-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cloud Identity Patterns and Strategies
By :

In the previous section, we focused on how the number of IdPs used to authenticate the customer of a company can affect the design.
In this section, we are going to be focused on server-to-server authentication, a topic that is becoming even more important with cloud-born applications.
In the consumer example proposed in the previous section, having multiple IdPs for backend authentication (or server-to-server authentication) within an organization can lead to an even worse scenario than the one analyzed in the previous section.
Let’s forget user, consumer, or customer authentication for a minute; in other words, let’s forget the interactive authentication made by a human that was covered in the previous section, and let’s go deeper into analyzing backend authentication.
As covered in Chapter 1, Walkthrough of Digital Identity in the Enterprise, digital transformation and the cloud are impacting the...
Change the font size
Change margin width
Change background colour