Securing the Perimeter: Deploying Identity and Access Management

If you’re interested in identity and access management (IAM) — and I assume you are, since you’re on the Gluu blog! — you’ve surely heard about SAML, OAuth and OpenID Connect. But over my 20+ year career in IAM, I’ve noticed a few things about our industry as a whole:
  1. We need more IAM engineers.
  2. The standards themselves are hard to read. They lack context. And the audience for specs is professional software implementers, not newbies.
  3. While there are many good articles and blogs about IAM, it’s hard to find all the information you need presented in an organized and holistic manner.
  4. IAM is best learned by hands on projects. You need to understand theory, but you also must apply it in practice.

For these reasons and more, two years ago I accepted an offer from Apress to write a book that summarizes important theoretical knowledge and documents tried-and-true recipes for IAM.

In December 2018, the book finally shipped and is now available from online retailers including Amazon and Apress: Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software Now you too can learn how core IAM systems and standards work together, and how to deploy an enterprise-grade IAM service using free open source software.

Thank you for your support today!