Security Considerations

Security Considerations

In this course you'll learn about key security issues: RBAC, SSO, architecture, integration security, and handling PII.

rate limit

Code not recognized.

Curriculum

  • Introduction to Security Considerations
  • Role-Based Access Control
  • Introduction to Role-Based Access Control (RBAC)
  • Environment Level RBAC
  • Module Level RBAC
  • Component Level RBAC
  • Troubleshooting RBAC
  • Building a Client's RBAC Requirements
  • Use Case: Troubleshooting RBAC
  • Single Sign-On
  • SSO in Unqork
  • Unqork as a SAML Service Provider
  • Setting Up Amazon Cognito for SSO in Express View (OIDC)
  • Setting Up Azure AD for SSO in Express View (OIDC)
  • Setting Up Okta for SSO in Express View (OIDC)
  • Setting Up Azure AD for SSO in Express View (SAML)
  • Setting Up Okta for SSO in Express View (SAML)
  • Setting Up Okta for SSO in Designer (SAML)
  • Setting Up Azure AD for SSO in Designer (SAML)
  • Architecture Considerations
  • API Architecture within Applications
  • Server-Side Validation
  • Proxy Module Validation Pattern
  • Integrations and Data
  • Introduction to Security Best Practices
  • Best Practices for Storing Sensitive Data
  • Environment and Integrations Security Best Practices
  • Data Encryption

Curriculum

  • Introduction to Security Considerations
  • Role-Based Access Control
  • Introduction to Role-Based Access Control (RBAC)
  • Environment Level RBAC
  • Module Level RBAC
  • Component Level RBAC
  • Troubleshooting RBAC
  • Building a Client's RBAC Requirements
  • Use Case: Troubleshooting RBAC
  • Single Sign-On
  • SSO in Unqork
  • Unqork as a SAML Service Provider
  • Setting Up Amazon Cognito for SSO in Express View (OIDC)
  • Setting Up Azure AD for SSO in Express View (OIDC)
  • Setting Up Okta for SSO in Express View (OIDC)
  • Setting Up Azure AD for SSO in Express View (SAML)
  • Setting Up Okta for SSO in Express View (SAML)
  • Setting Up Okta for SSO in Designer (SAML)
  • Setting Up Azure AD for SSO in Designer (SAML)
  • Architecture Considerations
  • API Architecture within Applications
  • Server-Side Validation
  • Proxy Module Validation Pattern
  • Integrations and Data
  • Introduction to Security Best Practices
  • Best Practices for Storing Sensitive Data
  • Environment and Integrations Security Best Practices
  • Data Encryption