Implementing Multifactor Authentication
By :
Implementing Multifactor Authentication
By:
Overview of this book
MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience.
You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with how MFA works and the various types of solutions currently available. As you progress through the chapters, you'll learn how to choose the proper MFA setup to provide the right combination of security and user experience. The book then takes you through methods hackers use to bypass MFA and measures to safeguard your applications. After familiarizing yourself with enabling and managing leading cloud and on-premise MFA solutions, you’ll see how MFA efficiently curbs cyber threats, aided by insights from industry best practices and lessons from real-world experiences. Finally, you’ll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys.
By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud.
Table of Contents (20 chapters)
Preface
Part 1: Introduction
Free Chapter
Chapter 1: On the Internet, Nobody Knows You’re a Dog
Chapter 2: When to Use Different Types of MFA
Part 2: Implementing Multifactor Authentication
Chapter 3: Preventing 99.9% of Attacks – MFA with Azure AD and Duo
Chapter 4: Implementing Workforce and Customer Authentication Using Okta
Chapter 5: Access Management with ForgeRock and Behavioral Biometrics
Chapter 6: Federated SSO with PingFederate and 1Kosmos
Chapter 7: MFA and the Cloud – Using MFA with Amazon Web Services
Chapter 8: Google Cloud Platform and MFA
Chapter 9: MFA without Commercial Products – Doing it All Yourself with Keycloak
Part 3: Proven Implementation Strategies and Deploying Cutting-Edge Technologies
Chapter 10: Implementing MFA in the Real World
Chapter 11: The Future of (Multifactor) Authentication
Index
Other Books You May Enjoy
Appendix A: Installing the Java Software Development Kit
Appendix B: Custom App Integration with Azure AD
Appendix C: Installing Apache Tomcat Software
Customer Reviews