Depuis 2004, Janua vous accompagne dans toutes les étapes de vos projets de gestion des identités et open source, de sécurité et de mise en œuvre de logiciels libres.

Nos domaines d’expertise :
  • Gestion des Identités et Open Source
  • Nos prestations : audit, consulting, intégration, accompagnement à la mise en production, benchmarks et support.
  • Notre approche : les processus itératifs, les maquettes (POC) et l’utilisation de méthodes « agiles ».
Nos principaux domaines d’interventions techniques :

Gestion des identités

Identity & Access Management

La gestion des identités et des accès (Identity and Access Management) est devenue …

Les annuaires LDAP

Lightweight Directory Access Protocol (LDAP) est le protocole d’accès privilégié …

SAML, OpenID & Fédération

Security assertion markup language (SAML) et OpenID Connect (OIDC) sont des standards …

La sécurité de l'IOT

La sécurité de l’IoT (Internet des Objets): Les études de la société Gartner prédisent …

Single Sign On - SSO

L’authentification unique, en anglais Single Sign-On ou SSO, est une technique …

Provisioning d'identités

La multiplication des référentiels d’identité au sein des entreprises (AD, LDAP, Oracle …

Services

Support & Expertise OpenDJ

Offre de support OpenDJ et WrenDS

Intégration & Expertise RedHat SSO

Support, intégration et expertise RedHat SSO et Keycloak

Support & Expertise OpenAM

Offre de support OpenIG, OpenAM et WrenAM

Intégration & Expertise RedHat DS

Support, intégration et expertise RedHat DS et 389 DS

Support & Expertise OpenIDM

Offre de support OpenIDM et WrenIDM

Outillage LDAP & SSO

Les annuaires LDAP et les infrastructures de SSO prennent….

EDITION - OPEN SOURCE

Jaguards

logiciel de main courante informatisée et gestion de crise pour SDIS, Aéroports …

CMakeBuilder

CMakeBuilder est un plugin Eclipse qui vous permet de créer ou maintenir des projets …

LdapTools

Les consultants de Janua cumulent de nombreuses années de pratique …

TECHNICAL BLOG

Janua recrute un(e) architecte senior IAM – Directeur Technique – Keycloak et RH-DS

Dans un contexte de développement de notre activité gestion des identités, nous recherchons un(e) Architecte Senior - Directeur Technique IAM pour rejoindre notre équipe répartie sur toute la France ( Siège à Sophia-Antipolis, 50% des effectifs en télé-travail )...

Understanding Oauth2-OpenID scope usage with Keycloak

In this article, Janua's CTO shares tips and tricks about understanding Oauth2-OpenID scope usage with Keycloak. 1) What are scopes used for ? Scopes is basic feature of Identity and Access Management. Scopes are like a court yard. Scopes allow to define and...

Using Impersonation with Keycloak

Using Impersonation with Keycloak : Impersonation is very useful feature in IAM system today. It allows to execute an action being logged as dedicated admin-user to act on specific user actions, as if it was the genuine user who was performing the action. We will...

Offline Sessions and Offline tokens within Keycloak

This article is dedicated to describe the behaviour and usage of offline sessions and offline tokens within Keycloak. The behaviour of offline tokens is also illustrated through the off-line-token example of the keycloak demo template (available with version 5.0 of...

PKCE support with Keycloak 7.0 for mobile apps

PKCE support with Keycloak 7.0: Keycloak 7.0 has been released on Aug 25th 2019 with PKCE support. This represents a major breakthrough for all mobile apps to increase security and to mitigate malicious attacks Public client security vulnerability OAuth 2.0 [RFC6749]...

Keycloak X509 Certificate Authentication

In this article Janua's CTO share tips and tricks about Keycloak X509 Certificate Authentication. 1. Overview The goal is to explain how it is possible to authenticate user against keycloak applications using client certificates. This can be very useful in case of...

UMA policy enforcers with KeyCloak

In this article we will share understanding UMA policy enforcers with KeyCloak. 1) UMA User resource query A client is accessing a resource from a resource server [crayon-5dea58a888e99029875039/] In return, the user will get return of error 401 and the as_uri of the...

Access Token Security with Keycloak

In this article, janua's CTO shares tips and tricks regarding access token security with Keycloak. 1. Description Tokens are issued to clients by an authorization server with the approval of the resource owner. The client uses the access token to access the protected...

How to install KeyCloak with MariaDB

1) Presentation This chapter illustrates how to install Keycloak with MariaDB database and how it is possible to configure MariaDB with KeyCloak. The version used are: keycloak is 6.01 mariadb is 10.3 This done throughout the following steps : (1)...

Keycloak Access Token verification example

This article describes how it is possible to validate a Keyloak access token and performing signature verification. The RSA realm public key is uploaded in order to verify the access token signature The example is illustrated using jwt.io debugger debugger, but could...