Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Azure Active Directory for Secure Application Development
  • Table Of Contents Toc
  • Feedback & Rating feedback
Azure Active Directory for Secure Application Development

Azure Active Directory for Secure Application Development

By : Sjoukje Zaal
3.8 (6)
close
close
Azure Active Directory for Secure Application Development

Azure Active Directory for Secure Application Development

3.8 (6)
By: Sjoukje Zaal

Overview of this book

Azure Active Directory for Secure Application Development is your one-stop shop for learning how to develop secure applications using modern authentication techniques with Microsoft Azure AD. Whether you’re working with single-tenant, multi-tenant, or line-of-business applications, this book contains everything you need to secure them. The book wastes no time in diving into the practicalities of Azure AD. Right from the start, you’ll be setting up tenants, adding users, and registering your first application in Azure AD. The balance between grasping and applying theory is maintained as you move from the intermediate to the advanced: from the basics of OAuth to getting your hands dirty with building applications and registering them in Azure AD. Want to pin down the Microsoft Graph, Azure AD B2C, or authentication protocol best practices? We’ve got you covered. The full range of Azure AD functionality from a developer perspective is here for you to explore with confidence. By the end of this secure app development book, you’ll have developed the skill set that so many organizations are clamoring for. Security is mission-critical, and after reading this book, you will be too.
Table of Contents (14 chapters)
close
close
1
Part 1: Getting Started with the Microsoft Identity Platform
5
Part 2: Authentication and Protocols
9
Part 3: Azure AD B2C

Chapter 7: Introducing Azure Active Directory B2C

In the previous chapter, we covered Microsoft Graph in depth. We looked at queries, batching and paging, and how throttling is handled in Microsoft Graph. We finished the demo application that we started in Chapter 5, Securing Applications with OAuth 2.0, OpenID Connect, and MSAL, by using Microsoft Graph API to retrieve user profile information.

In the last part of this book, we are going to focus fully on Azure AD Business to Customer (B2C). In the first chapter, we are going to look at the built-in functionalities that Azure AD B2C has to offer. We are going to set up a B2C tenant and add a user to it. Next, we are going to cover user flows and policies and create a user flow with a template that comes with Azure AD B2C out of the box. And lastly, we are going to set up a web application that is going to authenticate against Azure AD B2C.

The following topics will be covered in this chapter:

  • Introducing Azure AD B2C...
Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Azure Active Directory for Secure Application Development
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon