Free Tutorial – Building an Identity Architecture

0
Certificate

Free

Language

Level

Beginner

Last updated on April 15, 2025 3:21 am

Learn best practices to build a secure and scalable identity architecture based on open standards. This course covers Neo-security concepts and API integration patterns, providing insights on authentication and entitlement management. Ideal for identity specialists.

Add your review

This four-part course is focused on best practices to build a centralized and modular identity architecture based on open standards.

By enrolling in the course and following a series of lectures, students will get a comprehensive introduction to the Neo-security concepts and how they can use them to create a secure architecture to protect and assert legitimate access to APIs, services, and applications on the web and mobile.

This course will be utterly useful as it explains how to build a secure and scalable platform which is capable of managing identities, governing the issuance of tokens, and being responsible for federation.

In the first session, we will introduce you to the concept of Neo-security and then take a closer look at the three main parts of the systems that adhere to it:

  • The Identity Management System

  • The API Management System

  • The Entitlement Management System

In the second part, we will look at API integration patterns and how to properly secure your APIs in the Neo-security architecture. We will talk about:

  • The Phantom token flow

  • The Split token flow

  • Proof-of-Possession tokens

In the third part of the Building an Identity Architecture course, we continue learning about the different API integration patterns. We will take a closer look at:

  • How to organize scopes and claims

  • Levels of enforcement

  • Token sharing techniques, when APIs talk to each other

  • Dealing with entitlement

In the fourth and last part of the Building an Identity Architecture course, we examine identities and access management, the details of authentication. In the session, we share:

  • Insight on user identities

  • Theory of the authentication process

  • The relationship between authentication and authorization

  • An overview of federation

Who this course is for:

  • Identity specialists

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Free Tutorial – Building an Identity Architecture”

×

    Your Email (required)

    Report this page
    Free Tutorial – Building an Identity Architecture
    Free Tutorial – Building an Identity Architecture
    LiveTalent.org
    Logo
    LiveTalent.org
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.