SlideShare une entreprise Scribd logo
1  sur  7
What is it, exactly, that you’re focusing on?
Deploying an application access management suite is currently too expensive for any but
the largest enterprises who can afford platforms like Oracle Access Manager, IBM Tivoli
Access Manager or CA Site Minder. These security suites use proprietary protocols which
frequently result in “vendor lock-in.” This book would document a recipe to leverage open
standards to build an enterprise class web access management using 100% open source
components. This recipe has been developed by Gluu over the last five years, and is proven
to work in a variety of deployments around the globe that vary in size from small to
humongous.
Why does the community use this tool?
People–employees, customers, and partners–need to be identified to interact electronically
with an organization. Authentication (authn) and authorization (authz) is a challenge
faced by almost every organization large enough to register an Internet domain. And it’s
not just people that need to be authenticated and authorized. “Clients” are online agents
that can interact with services on your behalf. With the emergence of the IoT and the API
economy, developers and system administrators are urgently searching for standards
based solutions and best practices to improve the security of web and mobile applications.
While commercial solutions exist, there are many organizations that prefer the do-it-
yourself approach. Authentication impacts the integrity of every transaction performed
by a person or client on the network. In some cases, web authentication is the
organization’s keys to the kingdom. There are many organizations that will never
outsource this function. And there are many organizations that see excellence in
authentication–which is the front door to their Internet presence–as a competitive
advantage to drive adoption of their products and services. For these organizations, a
recipe for open source access management would be extremely helpful.
What are people doing with it on a daily basis?
Application security is a very difficult and scary topic for the average system
administrator. Authentication and authorization is the first step for almost any content
of value. If the central authn/authz service is down, even the CEO of the company may
not be able to read her email. Or worse, a security breach may result in a financial loss
for the organization or even dismissal. This book would document a proven solution to
enable sysadmins to confidently deploy a modern, flexible authn/authz service that
would be available day after day for many years to come.
What are its benefits to users, compared to a new/old rival?
The recipe documented in the book is a proven stack of wam software used by
universities, governments, large companies and websites.
This stack has more features and is easier to manage than commercial alternatives. If you
are paranoid about the NSA spying on you, then you can read all the code. This recipe
includes some of the most widely deployed and some of the most cutting edge security
solutions available anywhere.
Organizations who don’t use open source may use expensive commercial software or a
SaaS service. As application security is a universal requirement, both of these options will
make sense for some organizations.
The recipe documented in this book is not the only open source recipe possible the book is
not intended to be a compendium of all open source security solutions. It’s a curated recipe
of a suite of software proven to work together to satisfy the requirements of many
organizations large and small.
What issues does your community face, day to day?
A recent Verizon study indicated that 80% of Internet breaches were the direct result of
bad password security. But how can organizations reduce reliance on passwords, without
tightly coupling authentication technology into applications? How can the deploy ability
issues of strong authentication be addressed?
Mobile applications are creating new requirements for companies. There has been a
paradigm shift where enterprise services are published with JSON/REST APIs to support both
web sites and mobile apps. Organizations are using more services hosted by third parties.
Some web sites are facing requirements to support the standards based security
infrastructures of their customers or partners.
It’s impossible for the average system administrator to patch together a solution to address
all these challenges. It’s time for an open source alternative.
What else can it do?
The solution is very flexible. It is solving a wide range of use cases today. One area that could
be expanded is “enrollment,” which involves creating an internal profile for a person who is
authenticated at another domain (like Google). Another extra-credit topic that is not needed
by the average domain is multi-party federation hosting. This enables an organization to vet
a list of trusted, autonomous partners who publish applications or authenticate people.
What do its friends look like?
Many governments are anxious to see open source alternatives for security. The Internet will
not become a safer place if only big companies can afford security. Higher Education has
also been early adopters of open standards for security
. Part of the solution is based on open source software already popular in this segment.
Finally, many companies are anxious for more cost effective solutions to recommend to
partners. If you need your partners to support secure open standards for security, you
can’t ask them to buy expensive enterprise software. Finally, privacy advocates around
the globe prefer open source security solutions, especially in light of recent revelations
regarding US government spying.
What does the future look like?
There is a major paradigm shift happening right now. In the past, there were too many
Internet standards for web authentication: Opined 2.0, OAuth 1.0, WS-Federation, CAS,
and many other protocols are on the trash heap of failed or fading efforts. Finally, new
standards have arisen that use the OAuth2 pattern, leveraging a JSON/REST API
architecture that is friendly to application developers. There is more consensus than
ever on how to achieve interoperable security. If authentication and authorization
becomes a decentralized Internet infrastructure like SMTP or DNS, the know-how for
how to launch a manage these services will be in high demand across the globe.
Product Proposal
API and Mobile Access Management
What is the vision and purpose of this product?
While the vision for securing the Internet is clear to the “identerati”–the experts who
developed the standards–we need to get the information into the hands of a much wider
audience. It is imperative for our society that we decentralize identity.
Face book and Google have bridged our inability to identify our friends on the Internet
by providing a centralized solution–you can share a Google doc with someone only
because they also have a Google account. With a myriad of vendors producing hardware
and software that interact on our behalf, we cannot build our society on these central
identity silos. Like enlightened despotism, it seems efficient. But over time, it
undermines the original design goal of the Internet… the largest federation of
autonomous entities ever assembled into one network. The Internet was made possible
by standards like TCP/IP, DNS, http and ssl. After 20 years, we have an Internet identity
infrastructure, and it’s time to get the word out. For this, we need paper!
Who is the reader/viewer at the start?
The basic profile of the person is a “Unix system administrator.” However, others in the
organization who use or rely on the infrastructure may also want to read it.
To read this book, the person will need to understand the current infrastructure of the
Internet: TCP/IP, DNS, SMTP, HTTP, and SSL. Some knowledge of private-public key
cryptography would also helpful, although the required concepts will be reviewed–it’s
so critical, it can’t be assumed. No programming is assumed, although some additional
material will be referenced, as many programmers will certainly read this book.
Who is the reader/viewer at the end?
After reading the book, the reader should be ready to deploy the components to enable
application testing and development to proceed. The roadmap for security should be
clear, including which services are needed to meet the requirements of the reader’s
organization. Importantly, after reading this book, the programmers, system
administrators, and Chief Information Security Officer should be able to get alignment
much more quickly on the important standards, and the moving pieces that need to be
addressed from a business perspective, not just a technical perspective.
Article resource:-https://sites.google.com/site/thegluuserver/packt-publishing-book-
proposal-api-and-mobile-access-management

Contenu connexe

Tendances

Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
Securing Oracle Database 12c
Securing Oracle Database 12cSecuring Oracle Database 12c
Securing Oracle Database 12cInprise Group
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web ServicesAshish Jain
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_securityAnil Pandey
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breachCloudMask inc.
 
LinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security PolicyLinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security PolicyChris Niggel
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
Share point encryption
Share point encryptionShare point encryption
Share point encryptioncsmith2009
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share PointArt Upton
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Dana Gardner
 

Tendances (20)

Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
Case study
Case studyCase study
Case study
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
Securing Oracle Database 12c
Securing Oracle Database 12cSecuring Oracle Database 12c
Securing Oracle Database 12c
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_security
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
LinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security PolicyLinkedIn - Creating a Cloud Security Policy
LinkedIn - Creating a Cloud Security Policy
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Share point encryption
Share point encryptionShare point encryption
Share point encryption
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share Point
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
Identity and Access Management as a Service Gets Boost with SailPoint's Ident...
 

En vedette

Publishing presentation
Publishing presentationPublishing presentation
Publishing presentationagswallow
 
Cona project jean report
Cona project jean reportCona project jean report
Cona project jean reportashwani916
 
Get your next book published
Get your next book publishedGet your next book published
Get your next book publishedLee Constantine
 
Publishing 101: How it all Works and How You Fit In
Publishing 101: How it all Works and How You Fit InPublishing 101: How it all Works and How You Fit In
Publishing 101: How it all Works and How You Fit InMelanie Rigney
 
Book publishing for cvl book fair 8 25 10
Book publishing for cvl book fair 8 25 10Book publishing for cvl book fair 8 25 10
Book publishing for cvl book fair 8 25 10Esther Grassian
 
Spectrum Publishing PPT draft.pptx.pptx
Spectrum Publishing PPT draft.pptx.pptxSpectrum Publishing PPT draft.pptx.pptx
Spectrum Publishing PPT draft.pptx.pptxRebecca Mbanugo
 
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...Melanie Rigney
 
El diablo de los numeros 1 VALDERRAMA
El diablo de los numeros 1 VALDERRAMAEl diablo de los numeros 1 VALDERRAMA
El diablo de los numeros 1 VALDERRAMAjehosua97
 
Understanding Your Options in Book Publishing
Understanding Your Options in Book PublishingUnderstanding Your Options in Book Publishing
Understanding Your Options in Book PublishingSarah O'Keefe
 
Writing Book Proposals
Writing Book ProposalsWriting Book Proposals
Writing Book ProposalsGavin Harper
 
Why You Should Write a Book Proposal
Why You Should Write a Book ProposalWhy You Should Write a Book Proposal
Why You Should Write a Book ProposalKim Wolterman
 
Wiki Use Case: Publishing
Wiki Use Case: PublishingWiki Use Case: Publishing
Wiki Use Case: PublishingStewart Mader
 
2013 flex billing pt2- final version
2013 flex billing  pt2- final version2013 flex billing  pt2- final version
2013 flex billing pt2- final versionDylanRao
 
Training and development Program
Training and development ProgramTraining and development Program
Training and development ProgramZAINI ABDUL WAHAB
 
Writing in MLA Style
Writing in MLA StyleWriting in MLA Style
Writing in MLA StyleBrooksie Lane
 

En vedette (20)

Publishing presentation
Publishing presentationPublishing presentation
Publishing presentation
 
Roma GLB
Roma GLBRoma GLB
Roma GLB
 
Cuadro 9
Cuadro 9 Cuadro 9
Cuadro 9
 
Cona project jean report
Cona project jean reportCona project jean report
Cona project jean report
 
Get your next book published
Get your next book publishedGet your next book published
Get your next book published
 
Publishing 101: How it all Works and How You Fit In
Publishing 101: How it all Works and How You Fit InPublishing 101: How it all Works and How You Fit In
Publishing 101: How it all Works and How You Fit In
 
Book publishing for cvl book fair 8 25 10
Book publishing for cvl book fair 8 25 10Book publishing for cvl book fair 8 25 10
Book publishing for cvl book fair 8 25 10
 
Spectrum Publishing PPT draft.pptx.pptx
Spectrum Publishing PPT draft.pptx.pptxSpectrum Publishing PPT draft.pptx.pptx
Spectrum Publishing PPT draft.pptx.pptx
 
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
Lights! Camera! Your Book Proposal! ... and Why You Need One, Even if You're ...
 
El diablo de los numeros 1 VALDERRAMA
El diablo de los numeros 1 VALDERRAMAEl diablo de los numeros 1 VALDERRAMA
El diablo de los numeros 1 VALDERRAMA
 
Researching Grants
Researching GrantsResearching Grants
Researching Grants
 
Understanding Your Options in Book Publishing
Understanding Your Options in Book PublishingUnderstanding Your Options in Book Publishing
Understanding Your Options in Book Publishing
 
Ge80 c damron 4 11 10
Ge80 c damron 4 11 10Ge80 c damron 4 11 10
Ge80 c damron 4 11 10
 
Writing Book Proposals
Writing Book ProposalsWriting Book Proposals
Writing Book Proposals
 
7710311 book proposal-sample
7710311 book proposal-sample7710311 book proposal-sample
7710311 book proposal-sample
 
Why You Should Write a Book Proposal
Why You Should Write a Book ProposalWhy You Should Write a Book Proposal
Why You Should Write a Book Proposal
 
Wiki Use Case: Publishing
Wiki Use Case: PublishingWiki Use Case: Publishing
Wiki Use Case: Publishing
 
2013 flex billing pt2- final version
2013 flex billing  pt2- final version2013 flex billing  pt2- final version
2013 flex billing pt2- final version
 
Training and development Program
Training and development ProgramTraining and development Program
Training and development Program
 
Writing in MLA Style
Writing in MLA StyleWriting in MLA Style
Writing in MLA Style
 

Similaire à Packt publishing book proposal api and mobile access management

Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling modelJose Guerrero
 
Learn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentLearn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentStave
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?Jane Brewer
 
OAuth big picture
OAuth big pictureOAuth big picture
OAuth big pictureMin Li
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Black Duck by Synopsys
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The CloudPeter Coffee
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdfSavinder Puri
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7Charles Rey
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsWhite Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsSonatype
 
KnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented ArchitectureKnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented Architecturerohitkhare
 
Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?John Newton
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...Black Duck by Synopsys
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 

Similaire à Packt publishing book proposal api and mobile access management (20)

Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling model
 
Learn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow InvestmentLearn How to Maximize Your ServiceNow Investment
Learn How to Maximize Your ServiceNow Investment
 
What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?What Will the Top Software Development Trends Be in 2023?
What Will the Top Software Development Trends Be in 2023?
 
OAuth big picture
OAuth big pictureOAuth big picture
OAuth big picture
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
Open Source Insight: Struts in VMware, Law Firm Cybersecurity, Hospital Data ...
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Oauth ebook-2012-02
Oauth ebook-2012-02Oauth ebook-2012-02
Oauth ebook-2012-02
 
Faster In The Cloud
Faster In The CloudFaster In The Cloud
Faster In The Cloud
 
2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf2021-10-14 The Critical Role of Security in DevOps.pdf
2021-10-14 The Critical Role of Security in DevOps.pdf
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your ApplicationsWhite Paper: 7 Security Gaps in the Neglected 90% of your Applications
White Paper: 7 Security Gaps in the Neglected 90% of your Applications
 
KnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented ArchitectureKnowNow Syndication-Oriented Architecture
KnowNow Syndication-Oriented Architecture
 
Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?Why stop Open Source in the Enterprise?
Why stop Open Source in the Enterprise?
 
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...Open Source Insight: Samba Vulnerability, Connected Car Risks,  and Are You R...
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 

Plus de Gluu

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutionsGluu
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot awardGluu
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiersGluu
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management pocGluu
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationGluu
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuGluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for artGluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s visionGluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers iiGluu
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Gluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxGluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Gluu
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submissionGluu
 
Go west young federation
Go west young federationGo west young federation
Go west young federationGluu
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxyGluu
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013Gluu
 

Plus de Gluu (20)

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
 

Dernier

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Packt publishing book proposal api and mobile access management

  • 1. What is it, exactly, that you’re focusing on? Deploying an application access management suite is currently too expensive for any but the largest enterprises who can afford platforms like Oracle Access Manager, IBM Tivoli Access Manager or CA Site Minder. These security suites use proprietary protocols which frequently result in “vendor lock-in.” This book would document a recipe to leverage open standards to build an enterprise class web access management using 100% open source components. This recipe has been developed by Gluu over the last five years, and is proven to work in a variety of deployments around the globe that vary in size from small to humongous. Why does the community use this tool? People–employees, customers, and partners–need to be identified to interact electronically with an organization. Authentication (authn) and authorization (authz) is a challenge faced by almost every organization large enough to register an Internet domain. And it’s not just people that need to be authenticated and authorized. “Clients” are online agents that can interact with services on your behalf. With the emergence of the IoT and the API economy, developers and system administrators are urgently searching for standards based solutions and best practices to improve the security of web and mobile applications.
  • 2. While commercial solutions exist, there are many organizations that prefer the do-it- yourself approach. Authentication impacts the integrity of every transaction performed by a person or client on the network. In some cases, web authentication is the organization’s keys to the kingdom. There are many organizations that will never outsource this function. And there are many organizations that see excellence in authentication–which is the front door to their Internet presence–as a competitive advantage to drive adoption of their products and services. For these organizations, a recipe for open source access management would be extremely helpful. What are people doing with it on a daily basis? Application security is a very difficult and scary topic for the average system administrator. Authentication and authorization is the first step for almost any content of value. If the central authn/authz service is down, even the CEO of the company may not be able to read her email. Or worse, a security breach may result in a financial loss for the organization or even dismissal. This book would document a proven solution to enable sysadmins to confidently deploy a modern, flexible authn/authz service that would be available day after day for many years to come. What are its benefits to users, compared to a new/old rival? The recipe documented in the book is a proven stack of wam software used by universities, governments, large companies and websites.
  • 3. This stack has more features and is easier to manage than commercial alternatives. If you are paranoid about the NSA spying on you, then you can read all the code. This recipe includes some of the most widely deployed and some of the most cutting edge security solutions available anywhere. Organizations who don’t use open source may use expensive commercial software or a SaaS service. As application security is a universal requirement, both of these options will make sense for some organizations. The recipe documented in this book is not the only open source recipe possible the book is not intended to be a compendium of all open source security solutions. It’s a curated recipe of a suite of software proven to work together to satisfy the requirements of many organizations large and small. What issues does your community face, day to day? A recent Verizon study indicated that 80% of Internet breaches were the direct result of bad password security. But how can organizations reduce reliance on passwords, without tightly coupling authentication technology into applications? How can the deploy ability issues of strong authentication be addressed?
  • 4. Mobile applications are creating new requirements for companies. There has been a paradigm shift where enterprise services are published with JSON/REST APIs to support both web sites and mobile apps. Organizations are using more services hosted by third parties. Some web sites are facing requirements to support the standards based security infrastructures of their customers or partners. It’s impossible for the average system administrator to patch together a solution to address all these challenges. It’s time for an open source alternative. What else can it do? The solution is very flexible. It is solving a wide range of use cases today. One area that could be expanded is “enrollment,” which involves creating an internal profile for a person who is authenticated at another domain (like Google). Another extra-credit topic that is not needed by the average domain is multi-party federation hosting. This enables an organization to vet a list of trusted, autonomous partners who publish applications or authenticate people. What do its friends look like? Many governments are anxious to see open source alternatives for security. The Internet will not become a safer place if only big companies can afford security. Higher Education has also been early adopters of open standards for security
  • 5. . Part of the solution is based on open source software already popular in this segment. Finally, many companies are anxious for more cost effective solutions to recommend to partners. If you need your partners to support secure open standards for security, you can’t ask them to buy expensive enterprise software. Finally, privacy advocates around the globe prefer open source security solutions, especially in light of recent revelations regarding US government spying. What does the future look like? There is a major paradigm shift happening right now. In the past, there were too many Internet standards for web authentication: Opined 2.0, OAuth 1.0, WS-Federation, CAS, and many other protocols are on the trash heap of failed or fading efforts. Finally, new standards have arisen that use the OAuth2 pattern, leveraging a JSON/REST API architecture that is friendly to application developers. There is more consensus than ever on how to achieve interoperable security. If authentication and authorization becomes a decentralized Internet infrastructure like SMTP or DNS, the know-how for how to launch a manage these services will be in high demand across the globe. Product Proposal API and Mobile Access Management
  • 6. What is the vision and purpose of this product? While the vision for securing the Internet is clear to the “identerati”–the experts who developed the standards–we need to get the information into the hands of a much wider audience. It is imperative for our society that we decentralize identity. Face book and Google have bridged our inability to identify our friends on the Internet by providing a centralized solution–you can share a Google doc with someone only because they also have a Google account. With a myriad of vendors producing hardware and software that interact on our behalf, we cannot build our society on these central identity silos. Like enlightened despotism, it seems efficient. But over time, it undermines the original design goal of the Internet… the largest federation of autonomous entities ever assembled into one network. The Internet was made possible by standards like TCP/IP, DNS, http and ssl. After 20 years, we have an Internet identity infrastructure, and it’s time to get the word out. For this, we need paper! Who is the reader/viewer at the start? The basic profile of the person is a “Unix system administrator.” However, others in the organization who use or rely on the infrastructure may also want to read it.
  • 7. To read this book, the person will need to understand the current infrastructure of the Internet: TCP/IP, DNS, SMTP, HTTP, and SSL. Some knowledge of private-public key cryptography would also helpful, although the required concepts will be reviewed–it’s so critical, it can’t be assumed. No programming is assumed, although some additional material will be referenced, as many programmers will certainly read this book. Who is the reader/viewer at the end? After reading the book, the reader should be ready to deploy the components to enable application testing and development to proceed. The roadmap for security should be clear, including which services are needed to meet the requirements of the reader’s organization. Importantly, after reading this book, the programmers, system administrators, and Chief Information Security Officer should be able to get alignment much more quickly on the important standards, and the moving pieces that need to be addressed from a business perspective, not just a technical perspective. Article resource:-https://sites.google.com/site/thegluuserver/packt-publishing-book- proposal-api-and-mobile-access-management