Skip to main content
DI

Cloud Identity

Manage identity and access in cloud and multi-cloud environments. Covers cloud IAM for AWS, Azure, and GCP, federation, CIAM, identity brokering, and modern identity architectures including identity mesh and identity fabric.

13 terms7 books

Key Terms

Single Sign-On

Trending

SSO

An authentication method that allows users to log in once and gain access to multiple applications or systems without re-entering credentials for each one.

beginnerAuthenticationSSO

OpenID Connect

Trending

OIDC

An identity layer built on top of OAuth 2.0 that allows clients to verify the identity of an end-user and obtain basic profile information using an ID Token.

intermediateAuthenticationStandards & Protocols

Security Assertion Markup Language

SAML

An XML-based open standard for exchanging authentication and authorization data between an identity provider and a service provider, widely used for enterprise SSO.

intermediateAuthenticationStandards & Protocols

Identity Provider

IdP

A service that creates, manages, and verifies digital identities, issuing authentication tokens or assertions that other applications and services trust to grant access.

beginnerAuthenticationSSO

Service Provider

SP

An application or service that relies on an identity provider to authenticate users and make authorization decisions, consuming authentication tokens or assertions issued by the IdP.

beginnerAuthenticationSSO

System for Cross-domain Identity Management

SCIM

An open standard protocol for automating the exchange of user identity information between identity domains and IT systems, enabling automated provisioning and deprovisioning of user accounts.

intermediateProvisioningStandards & Protocols

Customer Identity and Access Management

Trending

CIAM

A specialized subset of IAM focused on managing and securing external customer identities, providing seamless registration, authentication, and profile management for consumer-facing applications.

intermediateAuthenticationPrivacy

Federated Identity

A system that allows users to use the same identity credentials across multiple independent organizations or domains, enabled by trust relationships between identity providers and service providers.

intermediateAuthenticationSSO

Identity Federation

The process of establishing trust relationships between separate identity management systems so that users authenticated by one system can access resources managed by another without re-authentication.

intermediateAuthenticationSSO

Just-in-Time Provisioning

JIT Provisioning

An automated provisioning method that creates or updates user accounts in a target application at the moment of the user's first authentication, rather than pre-provisioning accounts in advance.

intermediateProvisioningSSO

User Provisioning

The process of creating, managing, and maintaining user accounts and their associated access rights across IT systems and applications, ensuring users have the appropriate access to perform their roles.

beginnerProvisioningGovernance

Identity Mesh

A distributed identity architecture concept where identity services are decomposed into modular, interoperable components that can be composed flexibly, rather than relying on a single monolithic identity platform.

advancedCloud IdentityGovernance

And 1 more terms... View all in glossary

Recommended Books

Solving Identity Management in Modern Applications

Yvonne Wilson

Solving Identity Management in Modern Applications

Yvonne Wilson, Abhishek Hingnikar

4.6

This book provides a practical guide to identity management for modern applications. It covers the fundamentals of authentication, authorization, OAuth 2.0, OpenID Connect, and SAML 2.0, explaining when and how to use each. The second edition includes updated coverage of passwordless authentication, passkeys, and decentralized identity.

intermediateIAMAuthentication

Keycloak - Identity and Access Management for Modern Applications

Stian Thorgersen

Keycloak - Identity and Access Management for Modern Applications

Stian Thorgersen, Pedro Igor Silva

4.4

This practical guide covers Keycloak from installation to advanced configuration. Learn how to secure applications using OpenID Connect and OAuth 2.0, configure social login, implement fine-grained authorization, manage users and roles, and integrate Keycloak with existing infrastructure.

intermediateIAMAuthentication

IAM for Cloud Infrastructure

Marcus Young

IAM for Cloud Infrastructure

Marcus Young

4.4

A practical guide to identity and access management across major cloud platforms. Covers AWS IAM, Azure AD (Entra ID), and GCP IAM including policies, roles, service accounts, cross-cloud identity federation, and infrastructure-as-code for IAM.

intermediateCloud SecurityIAM

Practical Cloud Security

Chris Dotson

Practical Cloud Security

Chris Dotson

4.2

Practical Cloud Security covers the essential security considerations for cloud deployments including identity management, network security, data protection, logging, and incident response across IaaS, PaaS, and SaaS models.

intermediateCloud SecurityCybersecurity

Securing DevOps

Julien Vehent

Securing DevOps

Julien Vehent

4.3

Securing DevOps covers the integration of security practices into CI/CD pipelines and cloud-native infrastructure. Topics include securing the pipeline, infrastructure security, identity management for DevOps, secrets management, and security testing automation.

intermediateDevOps SecurityCloud Security

The CIAM Handbook

Martin Kuppinger

The CIAM Handbook

Martin Kuppinger, Anne Bailey

4

A comprehensive guide to Customer Identity and Access Management covering user registration, progressive profiling, consent management, social login, identity verification, and the balance between security and user experience in consumer-facing applications.

intermediateCIAMIAM