What You Will Learn

The main focus of this course is understanding the concepts within identity. The concepts themselves are heavy, let alone trying to implement identity in our code.

There will not be any code-alongs in this course. The implementation of identity is large enough that it gets its own course.

The concepts that you learn in this course apply to identity for web applications, desktop applications, mobile applications, and other applications. These concepts will also apply to these platforms, regardless of the programming languages used to implement them.

You will see how identity has evolved throughout computing. We'll look at it initially from the beginning and show how it splits into corporate and consumer concerns over the years.

You will get a more solid understanding of what makes up authentication versus authorization. There are parts that overlap both, and some people improperly use the terms interchangeably. By the end of this course, you will not make that mistake.

We cover the building blocks of identity - principals, claims, scopes, tokens, and grants. We look at token types and authorization flows. We talk about credentials and how they differ from tokens. You will get a more solid understanding of these fundamental concepts of identity.

We will get into SAML and JWT - what they are, what they look like, and why they are used.

We will talk about the importance of OAuth and OpenID Connect - also known as OIDC. We'll talk how those have added improvements in identity but also lead to more concerns.

From there, we'll get into Single Sign-On, Multi-factor authentication, and Proof Key for Code Exchange.

In the end, we will include best practices for identity and security as well as considerations when working in compliance and regulatory situations.

There is a lot to cover. So what are we waiting for? Let's get into these identity essentials!



Complete and Continue