Building an Identity Architecture
Sign In To Access All Course Sessions
This online four-part course is focused on best practices to build a centralized and modular identity architecture based on open standards. You get a comprehensive introduction to the Neo-security concepts and how you can use them to create a secure architecture to protect and assert legitimate access to APIs, services, and applications on the web and mobile. It manages identities, governs the issuance of tokens, and is responsible for federation—critical for building a secure and scalable platform.
Register to get instant access to the courses and study from the comfort of your chair, at a time that suits you.
Each session is approximately 20 minutes long.
Course outline
Session 1: Introduction to Neo-Security
In the first session, we will introduce you to the concept of Neo-security and then take a closer look at the three main parts of the systems that adhere to it:
- The Identity Management System
- The API Management System
- The Entitlement Management System
Session 2: API Integration Patterns
In this part, we will look at API integration patterns and how to properly secure your APIs in the Neo-security architecture. We will talk about:
- The Phantom token flow
- The Split token flow
- Proof-of-Possession tokens
Session 3: API Integration Patterns (cont.)
In the third part of the Building an Identity Architecture course, we continue learning about the different API integration patterns. We will take a closer look at:
- How to organize scopes and claims
- Levels of enforcement
- Token sharing techniques, when APIs talk to each other
- Dealing with entitlement
Session 4: Identities and Access Management
In the fourth and last part of the Building an Identity Architecture course, we examine identities and access management, the details of authentication. In the session, we share:
- Insight on user identities
- Theory of the authentication process
- The relationship between authentication and authorization
- An overview of federation
Presented by:
Michal Trojanowski
Product Marketing Engineer at Curity
Follow
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.