Skip to main content

Failures

  • Chapter
  • First Online:
  • 1231 Accesses

Abstract

We have covered several aspects of identity management relevant to an application development project. Writing an application with perfect identity management will be for naught, however, if flaws in your environment or processes introduce a vulnerability, especially one that compromises sensitive identity data. It is often said that one can learn a lot from failure. When it comes to identity management, however, we think it is preferable to learn from others' failures rather than your own! Inspired by George Santayana’s advice about the need to learn from the past, we’ve collected stories of past security breaches and their causes to help you avoid making such mistakes in your environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Yvonne Wilson, Abhishek Hingnikar

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wilson, Y., Hingnikar, A. (2019). Failures. In: Solving Identity Management in Modern Applications. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5095-2_19

Download citation

Publish with us

Policies and ethics