process and eliminate the “but it works on my machine” problem, making it an excellent tool for deploying applications for testing and development. Understanding how to pull, run, and manage Docker containers can significantly simplify installing and running the software products discussed in this book.
  • Running servers: Certain products, such as Keycloak, run on a server that can be initiated using Java or run inside a Docker container. Understanding how to start these servers using either of these methods is essential for installing and testing these products in a local environment.
  • Troubleshooting and customization: Understanding Java and Docker deployment also aids in troubleshooting any issues that might arise during the installation or operation of the software. Furthermore, if the product is open source, you can customize it to suit your needs better, and understanding the deployment process will be crucial for this.
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image