Modern authentication and authorization for your applications
Disclaimer: The opinions expressed in this article are solely those of the author and do not reflect the views or opinions of any organization or entity. The content provided is for informational purposes only and should not be construed as professional advice. The author maintains a technologically agnostic point of view and strives to present balanced and objective information. Readers are encouraged to conduct their own research and analysis before making any decisions based on the information provided.
Part of my job involves assisting customers with the modernization of their application's authentication and/or authorization processes. I handle various types of applications, including web, native, custom developments, SaaS applications, APIs, and more. Sometimes, these concepts can be confusing, so it's crucial to have a basic understanding before making any decisions.
To move forward, it's essential to be familiar with terms like SAML, WS-Fed, OAuth2, OIDC, identity providers, claims providers, token enrichment, signing, encryption, identifiers, subject, audience, RegEx, transformations, flows, and more. You don't need to be an expert, but you should grasp the fundamentals. Rest assured, you will learn a lot during the process.
The most common scenarios I work on are:
Some of the main concerns include:
Contrary to what you might think, the process can be repetitive regardless of the scenario. Whether dealing with thousands or hundreds of apps or identities, planning, testing, and commitment from all parties involved remain crucial.
领英推荐
Here are some lessons learned:
Consider the following questions:
I could continue writing this article indefinitely, but I will conclude here. Perhaps in the future, I will write a second part.
As always, feel free to reach out to me if you have any questions. Better yet, post them here so everyone can benefit.
Thank you for reading.
Chief Information Security Officer (CISO) | Founding partner at Schub | Building secure, compliant, cloud-native solutions.
1 年Marcelo D. I totally relate to this article, I shared some of these pains, and even discuss some of these recommendations with clients. Kudos to you for writing this. I'm eager to read the second part.