Implementing multifactor authentication protect your applications from cyberattacks with the help of MFA
Avoid MFA pitfalls--learn how to choose, implement, and troubleshoot MFA in your company Key Features Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domain Thwart authentication breaches using pragmatic strategies and lessons derived from real-world scenar...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England :
Packt Publishing Ltd
[2023]
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009755148506719 |
Tabla de Contenidos:
- Table of ContentsOn the Internet, Nobody Knows You're a DogWhen to Use Different Types of MFAPreventing 99.9% of Attacks
- MFA with Azure AD and DuoImplementing Workforce and Customer Authentication Using OktaAccess Management with ForgeRock and Behavioral BiometricsFederated SSO with PingFederate and 1KosmosMFA and the Cloud
- Using MFA with Amazon Web ServicesGoogle Cloud Platform and MFAMFA without Commercial Products
- Doing it All Yourself with KeycloakImplementing MFA in the Real WorldThe Future of (Multi-Factor) Authentication.