Skip to main content
DI

Authentication Books

11 books in this category

OAuth 2 in Action

Justin Richer

OAuth 2 in Action

Justin Richer, Antonio Sanso

4.5

OAuth 2 in Action teaches you the practical use and deployment of OAuth 2 from the perspective of a client, authorization server, and resource server. You'll learn how to build an OAuth 2 ecosystem from scratch, understand the security implications, and implement it correctly in real-world scenarios.

intermediateAuthenticationAuthorization

Solving Identity Management in Modern Applications

Yvonne Wilson

Solving Identity Management in Modern Applications

Yvonne Wilson, Abhishek Hingnikar

4.6

This book provides a practical guide to identity management for modern applications. It covers the fundamentals of authentication, authorization, OAuth 2.0, OpenID Connect, and SAML 2.0, explaining when and how to use each. The second edition includes updated coverage of passwordless authentication, passkeys, and decentralized identity.

intermediateIAMAuthentication

Zero Trust Networks

Evan Gilman

Zero Trust Networks

Evan Gilman, Doug Barth

4.4

Zero Trust Networks provides a thorough examination of the zero trust security model, where nothing inside or outside the network perimeter is trusted by default. The book covers network architecture, device trust, user trust, application trust, and how to build systems that verify every request regardless of source.

advancedZero TrustCybersecurity

Keycloak - Identity and Access Management for Modern Applications

Stian Thorgersen

Keycloak - Identity and Access Management for Modern Applications

Stian Thorgersen, Pedro Igor Silva

4.4

This practical guide covers Keycloak from installation to advanced configuration. Learn how to secure applications using OpenID Connect and OAuth 2.0, configure social login, implement fine-grained authorization, manage users and roles, and integrate Keycloak with existing infrastructure.

intermediateIAMAuthentication

NIST SP 800-63 Digital Identity Guidelines

Paul Grassi

NIST SP 800-63 Digital Identity Guidelines

Paul Grassi, James Fenton, Elaine Newton, Ray Perlner, Andrew Regenscheid

4.7

The NIST SP 800-63 Digital Identity Guidelines provide technical requirements for federal agencies implementing digital identity services. Revision 4 covers identity proofing (800-63A), authentication and lifecycle management (800-63B), and federation and assertions (800-63C). It defines Identity Assurance Levels (IAL), Authenticator Assurance Levels (AAL), and Federation Assurance Levels (FAL).

referenceComplianceIAM

OAuth 2.0 Simplified

Aaron Parecki

OAuth 2.0 Simplified

Aaron Parecki

4.6

OAuth 2.0 Simplified is a guide to building OAuth 2.0 servers and clients. Written by the author of oauth.com, it covers the OAuth 2.0 framework in clear, approachable language with practical examples for web and mobile applications.

beginnerAuthenticationAuthorization

OpenID Connect in Action

Prabath Siriwardena

OpenID Connect in Action

Prabath Siriwardena

4.3

OpenID Connect in Action provides a comprehensive, hands-on guide to the OpenID Connect protocol. It covers the core specification, discovery, dynamic registration, session management, and practical integration patterns for securing modern web and mobile applications.

intermediateAuthenticationAuthorization

API Security in Action

Neil Madden

API Security in Action

Neil Madden

4.7

API Security in Action teaches you how to create secure APIs for any situation. It covers authentication, authorization, audit logging, rate limiting, and encryption for REST, gRPC, and message-based APIs. The book uses practical Java examples but the principles apply to any language.

intermediateAPI SecurityAuthentication

Advanced API Security

Prabath Siriwardena

Advanced API Security

Prabath Siriwardena

4.1

Advanced API Security covers cutting-edge API security patterns including OAuth 2.0 extensions, OpenID Connect, UMA, token binding, and mutual TLS. It explores advanced topics like API gateways, service mesh security, and securing microservices architectures.

advancedAPI SecurityAuthentication

Authentication and Access Control

Jason Andress

Authentication and Access Control

Jason Andress

4

A practical guide to authentication mechanisms and access control models. It covers password-based authentication, multi-factor authentication, biometrics, access control models (MAC, DAC, RBAC, ABAC), and the cryptographic foundations that support them.

intermediateAuthenticationAuthorization

FIDO2 and WebAuthn: Passwordless Authentication

David Turner

FIDO2 and WebAuthn: Passwordless Authentication

David Turner, Christiaan Brand

4.2

A comprehensive developer guide to implementing FIDO2 and WebAuthn passwordless authentication. Covers the FIDO2 protocol, WebAuthn API, platform authenticators, roaming authenticators, passkeys, and practical implementation patterns.

intermediateAuthenticationBiometrics