Get Free Shipping on orders over $79
Implementing Multifactor Authentication : Protect your applications from cyberattacks with the help of MFA - Marco Fanti

Implementing Multifactor Authentication

Protect your applications from cyberattacks with the help of MFA

By: Marco Fanti

eText | 19 May 2023 | Edition Number 1

At a Glance

eText


$42.89

or 4 interest-free payments of $10.72 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Avoid the common pitfalls of implementing MFA solutions by learning how to choose, implement, and troubleshoot them in your digital environment

Key Features

  • Leverage MFA tools such as Ping Identity, Duo Security, Okta, Hyper, ForgeRock, and many more
  • Learn practical strategies to prevent MFA hacks with real-world examples
  • Enhance your organization's security by choosing the right MFA solutions for your needs

Book Description

Multifactor authentication has emerged as one of the best ways to tackle the global cybersecurity concerns in recent years, but choosing the wrong MFA solution for your needs can do more harm than good.

Implementing Multifactor Authentication will show you how to choose, deploy, and troubleshoot multiple authentication methods in your applications to make them safer without compromising the user experience.

You'll start with an introduction to authentication and explain how MFA comes into the picture along with understanding why it is important. You will learn how MFA works and the types currently available on the market. As you progress through the chapters, you will learn how to choose the right MFA set up to keep the user experience as friendly as possible. You'll also explore different ways how hackers bypass MFA and how to protect your applications from these attacks.

Next, you'll delve into how MFA helps mitigate cyber threats, cover best practices, and real-world scenarios. You'll also learn how to enable and manage the MFA model in public clouds like AWS, Azure, and GCP, how biometrics fits into the equation, and what the next wave of innovation might bring.

By the end of this book, you will understand how to secure MFA solutions and how your organization can protect itself from MFA hacking.

What you will learn

  • Understand the benefits and shortcomings of MFA methods in use today
  • Choose the best MFA product or solution for your security needs
  • Deploy and configure your chosen solution to get the most out of it
  • Identify problems with different MFA solutions and learn how to solve or mitigate them
  • Reduce UX friction with ForgeRock and behavioral biometrics
  • Learn about future technologies in the field and what to look for next

Who This Book Is For

This book is for developers, system administrators, security professionals, white-hat hackers, pentesters, CISOs, or anyone interested in understanding the technology and creating or improving their access management authentication infrastructure. Basic knowledge of authentication and identity management will help you get the most out of this book, but it's not a prerequisite if you're willing to do a bit of side research on the technical terms.

Table of Contents

  1. On the Internet, Nobody Knows You're a Dog - What Is Authentication
  2. When to Use Different Types of MFA
  3. Preventing 99.9% of Attacks to Your Workforce Accounts
  4. Implementing Customer Authentication Using Okta and HYPR
  5. Passwordless Workforce Authentication Using PingFederate and 1Kosmos
  6. Reducing MFA Friction with ForgeRock and Behavioral Biometrics
  7. MFA and the Cloud - Using MFA with AWS and Google Cloud
  8. MFA without Commercial Products - Doing it All Yourself with Keycloak
  9. When MFA Is Not Enough
  10. Best Practices and Tips for a Successful MFA Implementation
  11. What Is Coming to Improve (Multi-Factor) Authentication
on
Desktop
Tablet
Mobile

More in Computer Networking & Communications

Agile Web Development with Rails 8 - Sam Ruby

eBOOK

RRP $97.96

$78.99

19%
OFF
Think Distributed Systems - Dominik Tornow

eBOOK