Managing Authentication Protocols

In this chapter, we will provide you with an overview about the important authentication protocols you need to know in order to handle your configurations and projects in that field.

We see a lot of confusion in the usage of authentication protocols in our projects. It's very important to understand the different protocols, that you can discuss with application providers about the correct implementation tasks and requirements. We see very often that a lot of time is used for discussing authentication methods and solutions. It's clearly impossible to put all the material about the different authentication methods in only one chapter, as that would fill a complete book in the real world. We decided to provide ...

Get Mastering Identity and Access Management with Microsoft Azure - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.